Towards Reliable Computation Offloading in Mobile Ad-Hoc Clouds Using Blockchain
Mobile Ad-hoc Cloud (MAC) refers to the computation offloading of a mobile device among the multiple co-located mobile devices. However, it is difficult to convince the randomly participating mobile devices to offer their resources for performing the computation offloading of other mobile devices. These devices can be convinced for resource sharing by limiting the compute shedding of a device nearly equal to the computation that same device has already performed for other mobile devices. However, this cannot be achieved without establishing the trust among the randomly co-located mobile devices.
Blockchain has been already proven for the trust-establishment between multiple independent stakeholders. However, to the best of our knowledge, no one has used blockchain for reliable computation offloading among the independently operating co-located mobile devices of MAC. In this position paper, we proposed the mapping of blockchain concepts for the realization of reliable computation offloading in MAC. We have also identified the future research directions that can be focused for improving the proposed integration of blockchain and MAC.
KeywordsMobile Ad-hoc Cloud Mobile Cloud Computing Mobile edge computing Multi-access Edge Computing Blockchain
The present work was undertaken in the context of the “Self-OrganizatioN towards reduced cost and eNergy per bit for future Emerging radio Technologies” with contract number 734545. The project has received research funding from the H2020-MSCA-RISE-2016 European Framework Program.
- 1.Afonso, J.: Edge computing: learn to delegate—octo talks! January 2018. https://blog.octo.com/en/edge-computing-learn-to-delegate/). Accessed 8 Apr 2018
- 2.Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72 (2003)Google Scholar
- 3.Dasu, T., Kanza, Y., Srivastava, D.: Unchain your blockchain. In: Proceedings of Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018)Google Scholar
- 6.Gai, F., Wang, B., Deng, W., Peng, W.: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds.) DASFAA 2018, Part II. LNCS, vol. 10828, pp. 666–681. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91458-9_41CrossRefGoogle Scholar
- 7.Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)Google Scholar
- 8.Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin (2015). arXiv preprint: arXiv:1502.04015
- 12.Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
- 13.Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 14. ACM (2017)Google Scholar
- 14.Pilkington, M.: 11 blockchain technology: principles and applications. In: Research Handbook on Digital Transformations, p. 225 (2016)Google Scholar
- 15.Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for internet of things realization (2018). arXiv preprint: arXiv:1805.06695
- 16.Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE (2017)Google Scholar
- 17.Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Factom business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, November 2014Google Scholar
- 19.Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325–329. IEEE (2014)Google Scholar
- 21.Yousefpour, A., Ishigaki, G., Gour, R., Jue, J.P.: On reducing IoT service delay via fog offloading. IEEE Internet of Things J. (2018)Google Scholar
- 22.Zhang, Y., van der Schaar, M.: Reputation-based incentive protocols in crowdsourcing applications. In: 2012 Proceedings IEEE INFOCOM, pp. 2140–2148. IEEE (2012)Google Scholar
- 23.Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017)Google Scholar
- 24.Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1987–1997. IEEE (2003)Google Scholar
- 25.Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 535–544. IEEE (2018)Google Scholar