Skip to main content

Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2022)

Abstract

Edge computing plays an important role in processing and storing data. By offloading tasks to the edge server, mobile users can access necessary computing resources on demand. However, security of edge computing service is still a major concern. This paper proposes an edge computing resource allocation mechanism based on dynamic trust. First, security problems due to lack of reliability in the resource allocation process are solved based on the trust mechanism. This mechanism considers the resource allocation process between the mobile user node and the edge server as a transaction, according to the trading behavior in the transaction process of server to give its corresponding trust. Second, a trust mechanism is used for dynamic credit granting. Mobile users with similar behaviors form a group, where a representative is elected to trade resources and bundle information into a block and attach it on the chain. At the same time, the delay problem is added as a constraint to the trust calculation. Finally, the simulation experiment shows that the mechanism improves security of edge computing.

This work was partially supported by National Natural Science Foundation of China No.62276097, Shanghai Municipal Natural Science Foundation under Grant No.21ZR1416300, Capacity building project of local universities Science and Technology Commission of Shanghai Municipality No.22010504100.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, L., Wu, C., Fan, W.: Summary of edge computing resource allocation and task scheduling optimization. J. Syst. Simul. 33(3), 509–520 (2020)

    Google Scholar 

  2. Zhuang, X., Yang, B., Wang, X., et al.: Research on mobile edge computing security. Telecommun. Eng. Technol. Standard. 31(12), 38–43 (2018)

    Google Scholar 

  3. Chen, L., Tang, H., You, W., Bai, Y.: Research on mobile edge computing security defense. J. Netw. Inf. Secur. 7(1), 130–142 (2021)

    Google Scholar 

  4. Guo, S., Wang, R., Zhang, F.: Overview of the principles and applications of blockchain technology. Comput. Sci. 48(2), 271–281 (2021)

    Google Scholar 

  5. Zhang, L., Liu, B., Zhang, R., et al.: Overview of blockchain technology. Comput. Eng. 45(5), 1–12 (2019)

    Article  Google Scholar 

  6. Dong, S., Wu, J., Li, H., et al.: Resource allocation method of mobile edge computing for priority tasks. Comput. Eng. 46(3), 18–23 (2020)

    Google Scholar 

  7. Li, J., Zhang, Y., Pang, L., Ding, W., Sun, G., Yu, H.: Resource allocation and task scheduling methods in mobile edge computing. J. Chongqing Univ. Technol. (Nat. Sci.) 440(11), 164–171 (2020)

    Google Scholar 

  8. Xue, J., An, Y.: New task offloading and resource allocation strategy based on edge computing. Comput. Eng. Sci. 42(6), 959–965 (2020)

    Google Scholar 

  9. Yang, S.: A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks. Comput. Commun. 160, 759–768 (2020)

    Article  Google Scholar 

  10. Alfakih, T., Hassan, M., Gumaei, A., et al.: Task offloading and resource allocation for mobile edge computing by deep reinforcement learning based on SARSA. IEEE Access 8, 54074–54084 (2020)

    Article  Google Scholar 

  11. Liao, J., Xian, W., et al.: Resource allocation and task scheduling scheme in priority-based hierarchical edge computing system. In: 2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (2020)

    Google Scholar 

  12. Nath, S., Wu, J.: Dynamic computation offloading and resource allocation for multi-user mobile edge computing. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE (2020)

    Google Scholar 

  13. Wang, L., Jiao, L., Li, J., et al.: MOERA: mobility-agnostic online resource allocation for edge computing. IEEE Trans. Mob. Comput. 18(8), 1843–1856 (2019)

    Article  Google Scholar 

  14. Shen, S., Mao, Y., Li, L.: A general application scheme of blockchain for non-digital currency. J. Nanjing Univ. Posts Telecommun. Nat. Sci. Ed. 39(1), 1–11 (2019)

    Google Scholar 

  15. Hu, X., Guo, S., Guo, S., et al.: Blockchain meets edge computing: a distributed and trusted authentication system. IEEE Trans. Industr. Inf. 16(3), 1972–1983 (2020)

    Article  Google Scholar 

  16. Xu, C., Wang, K., Li, P., et al.: Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30(4), 870–882 (2019)

    Article  Google Scholar 

  17. Zhang, S., Lee, J.: A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7(5), 4557–4565 (2019)

    Article  Google Scholar 

  18. Wu, B., Xu, K., Li, Q., et al.: Toward blockchain-powered trusted collaborative services for edge-centric networks. IEEE Netw. 34(2), 30–36 (2020)

    Article  Google Scholar 

  19. Ioini, N., Pahl, C.: Trustworthy orchestration of container based edge computing using permissioned blockchain. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 147–154 (2018)

    Google Scholar 

  20. Huang, Y., Zhang, J., Duan, J., et al.: Resource allocation and consensus on edge blockchain in pervasive edge computing environments. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 1476–1486 (2019)

    Google Scholar 

  21. Qiao, G., Leng, S., Chai, H., et al.: Blockchain empowered resource trading in mobile edge computing and networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE (2019)

    Google Scholar 

  22. Xu, Q., Su, Z., Yang, Q.: Blockchain-based trustworthy edge caching scheme for mobile cyber-physical system. IEEE Internet Things J. 7(2), 1098–1110 (2020)

    Article  Google Scholar 

  23. Huang, J., Xia, X., et al.: Trust degree certification mechanism based on dynamic authorization. J. Softw. 30(9), 2593–2607 (2019)

    Google Scholar 

  24. Song, J., Gu, T., Ge, Y., et al.: Smart contract-based computing ResourcesTrading in edge computing. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Huiqun Yu , Zhiqing Shao or Guisheng Fan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, H., Tang, Q., Shao, Z., Yue, Y., Fan, G., Chen, L. (2022). Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 461. Springer, Cham. https://doi.org/10.1007/978-3-031-24386-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-24386-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-24385-1

  • Online ISBN: 978-3-031-24386-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics