Abstract
Nowadays, due to the advances in mobile and wireless communication, mobile devices are widely used in our daily life. Meanwhile, in the mobile devices, there exits diverse applications which are developed to satisfy the various requirements of mobile users. Correspondingly, a large number of services are produced by the mobile devices. Since the mobile devices have limitations on the battery capacity, physical size, etc., they can hardly complete all the services. To relieve this problem, driven by edge computing, the central units (CUs) in fifth-generation wireless systems (5G) could be enhanced into edge nodes (ENs) for processing. However, during the transmission of edge services, the privacy leakage may occur, and the overall performance of the networks needs to be taken into consideration. In this paper, an optimization problem is defined to improve the resource utilization and load balance for all the ENs while protecting the privacy information and satisfying the time requirement. Then, a balanced service offloading method, abbreviated BSOM, is proposed. Finally, abundant experiments and evaluations are conducted to validate our proposed method is both effective and feasible.
Similar content being viewed by others
References
Cui L, Yu FR, Yan Q (2016) When big data meets software-defined networking: Sdn for big data and big data for sdn. IEEE network 30(1):58–65
Gandomi A, Haider M (2015) Beyond the hype: big data concepts, methods, and analytics. Int J Inf Manag 35(2):137–144
Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of ”big data” on cloud computing: review and open research issues. Inf Syst 47:98–115
Cisco Visual Networking Index. Global mobile data traffic forecast update, 2014–2019. White Paper, February, 1 2015
Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Selected Areas Commun 34(3):510–527
Gupta A, Jha RK (2015) A survey of 5g network: architecture and emerging technologies. IEEE Access 3:1206–1232
He Q, Cui G, Zhang X, Chen F, Deng S, Jin H, Yang Y (2019) A game-theoretical approach for user allocation in edge computing environment. IEEE Transactions on Parallel and Distributed Systems (TPDS). https://doi.org/10.1109/TPDS.2019.2938944
Gao H, Miao H, Liu L, Kai J, Zhao K (2018) Automated quantitative verification for service-based system design: a visualization transform tool perspective. Int J Softw Eng Knowl Eng 28(10):1369–1397
Wang Y, He Q, Ye D, Yang Y (2017) Formulating criticality-based cost-effective fault tolerance strategies for multi-tenant service-based systems. IEEE Trans Softw Eng 44(3):291–307
Lai P, He Q, Abdelrazek M, Chen F, Hosking J, Grundy J, Yang Y (2018) Optimal edge user allocation in edge computing with variable sized vector bin packing. In: International conference on service-oriented computing. Springer, pp 230–245
Li H, Zhu H, Du S, Liang X, Shen XS (2016) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Depend Secur Comput 15(4):646–660
Yin Y, Zhang W, Xu Y, He Z, Mai Z, Yu L (2019) Qos prediction for mobile edge service recommendation with auto-encoder. IEEE Access 7:62312–62324
Qi L, Meng S, Zhang X, Wang R, Xu X, Zhou Z, Dou W (2018) An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7):2037
Zhang Y-w, Zhou Y-y, Wang F-t, Sun Z, He Q (2018) Service recommendation based on quotient space granularity analysis and covering algorithm on spark. Knowl-Based Syst 147:25–35
Yin Y, Lu C, Xu Y, Wan J, He Z, Mai Z (2019) Qos prediction for service recommendation with deep feature learning in edge computing environment. Mobile Netw Appl, 1–11
Qi L, Wang R, Hu C, Li S, He Q, Xu X (2019) Time-aware distributed service recommendation with privacy-preservation. Inform Sci 480:354–364
Eiza MH, Ni Q, Qi S (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881
Ramakrishna M, Kodati VK, Gratz PV, Sprintson A (2015) Gca: global congestion awareness for load balance in networks-on-chip. IEEE Trans Parallel Distrib Syst 27(7):2022–2035
Xie X, Yuan T, Zhou X, Cheng X (2018) Research on trust model in container-based cloud service. Comput Mater Continua 56(2):273–283
Zitzler E, Laumanns M, Thiele L (2001) Spea2: improving the strength pareto evolutionary algorithm. TIK-report, 103
