A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks

With the advancement of wireless networking technologies and communication infrastructures, mobile cloud computing has emerged as a pervasive paradigm to execute computing tasks for capacity-limited mobile devices. More specifically, at the network edge, the resource-rich and trusted cloudlet system can provide in-proximity computing services by executing the workloads for nearby devices. Nevertheless, there are chances for malicious users to generate distributed denial-of-service (DDoS) flooding tasks to overwhelm cloudlet servers and block computing services from legitimate users. Load balancing is one of the most effective methods to solve DDoS attacks in distributed networks. However, existing solutions require overall load information to achieve load balancing in cloudlet networks, making it costly in both communication and computation. To achieve more efficient and low-cost load balancing, we propose CTOM, a novel collaborative task offloading scheme to avoid DDoS attacks for secure and sustainable mobile cloudlet networks. The proposed solution is based on the balls-and-bins theory and it can balance the task loads with extremely limited information. The CTOM reduces the number of overloaded cloudlets smoothly, thus handling the potential DDoS attacks in mobile cloudlet networks. Extensive simulations and evaluation demonstrate that, the proposed CTOM outperforms the conventional random and proportional allocation schemes in reducing the task gaps between maximum load and minimum load among mobile cloudlets by 65% and 55%, respectively.

[1]  Zilong Ye,et al.  Secure the internet of things with challenge response authentication in fog computing , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).

[2]  Sushil Jajodia,et al.  A moving target defense approach to mitigate DDoS attacks against proxy-based architectures , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[3]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[4]  Manoj Singh Gaur,et al.  DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2017, Comput. Commun..

[5]  Wenzhong Li,et al.  Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing , 2015, IEEE/ACM Transactions on Networking.

[6]  Joonhyuk Kang,et al.  Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning , 2016, IEEE Transactions on Vehicular Technology.

[7]  Myung J. Lee,et al.  Adaptive Multi-Resource Allocation for Cloudlet-Based Mobile Cloud Computing System , 2016, IEEE Transactions on Mobile Computing.

[8]  Marcelo Dias de Amorim,et al.  The Accordion Phenomenon: Analysis, Characterization, and Impact on DTN Routing , 2009, IEEE INFOCOM 2009.

[9]  Michael Mitzenmacher,et al.  The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[10]  Anthony T. Chronopoulos,et al.  Cooperative load balancing in distributed systems , 2008 .

[11]  Wenye Wang,et al.  Can mobile cloudlets support mobile applications? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[12]  Weifa Liang,et al.  Efficient Algorithms for Capacitated Cloudlet Placements , 2016, IEEE Transactions on Parallel and Distributed Systems.

[13]  Paul W. Goldberg,et al.  Distributed selfish load balancing , 2005, SODA '06.

[14]  Jelena Mirkovic,et al.  RESECT: Self-Learning Traffic Filters for IP Spoofing Defense , 2017, ACSAC.

[15]  Vinod Yegneswaran,et al.  Athena: A Framework for Scalable Anomaly Detection in Software-Defined Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[16]  Lin Gui,et al.  Load Balancing Oriented Computation Offloading in Mobile Cloudlet , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[17]  Ali Dehghantanha,et al.  Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing , 2016, EURASIP Journal on Wireless Communications and Networking.

[18]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[19]  Anthony T. Chronopoulos,et al.  Game-theoretic static load balancing for distributed systems , 2011, J. Parallel Distributed Comput..

[20]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[21]  Zubair A. Baig,et al.  Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks , 2016, Comput. Networks.

[22]  Dusit Niyato,et al.  Offloading in Mobile Cloudlet Systems with Intermittent Connectivity , 2015, IEEE Transactions on Mobile Computing.

[23]  Weifa Liang,et al.  Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless Metropolitan Area Networks , 2017, IEEE Transactions on Cloud Computing.

[24]  Ramesh Govindan,et al.  DREAM: dynamic resource allocation for software-defined measurement , 2015, SIGCOMM 2015.

[25]  Anthony T. Chronopoulos,et al.  Noncooperative load balancing in distributed systems , 2005, J. Parallel Distributed Comput..

[26]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[27]  B. Vocking How asymmetry helps load balancing , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[28]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[29]  Xiangjian He,et al.  CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks , 2018, 2018 IEEE International Conference on Communications (ICC).

[30]  Shaojie Tang,et al.  Taming the big to small: efficient selfish task allocation in mobile crowdsourcing systems , 2017, Concurr. Comput. Pract. Exp..

[31]  Mahadev Satyanarayanan,et al.  A Brief History of Cloud Offload: A Personal Journey from Odyssey Through Cyber Foraging to Cloudlets , 2015, GETMBL.

[32]  Nancy M. Amato,et al.  Quantifying the effectiveness of load balance algorithms , 2012, ICS '12.

[33]  Weifa Liang,et al.  Cloudlet load balancing in wireless metropolitan area networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[34]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[35]  George Cybenko,et al.  Dynamic Load Balancing for Distributed Memory Multiprocessors , 1989, J. Parallel Distributed Comput..

[36]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[37]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[38]  Manoj Singh Gaur,et al.  DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2015, Comput. Commun..

[39]  Liang Hu,et al.  A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment , 2016, IEEE Transactions on Parallel and Distributed Systems.

[40]  Jun Cai,et al.  Distributed Multiuser Computation Offloading for Cloudlet-Based Mobile Cloud Computing: A Game-Theoretic Machine Learning Approach , 2018, IEEE Transactions on Vehicular Technology.

[41]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[42]  Ning An,et al.  Optimizing mobility and energy charging for mobile cloudlet , 2017, 2017 IEEE International Conference on Communications (ICC).

[43]  Nirwan Ansari,et al.  Green Cloudlet Network: A Distributed Green Mobile Cloud Network , 2016, IEEE Network.

[44]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .