Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

Mobile-Edge Computing (MEC) is a novel and sustainable network architecture that enables energy conservation with cloud computing and network services offloading at the edge of mobile cellular networks. However, how to efficiently manage various real-time changing security functions is an essential issue which hinders the future MEC development. To address this problem, we propose a fuzzy security service chaining approach for MEC. In particular, a new architecture is designed to decouple the required security functions with the physical resources. Based on this, we present a security proxy to support compatibility to traditional security functions. Furthermore, to find the optimal order of the required security functions, we establish a fuzzy inference system (FIS) based mechanism to achieve multiple optimal objectives. Much work has been done to implement a prototype, which is used to analyze the performance by comparing with a widely used method. The results prove that the proposed FIS mechanism achieves an improved performance in terms of Inverted Generational Distance (IGD) values and execution time with respect to the compared solution.

[1]  E. H. Mamdani,et al.  An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Man Mach. Stud..

[2]  Wim Henderickx,et al.  Network Service Header , 2015 .

[3]  Chien-Erh Weng,et al.  PEER: Proximity-Based Energy-Efficient Routing Algorithm for Wireless Sensor Networks , 2016, J. Internet Serv. Inf. Secur..

[4]  Carol J. Fung,et al.  A Survey of Android Security Threats and Defenses , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[5]  Kirti Tyagi,et al.  Dynamic composition of web services based on Qos parameters using fuzzy logic , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[6]  Mengjie Zhang,et al.  A graph-based Particle Swarm Optimisation approach to QoS-aware web service composition and selection , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).

[7]  H. Kuhn The Hungarian method for the assignment problem , 1955 .

[8]  Eros Pasero,et al.  Conserving Energy Through Neural Prediction of Sensed Data , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[9]  Pengcheng Zhang,et al.  Sky-MCSP-R: An Efficient Graph-Based Web Service Composition Approach , 2013, 2013 20th Asia-Pacific Software Engineering Conference (APSEC).

[10]  Wei Du,et al.  A Method of Web Service Composition Based on Bipartite Graph Optimal Matching and QoS , 2010, 2010 International Conference on Internet Technology and Applications.

[11]  Winfried Lamersdorf,et al.  Computing at the Mobile Edge: Designing Elastic Android Applications for Computation Offloading , 2015, 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC).

[12]  Lotfi A. Zadeh,et al.  Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..

[13]  Carlos Pignataro,et al.  Service Function Chaining (SFC) Architecture , 2015, RFC.

[14]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[15]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[16]  Rajkumar Buyya,et al.  Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users , 2014, IEEE Transactions on Cloud Computing.

[17]  Sergio Barbarossa,et al.  Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing , 2014, IEEE Transactions on Signal and Information Processing over Networks.

[18]  Franco Callegati,et al.  Dynamic chaining of Virtual Network Functions in cloud-based edge networks , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).

[19]  Naser Nematbakhsh,et al.  A fuzzy-based approach for selecting the optimal composition of services according to user preferences , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[20]  Martín Casado,et al.  The Design and Implementation of Open vSwitch , 2015, NSDI.

[21]  Minlan Yu,et al.  Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags , 2014, NSDI.

[22]  Ching-Lai Hwang,et al.  Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.

[23]  Claudia Linnhoff-Popien,et al.  ME-VoLTE: Network functions for energy-efficient video transcoding at the mobile edge , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[24]  C. Hwang,et al.  Fuzzy Multiple Attribute Decision Making Methods , 1992 .

[25]  Minlan Yu,et al.  SIMPLE-fying middlebox policy enforcement using SDN , 2013, SIGCOMM.

[26]  Nick McKeown,et al.  A network in a laptop: rapid prototyping for software-defined networks , 2010, Hotnets-IX.

[27]  Vyas Sekar,et al.  Stratos: A Network-Aware Orchestration Layer for Virtual Middleboxes in Clouds , 2013, 1305.0209.

[28]  Yu Chao,et al.  Web service composition using graph model , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.