Low-latency orchestration for workflow-oriented service function chain in edge computing

Abstract To realize a cost-efficient, affordable, economical, flexible, elastic and innovative network service, the concepts of Network Function Virtualization (NFV) and Software-Defined Network (SDN) have emerged in edge computing. In the case of NFV deployment, most research regards the deployment of Service Function Chaining (SFC), which is composed of several series-connected Virtual Network Functions (VNFs). Current NFV deployment approaches concern how to efficiently deploy the chaining service requests. They do not consider the possible form of the service requests in edge computing. Furthermore, the study regarding response latency in NFV is limited to the chaining service requests. Most studies consider the deployment of several VNFs in one SFC onto the same substrate node to reduce the total latency and resource consumptions. In this paper, we first propose a novel workflow-like service request (WFR), which is completely different from the chaining service request. Then, a Dynamic Minimum Response Time considering Same Level (DMRT_SL) has been proposed to efficiently map the workflow-like requests in edge computing. We use a randomly generated topology as our underlying network. It can be seen from the data obtained from a large number of simulation experiments that DMRT_SL not only is particularly outstanding in terms of response time delay but that blocking rate and deploy time behavior are also particularly surprising.

[1]  Qingsheng Zhu,et al.  Deadline-Constrained Cost Optimization Approaches for Workflow Scheduling in Clouds , 2017, IEEE Transactions on Parallel and Distributed Systems.

[2]  Laura Galluccio,et al.  A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks , 2017, IEEE Journal on Selected Areas in Communications.

[3]  Prasanta K. Jana,et al.  A novel cost-efficient approach for deadline-constrained workflow scheduling by dynamic provisioning of resources , 2018, Future Gener. Comput. Syst..

[4]  Mostafa Ammar,et al.  An Approach for Service Function Chain Routing and Virtual Function Network Instance Migration in Network Function Virtualization Architectures , 2017, IEEE/ACM Transactions on Networking.

[5]  Lei Guo,et al.  Virtual Network Embedding for Collaborative Edge Computing in Optical-Wireless Networks , 2017, Journal of Lightwave Technology.

[6]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[7]  Michelle M. Zhu,et al.  Transport-Support Workflow Composition and Optimization for Big Data Movement in High-Performance Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[8]  Raouf Boutaba,et al.  Service Function Chaining Simplified , 2016, ArXiv.

[9]  Feng Xia,et al.  Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.

[10]  Jong-Moon Chung,et al.  Clustered NFV Service Chaining Optimization in Mobile Edge Clouds , 2017, IEEE Communications Letters.

[11]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[12]  Xiaoping Li,et al.  Elastic Resource Provisioning for Cloud Workflow Applications , 2017, IEEE Transactions on Automation Science and Engineering.

[13]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference , 2016, IEEE Journal of Selected Topics in Signal Processing.

[14]  Weihua Zhuang,et al.  Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions , 2017, IEEE Network.

[15]  Nerea Toledo,et al.  Toward an SDN-enabled NFV architecture , 2015, IEEE Communications Magazine.

[16]  Rubén Ruiz,et al.  A delay-based dynamic scheduling algorithm for bag-of-task workflows with stochastic task execution times in clouds , 2017, Future Gener. Comput. Syst..

[17]  Francesco Musumeci,et al.  Protection strategies for virtual network functions placement and service chains provisioning , 2017, Networks.

[18]  Meina Song,et al.  Dynamic Scheduling of Workflow for Makespan and Robustness Improvement in the IaaS Cloud , 2017, IEICE Trans. Inf. Syst..

[19]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[20]  Deep Medhi,et al.  Optimally Selecting Standby Virtual Routers for Node Failures in a Virtual Network Environment , 2017, IEEE Transactions on Network and Service Management.

[21]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[22]  Hao Chen,et al.  Performance analysis and optimization for workflow authorization , 2017, Future Gener. Comput. Syst..

[23]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[24]  Thanasis Loukopoulos,et al.  Data Replication and Virtual Machine Migrations to Mitigate Network Overhead in Edge Computing Systems , 2017, IEEE Transactions on Sustainable Computing.

[25]  Hamed Ahmadi,et al.  Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization , 2017, IEEE Communications Surveys & Tutorials.

[26]  Wei Quan,et al.  Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing , 2017, Mob. Inf. Syst..

[27]  Xiaofeng Chen,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.

[28]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[29]  Elisa Bertino,et al.  A Collaborative DDoS Defence Framework Using Network Function Virtualization , 2017, IEEE Transactions on Information Forensics and Security.

[30]  Juan Felipe Botero,et al.  Scalable and coordinated allocation of service function chains , 2017, Comput. Commun..

[31]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[32]  Juan Felipe Botero,et al.  Resource Allocation in NFV: A Comprehensive Survey , 2016, IEEE Transactions on Network and Service Management.

[33]  Jin Li,et al.  Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing , 2017, Inf. Sci..

[34]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[35]  Jose Oscar Fajardo,et al.  A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities , 2017, Mob. Inf. Syst..

[36]  David Dietrich,et al.  Multi-Provider Service Chain Embedding With Nestor , 2017, IEEE Transactions on Network and Service Management.

[37]  Hsiao-Hwa Chen,et al.  Energy-Efficiency Versus Delay Tradeoff in Wireless Networks Virtualization , 2018, IEEE Transactions on Vehicular Technology.

[38]  Ying Zhang,et al.  Improve Service Chaining Performance with Optimized Middlebox Placement , 2017, IEEE Transactions on Services Computing.

[39]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[40]  Sergey V. Kovalchuk,et al.  Execution Time Estimation for Workflow Scheduling , 2014, 2014 9th Workshop on Workflows in Support of Large-Scale Science.

[41]  Fatos Xhafa,et al.  L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing , 2015, Knowl. Based Syst..

[42]  Zhu Han,et al.  Parallel and Distributed Resource Allocation With Minimum Traffic Disruption for Network Virtualization , 2017, IEEE Transactions on Communications.

[43]  Xiaohui Liu,et al.  Evolutionary Multi-Objective Workflow Scheduling in Cloud , 2016, IEEE Transactions on Parallel and Distributed Systems.

[44]  Dongqing Xie,et al.  Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.

[45]  Jinsong Wu,et al.  Service Chaining for Hybrid Network Function , 2019, IEEE Transactions on Cloud Computing.

[46]  Yang Wang,et al.  Network Virtualization in Spectrum Sliced Elastic Optical Path Networks , 2017, Journal of Lightwave Technology.

[47]  Weiwei Lin,et al.  An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.

[48]  Fatos Xhafa,et al.  Secure deduplication storage systems supporting keyword search , 2015, J. Comput. Syst. Sci..