Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Security modeling and efficient computation offloading for service workflow in mobile edge computing (1907.02506v1)

Published 4 Jul 2019 in cs.DC, cs.CR, and cs.NI

Abstract: It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm, edge computing (MEC) can provide abundant computing resources to execute all or parts of the tasks of MDs and thereby can greatly reduce the energy of MD and improve the QoS of applications. However, offloading workflow tasks to the MEC servers are liable to external security threats (e.g., snooping, alteration). In this paper, we propose a security and energy efficient computation offloading (SEECO) strategy for service workflows in MEC environment, the goal of which is to optimize the energy consumption under the risk probability and deadline constraints. First, we build a security overhead model to measure the execution time of security services. Then, we formulate the computation offloading problem by incorporating the security, energy consumption and execution time of workflow application. Finally, based on the genetic algorithm (GA), the corresponding coding strategies of SEECO are devised by considering tasks execution order and location and security services selection. Extensive experiments with the variety of workflow parameters demonstrate that SEECO strategy can achieve the security and energy efficiency for the mobile applications.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (8)
  1. Binbin Huang (17 papers)
  2. Zhongjin Lia (1 paper)
  3. Peng Tang (47 papers)
  4. Shangguang Wang (58 papers)
  5. Jun Zhao (469 papers)
  6. Haiyang Hua (2 papers)
  7. Wanqing Lia (1 paper)
  8. Victor Chang (4 papers)
Citations (81)

Summary

We haven't generated a summary for this paper yet.