Skip to main content
Log in

Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Nowadays, due to the advances in mobile and wireless communication, mobile devices are widely used in our daily life. Meanwhile, in the mobile devices, there exits diverse applications which are developed to satisfy the various requirements of mobile users. Correspondingly, a large number of services are produced by the mobile devices. Since the mobile devices have limitations on the battery capacity, physical size, etc., they can hardly complete all the services. To relieve this problem, driven by edge computing, the central units (CUs) in fifth-generation wireless systems (5G) could be enhanced into edge nodes (ENs) for processing. However, during the transmission of edge services, the privacy leakage may occur, and the overall performance of the networks needs to be taken into consideration. In this paper, an optimization problem is defined to improve the resource utilization and load balance for all the ENs while protecting the privacy information and satisfying the time requirement. Then, a balanced service offloading method, abbreviated BSOM, is proposed. Finally, abundant experiments and evaluations are conducted to validate our proposed method is both effective and feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Cui L, Yu FR, Yan Q (2016) When big data meets software-defined networking: Sdn for big data and big data for sdn. IEEE network 30(1):58–65

    Article  Google Scholar 

  2. Gandomi A, Haider M (2015) Beyond the hype: big data concepts, methods, and analytics. Int J Inf Manag 35(2):137–144

    Article  Google Scholar 

  3. Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of ”big data” on cloud computing: review and open research issues. Inf Syst 47:98–115

    Article  Google Scholar 

  4. Cisco Visual Networking Index. Global mobile data traffic forecast update, 2014–2019. White Paper, February, 1 2015

  5. Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Selected Areas Commun 34(3):510–527

    Article  Google Scholar 

  6. Gupta A, Jha RK (2015) A survey of 5g network: architecture and emerging technologies. IEEE Access 3:1206–1232

    Article  Google Scholar 

  7. He Q, Cui G, Zhang X, Chen F, Deng S, Jin H, Yang Y (2019) A game-theoretical approach for user allocation in edge computing environment. IEEE Transactions on Parallel and Distributed Systems (TPDS). https://doi.org/10.1109/TPDS.2019.2938944

  8. Gao H, Miao H, Liu L, Kai J, Zhao K (2018) Automated quantitative verification for service-based system design: a visualization transform tool perspective. Int J Softw Eng Knowl Eng 28(10):1369–1397

    Article  Google Scholar 

  9. Wang Y, He Q, Ye D, Yang Y (2017) Formulating criticality-based cost-effective fault tolerance strategies for multi-tenant service-based systems. IEEE Trans Softw Eng 44(3):291–307

    Article  Google Scholar 

  10. Lai P, He Q, Abdelrazek M, Chen F, Hosking J, Grundy J, Yang Y (2018) Optimal edge user allocation in edge computing with variable sized vector bin packing. In: International conference on service-oriented computing. Springer, pp 230–245

  11. Li H, Zhu H, Du S, Liang X, Shen XS (2016) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Depend Secur Comput 15(4):646–660

    Article  Google Scholar 

  12. Yin Y, Zhang W, Xu Y, He Z, Mai Z, Yu L (2019) Qos prediction for mobile edge service recommendation with auto-encoder. IEEE Access 7:62312–62324

    Article  Google Scholar 

  13. Qi L, Meng S, Zhang X, Wang R, Xu X, Zhou Z, Dou W (2018) An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7):2037

    Article  Google Scholar 

  14. Zhang Y-w, Zhou Y-y, Wang F-t, Sun Z, He Q (2018) Service recommendation based on quotient space granularity analysis and covering algorithm on spark. Knowl-Based Syst 147:25–35

    Article  Google Scholar 

  15. Yin Y, Lu C, Xu Y, Wan J, He Z, Mai Z (2019) Qos prediction for service recommendation with deep feature learning in edge computing environment. Mobile Netw Appl, 1–11

  16. Qi L, Wang R, Hu C, Li S, He Q, Xu X (2019) Time-aware distributed service recommendation with privacy-preservation. Inform Sci 480:354–364

    Article  Google Scholar 

  17. Eiza MH, Ni Q, Qi S (2016) Secure and privacy-aware cloud-assisted video reporting service in 5g-enabled vehicular networks. IEEE Trans Veh Technol 65(10):7868–7881

    Article  Google Scholar 

  18. Ramakrishna M, Kodati VK, Gratz PV, Sprintson A (2015) Gca: global congestion awareness for load balance in networks-on-chip. IEEE Trans Parallel Distrib Syst 27(7):2022–2035

    Article  Google Scholar 

  19. Xie X, Yuan T, Zhou X, Cheng X (2018) Research on trust model in container-based cloud service. Comput Mater Continua 56(2):273–283

    Google Scholar 

  20. Zitzler E, Laumanns M, Thiele L (2001) Spea2: improving the strength pareto evolutionary algorithm. TIK-report, 103

  21. Wang P, Zhu Z, Wang Y (2016) A novel hybrid mcdm model combining the saw, topsis and gra methods based on experimental design. Inform Sci 345:27–45

