Abstract
Edge computing plays an important role in processing and storing data. By offloading tasks to the edge server, mobile users can access necessary computing resources on demand. However, security of edge computing service is still a major concern. This paper proposes an edge computing resource allocation mechanism based on dynamic trust. First, security problems due to lack of reliability in the resource allocation process are solved based on the trust mechanism. This mechanism considers the resource allocation process between the mobile user node and the edge server as a transaction, according to the trading behavior in the transaction process of server to give its corresponding trust. Second, a trust mechanism is used for dynamic credit granting. Mobile users with similar behaviors form a group, where a representative is elected to trade resources and bundle information into a block and attach it on the chain. At the same time, the delay problem is added as a constraint to the trust calculation. Finally, the simulation experiment shows that the mechanism improves security of edge computing.
This work was partially supported by National Natural Science Foundation of China No.62276097, Shanghai Municipal Natural Science Foundation under Grant No.21ZR1416300, Capacity building project of local universities Science and Technology Commission of Shanghai Municipality No.22010504100.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, L., Wu, C., Fan, W.: Summary of edge computing resource allocation and task scheduling optimization. J. Syst. Simul. 33(3), 509–520 (2020)
Zhuang, X., Yang, B., Wang, X., et al.: Research on mobile edge computing security. Telecommun. Eng. Technol. Standard. 31(12), 38–43 (2018)
Chen, L., Tang, H., You, W., Bai, Y.: Research on mobile edge computing security defense. J. Netw. Inf. Secur. 7(1), 130–142 (2021)
Guo, S., Wang, R., Zhang, F.: Overview of the principles and applications of blockchain technology. Comput. Sci. 48(2), 271–281 (2021)
Zhang, L., Liu, B., Zhang, R., et al.: Overview of blockchain technology. Comput. Eng. 45(5), 1–12 (2019)
Dong, S., Wu, J., Li, H., et al.: Resource allocation method of mobile edge computing for priority tasks. Comput. Eng. 46(3), 18–23 (2020)
Li, J., Zhang, Y., Pang, L., Ding, W., Sun, G., Yu, H.: Resource allocation and task scheduling methods in mobile edge computing. J. Chongqing Univ. Technol. (Nat. Sci.) 440(11), 164–171 (2020)
Xue, J., An, Y.: New task offloading and resource allocation strategy based on edge computing. Comput. Eng. Sci. 42(6), 959–965 (2020)
Yang, S.: A joint optimization scheme for task offloading and resource allocation based on edge computing in 5G communication networks. Comput. Commun. 160, 759–768 (2020)
Alfakih, T., Hassan, M., Gumaei, A., et al.: Task offloading and resource allocation for mobile edge computing by deep reinforcement learning based on SARSA. IEEE Access 8, 54074–54084 (2020)
Liao, J., Xian, W., et al.: Resource allocation and task scheduling scheme in priority-based hierarchical edge computing system. In: 2020 19th International Symposium on Distributed Computing and Applications for Business Engineering and Science (DCABES) (2020)
Nath, S., Wu, J.: Dynamic computation offloading and resource allocation for multi-user mobile edge computing. In: GLOBECOM 2020–2020 IEEE Global Communications Conference. IEEE (2020)
Wang, L., Jiao, L., Li, J., et al.: MOERA: mobility-agnostic online resource allocation for edge computing. IEEE Trans. Mob. Comput. 18(8), 1843–1856 (2019)
Shen, S., Mao, Y., Li, L.: A general application scheme of blockchain for non-digital currency. J. Nanjing Univ. Posts Telecommun. Nat. Sci. Ed. 39(1), 1–11 (2019)
Hu, X., Guo, S., Guo, S., et al.: Blockchain meets edge computing: a distributed and trusted authentication system. IEEE Trans. Industr. Inf. 16(3), 1972–1983 (2020)
Xu, C., Wang, K., Li, P., et al.: Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30(4), 870–882 (2019)
Zhang, S., Lee, J.: A group signature and authentication scheme for blockchain-based mobile-edge computing. IEEE Internet Things J. 7(5), 4557–4565 (2019)
Wu, B., Xu, K., Li, Q., et al.: Toward blockchain-powered trusted collaborative services for edge-centric networks. IEEE Netw. 34(2), 30–36 (2020)
Ioini, N., Pahl, C.: Trustworthy orchestration of container based edge computing using permissioned blockchain. In: 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, pp. 147–154 (2018)
Huang, Y., Zhang, J., Duan, J., et al.: Resource allocation and consensus on edge blockchain in pervasive edge computing environments. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, pp. 1476–1486 (2019)
Qiao, G., Leng, S., Chai, H., et al.: Blockchain empowered resource trading in mobile edge computing and networks. In: ICC 2019–2019 IEEE International Conference on Communications (ICC). IEEE (2019)
Xu, Q., Su, Z., Yang, Q.: Blockchain-based trustworthy edge caching scheme for mobile cyber-physical system. IEEE Internet Things J. 7(2), 1098–1110 (2020)
Huang, J., Xia, X., et al.: Trust degree certification mechanism based on dynamic authorization. J. Softw. 30(9), 2593–2607 (2019)
Song, J., Gu, T., Ge, Y., et al.: Smart contract-based computing ResourcesTrading in edge computing. In: 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications (2020)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yu, H., Tang, Q., Shao, Z., Yue, Y., Fan, G., Chen, L. (2022). Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing. In: Gao, H., Wang, X., Wei, W., Dagiuklas, T. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 461. Springer, Cham. https://doi.org/10.1007/978-3-031-24386-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-24386-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-24385-1
Online ISBN: 978-3-031-24386-8
eBook Packages: Computer ScienceComputer Science (R0)