Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

Fog computing is a recent research trend to bring cloud computing services to network edges. EDCs are deployed to decrease the latency and network congestion by processing data streams and user requests in near real time. EDC deployment is distributed in nature and positioned between cloud data centers and data sources. Load balancing is the process of redistributing the work load among EDCs to improve both resource utilization and job response time. Load balancing also avoids a situation where some EDCs are heavily loaded while others are in idle state or doing little data processing. In such scenarios, load balancing between the EDCs plays a vital role for user response and real-time event detection. As the EDCs are deployed in an unattended environment, secure authentication of EDCs is an important issue to address before performing load balancing. This article proposes a novel load balancing technique to authenticate the EDCs and find less loaded EDCs for task allocation. The proposed load balancing technique is more efficient than other existing approaches in finding less loaded EDCs for task allocation. The proposed approach not only improves efficiency of load balancing; it also strengthens the security by authenticating the destination EDCs.

[1]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[2]  Saudi Arabia,et al.  A Guide to Dynamic Load Balancing in Distributed Computer Systems , 2010 .

[3]  Minghua Chen,et al.  Joint bidding and geographical load balancing for datacenters: Is uncertainty a blessing or a curse? , 2017, INFOCOM.

[4]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[5]  Mohammad S. Obaidat,et al.  Smart Cities and Homes: Key Enabling Technologies , 2016 .

[6]  Rongxing Lu,et al.  From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.

[7]  Anthony P. Reeves,et al.  Strategies for Dynamic Load Balancing on Highly Parallel Computers , 1993, IEEE Trans. Parallel Distributed Syst..

[8]  Liang Tong,et al.  A hierarchical edge cloud architecture for mobile computing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[9]  Sherali Zeadally,et al.  Authentication protocol for an ambient assisted living system , 2015, IEEE Communications Magazine.

[10]  Kim-Kwang Raymond Choo,et al.  A foggy research future: Advances and future opportunities in fog computing research , 2018, Future Gener. Comput. Syst..

[11]  Weifa Liang,et al.  Cloudlet load balancing in wireless metropolitan area networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[12]  Jinjun Chen,et al.  A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams , 2017, HICSS.

[13]  Mohammad S. Obaidat,et al.  Principles of Wireless Sensor Networks , 2014 .