    Article  Google Scholar 

  22. Zhang Y, Wang K, He Q, Chen F, Deng S, Zheng Z, Yang Y (2019) Covering-based web service quality prediction via neighborhood-aware matrix factorization. IEEE Transactions on Services Computing

  23. Gao H, Zhang K, Yang J, Wu F, Liu H (2018) Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Internat J Distrib Sensor Netw 14(2):1550147718761583

    Google Scholar 

  24. Qi L, Yi C, Yuan Y, Fu S, Zhang X, Xu X (2019) A qos-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web, 1–23

  25. Yuan Y, Banzhaf W (2018) Arja: automated repair of java programs via multi-objective genetic programming. IEEE Transactions on Software Engineering

  26. Gao H, Huang W, Yang X, Duan Y, Yin Y (2018) Toward service selection for workflow reconfiguration: an interface-based computing solution. Futur Gener Comput Syst 87:298–311

    Article  Google Scholar 

  27. Yin Y, Lu C, Wan J, et al. (2018) Location-aware service recommendation with enhanced probabilistic matrix factorization. IEEE Access 6:62815–62825

    Article  Google Scholar 

  28. Qian Y, Hu L, Chen J, Guan X, Hassan MM, Alelaiwi A (2019) Privacy-aware service placement for mobile edge computing via federated learning. Information Sciences

  29. Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot. IEEE Access 5:3302–3312

    Article  Google Scholar 

  30. Du M, Wang K, Xia Z, Zhang Y (2018) Differential privacy preserving of training model in wireless big data with edge computing. IEEE Transactions on Big Data

  31. Ding L, Salem MB (2018) A novel architecture for automatic document classification for effective security in edge computing environments. In: 2018 IEEE/ACM symposium on edge computing (SEC). IEEE, pp 416–420

  32. He X, Liu J, Jin R, Dai H (2017) Privacy-aware offloading in mobile-edge computing. In: GLOBECOM 2017-2017 IEEE global communications conference. IEEE, pp 1–6

  33. Habib ur Rehman M, Sun C, Wah TY, Iqbal A, Jayaraman PP (2016) Opportunistic computation offloading in mobile edge cloud computing environments. In: 2016 17th IEEE International conference on mobile data management (MDM), vol 1. IEEE, pp 208–213

  34. Zhang J, Hu X, Ning Z, Ngai EC-H, Li Z, Wei J, Cheng Jn, Hu B (2017) Energy-latency tradeoff for energy-aware offloading in mobile edge computing networks. IEEE Internet Things J 5(4):2633–2645

    Article  Google Scholar 

  35. Ke Z, Mao Y, Leng S, He Y, Zhang Y (2017) Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Veh Technol Mag 12(2):36–44

    Article  Google Scholar 

  36. Yang Z, Huang Y, Li X, Wang W, Wu F, Zhang X, Yao W, Zheng Z, Xiang L, Li W et al (2018) Efficient secure data provenance scheme in multimedia outsourcing and sharing. Comput Mater Continua 56(1):1–17

    Google Scholar 

  37. Zhang J, Xie N, Zhang X, Yue K, Li W, Kumar D (2018) Machine learning based resource allocation of cloud computing in auction. Comput Mater Continua 56(1):123–135

    Google Scholar 

  38. Mao Yi, Zhang J, Letaief KB (2016) Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Selected Areas Commun 34(12):3590–3605

    Article  Google Scholar 

  39. Ke Z, Mao Y, Leng S, Zhao Q, Li L, Peng X, Li P, Maharjan S, Zhang Y (2016) Energy-efficient offloading for mobile edge computing in 5g heterogeneous networks. IEEE Access 4:5896–5907

    Article  Google Scholar 

  40. Xu C, Jiao L, Li W, Fu X (2015) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808

    Google Scholar 

  41. Wang F, Xu J, Wang X, Cui S (2017) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784– 1797

    Article  Google Scholar 

  42. Tao X, Ota K, Dong M, Qi H, Li K (2017) Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wireless Commun Lett 6(6):774–777

    Article  Google Scholar 

  43. Lyu X, Tian H, Li J, Vinel A, Maharjan S, Gjessing S, Zhang Y (2018) Selective offloading in mobile edge computing for the green internet of things. IEEE Netw 32(1):54–60

    Article  Google Scholar 

  44. Zhang K, Mao Y, Leng S, Maharjan S, Zhang Y (2017) Optimal delay constrained offloading for vehicular edge computing networks. In: 2017 IEEE International conference on communications (ICC). IEEE, pp 1–6

Download references

Acknowledgments

This paper is supported by National Key Research and Development Program of China (No. 2017YFB0504203), the National Natural Science Foundation of China under grant no.61702277, and the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoxian Yang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, X., Liu, X., Xu, Z. et al. Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G Networks. Mobile Netw Appl 25, 713–724 (2020). https://doi.org/10.1007/s11036-019-01448-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-019-01448-8

Keywords

Navigation