Wang P, Zhu Z, Wang Y (2016) A novel hybrid mcdm model combining the saw, topsis and gra methods based on experimental design. Inform Sci 345:27–45
Zhang Y, Wang K, He Q, Chen F, Deng S, Zheng Z, Yang Y (2019) Covering-based web service quality prediction via neighborhood-aware matrix factorization. IEEE Transactions on Services Computing
Gao H, Zhang K, Yang J, Wu F, Liu H (2018) Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Internat J Distrib Sensor Netw 14(2):1550147718761583
Qi L, Yi C, Yuan Y, Fu S, Zhang X, Xu X (2019) A qos-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web, 1–23
Yuan Y, Banzhaf W (2018) Arja: automated repair of java programs via multi-objective genetic programming. IEEE Transactions on Software Engineering
Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Toward service selection for workflow reconfiguration: an interface-based computing solution. Futur Gener Comput Syst 87:298–311
Yin Y, Lu C, Wan J, et al. (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815–62825
Qian Y, Hu L, Chen J, Guan X, Hassan MM, Alelaiwi A (2019) Privacy-aware service placement for mobile edge computing via federated learning. Information Sciences
Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access 5:3302–3312
Du M, Wang K, Xia Z, Zhang Y (2018) Differential privacy preserving of training model in wireless big data with edge computing. IEEE Transactions on Big Data
Ding L, Salem MB (2018) A novel architecture for automatic document classification for effective security in edge computing environments. In: 2018 IEEE/ACM symposium on edge computing (SEC). IEEE, pp 416–420
He X, Liu J, Jin R, Dai H (2017) Privacy-aware offloading in mobile-edge computing. In: GLOBECOM 2017-2017 IEEE global communications conference. IEEE, pp 1–6
Habib ur Rehman M, Sun C, Wah TY, Iqbal A, Jayaraman PP (2016) Opportunistic computation offloading in mobile edge cloud computing environments. In: 2016 17th IEEE International conference on mobile data management (MDM), vol 1. IEEE, pp 208–213
Zhang J, Hu X, Ning Z, Ngai EC-H, Li Z, Wei J, Cheng Jn, Hu B (2017) Energy-latency tradeoff for energy-aware offloading in mobile edge computing networks. IEEE Internet Things J 5(4):2633–2645
Ke Z, Mao Y, Leng S, He Y, Zhang Y (2017) Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Veh Technol Mag 12(2):36–44
Yang Z, Huang Y, Li X, Wang W, Wu F, Zhang X, Yao W, Zheng Z, Xiang L, Li W et al (2018) Efficient secure data provenance scheme in multimedia outsourcing and sharing. Comput Mater Continua 56(1):1–17
Zhang J, Xie N, Zhang X, Yue K, Li W, Kumar D (2018) Machine learning based resource allocation of cloud computing in auction. Comput Mater Continua 56(1):123–135
Mao Yi, Zhang J, Letaief KB (2016) Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Selected Areas Commun 34(12):3590–3605
Ke Z, Mao Y, Leng S, Zhao Q, Li L, Peng X, Li P, Maharjan S, Zhang Y (2016) Energy-efficient offloading for mobile edge computing in 5g heterogeneous networks. IEEE Access 4:5896–5907
Xu C, Jiao L, Li W, Fu X (2015) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808
Wang F, Xu J, Wang X, Cui S (2017) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784– 1797
Tao X, Ota K, Dong M, Qi H, Li K (2017) Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wireless Commun Lett 6(6):774–777
Lyu X, Tian H, Li J, Vinel A, Maharjan S, Gjessing S, Zhang Y (2018) Selective offloading in mobile edge computing for the green internet of things. IEEE Netw 32(1):54–60
Zhang K, Mao Y, Leng S, Maharjan S, Zhang Y (2017) Optimal delay constrained offloading for vehicular edge computing networks. In: 2017 IEEE International conference on communications (ICC). IEEE, pp 1–6
Acknowledgments
This paper is supported by National Key Research and Development Program of China (No. 2017YFB0504203), the National Natural Science Foundation of China under grant no.61702277, and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xu, X., Liu, X., Xu, Z. et al. Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks. Mobile Netw Appl 25, 713–724 (2020). https://doi.org/10.1007/s11036-019-01448-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-019-01448-8