An Edge-Computing Based Task-Unloading Technique with Privacy Protection for Internet of Connected Vehicles

The fifth generation (5G) network technology has made it possible to further exploit the radio spectrum and allow a large number of devices to concurrently have access to the mobile internet. The network has become a viable option for creating such connections and providing Internet of Things (IoT) services in a fast, secure and reliable way. In micro cloud computing, Edge computing refers to a term that describes the edge computing technology. It is expected that the IoT would utilize edge computing to minimize offloading tasks and latency as well as use the computing power in the offloading process. Although edge computing is an old technology, its role in facilitating the real-time transfer of data from devices to the cloud and the real-time processing of data within the devices has only been realized in recent times. In the process of offloading data and computing tasks, the data flow may be interrupted. The 5G technology can provide a better solution to help IoT applications close the gap between edge and the limited device resources, thus making it more reliable. This paper employs the Bald eagle search (BES) algorithm, particle swarm optimization algorithm, and genetic algorithm to simulate the edge computing. The goal is to determine which of the algorithms has the best performance, based on their latency and offloading capacity, in edge computing by comparing their results. On the basis of the execution time, amount of resources utilized in offloading tasks, and total cost of vehicular edge, the three algorithms are compared and validated. According to the simulation results, the best-performing method is the BES algorithm, as it gives the IoT quick access to information.

[1]  Ding Xu,et al.  Price-based time and energy allocation in cognitive radio multiple access networks with energy harvesting , 2016, Science China Information Sciences.

[2]  Gongjun Yan,et al.  Datacenter at the Airport: Reasoning about Time-Dependent Parking Lot Occupancy , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jie Gao,et al.  Partial Offloading Scheduling and Power Allocation for Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.

[4]  Xingwang Li,et al.  Link Selection in Buffer-Aided Cooperative Networks for Green IoT , 2020, IEEE Access.

[5]  George K. Karagiannidis,et al.  Outage Probability and Optimal Cache Placement for Multiple Amplify-and-Forward Relay Networks , 2018, IEEE Transactions on Vehicular Technology.

[6]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[7]  Lianbing Deng,et al.  A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..

[8]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[9]  Laurence T. Yang,et al.  A Tensor-Based Big-Data-Driven Routing Recommendation Approach for Heterogeneous Networks , 2019, IEEE Network.

[10]  Khaled Ben Letaief,et al.  Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices , 2016, IEEE Journal on Selected Areas in Communications.

[11]  Joan Manuel Marquès,et al.  Towards the Decentralised Cloud , 2019, ACM Comput. Surv..

[12]  Tarik Taleb,et al.  Survey on Multi-Access Edge Computing for Internet of Things Realization , 2018, IEEE Communications Surveys & Tutorials.

[13]  Wei Cao,et al.  Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework , 2019, IEEE Communications Magazine.

[14]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[15]  Thar Baker,et al.  Cloud-Based Multi-Agent Cooperation for IoT Devices Using Workflow-Nets , 2019, Journal of Grid Computing.

[16]  Victor Chang,et al.  Security modeling and efficient computation offloading for service workflow in mobile edge computing , 2019, Future Gener. Comput. Syst..

[17]  Min Chen,et al.  Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network , 2018, IEEE Journal on Selected Areas in Communications.

[18]  Chubo Liu,et al.  System delay optimization for Mobile Edge Computing , 2020, Future Gener. Comput. Syst..

[19]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[20]  Danda B. Rawat,et al.  Recent advances in mobile edge computing and content caching , 2020, Digit. Commun. Networks.

[21]  Fei Dai,et al.  Dynamic Resource Provisioning With Fault Tolerance for Data-Intensive Meteorological Workflows in Cloud , 2020, IEEE Transactions on Industrial Informatics.

[22]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[23]  H. Vincent Poor,et al.  Impact of Non-Orthogonal Multiple Access on the Offloading of Mobile Edge Computing , 2018, IEEE Transactions on Communications.

[24]  Wessam Ajib,et al.  Joint Container Placement and Task Provisioning in Dynamic Fog Computing , 2019, IEEE Internet of Things Journal.

[25]  Lei Shu,et al.  Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.

[26]  Mehdi Bennis,et al.  Living on the edge: The role of proactive caching in 5G wireless networks , 2014, IEEE Communications Magazine.

[27]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[28]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[29]  Brij B. Gupta,et al.  IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network , 2021, IEEE Internet of Things Journal.

[30]  T. Baker,et al.  Trusted Energy-Efficient Cloud-Based Services Brokerage Platform , 2015 .

[31]  F. Richard Yu,et al.  Power-Constrained Edge Computing With Maximum Processing Capacity for IoT Networks , 2019, IEEE Internet of Things Journal.

[32]  Kim-Kwang Raymond Choo,et al.  Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..

[33]  Brij B. Gupta,et al.  An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols , 2018, Concurr. Comput. Pract. Exp..

[34]  Yuanyuan Yang,et al.  Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks , 2020, IEEE Transactions on Network and Service Management.

[35]  Wazir Zada Khan,et al.  Edge computing: A survey , 2019, Future Gener. Comput. Syst..

[36]  Yue Wang,et al.  Cooperative Task Offloading in Three-Tier Mobile Computing Networks: An ADMM Framework , 2019, IEEE Transactions on Vehicular Technology.

[37]  Qun Li,et al.  A Survey of Virtual Machine Management in Edge Computing , 2019, Proceedings of the IEEE.

[38]  Eui-Nam Huh,et al.  Decentralized and Revised Content-Centric Networking-Based Service Deployment and Discovery Platform in Mobile Edge Computing for IoT Devices , 2019, IEEE Internet of Things Journal.

[39]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[40]  Romano Fantacci,et al.  Federated learning framework for mobile edge computing networks , 2020, CAAI Trans. Intell. Technol..

[41]  Weisong Shi,et al.  EdgeABC: An architecture for task offloading and resource allocation in the Internet of Things , 2020, Future Gener. Comput. Syst..

[42]  Keqiu Li,et al.  Performance Guaranteed Computation Offloading for Mobile-Edge Cloud Computing , 2017, IEEE Wireless Communications Letters.

[43]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[44]  Xin Liu,et al.  Secure probabilistic caching in random multi-user multi-UAV relay networks , 2019, Phys. Commun..

[45]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[46]  Ivan Glesk,et al.  An Improved Particle Swarm Algorithm for Multi-Objectives Based Optimization in MPLS/GMPLS Networks , 2019, IEEE Access.

[47]  Xuyun Zhang,et al.  An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..