计算机科学 ›› 2023, Vol. 50 ›› Issue (8): 286-293.doi: 10.11896/jsjkx.230100082
王飚1, 王妲2, 柯吉1, 马雨庆2, 张懿璞1, 王长青3, 李爱军3
WANG Biao1, WANG Da2, KE Ji1, MA Yuqing2, ZHANG Yipu1, WANG Changqing3, LI Aijun3
摘要: 针对工业场景数据传输过程中存在的安全卸载问题,文中首次将安全策略作为决策变量融入优化问题,应用计算卸载原理以及差分进化算法,提出了一种数据安全卸载算法。首先针对工业现场设备的本地计算、本地边缘计算、跨车间边缘计算和云计算4种计算模式以及数据安全进行数学建模,将多级安全策略、任务卸载和资源分配相融合,构建了数据安全卸载模型。综合考虑时延和安全风险概率的影响,设计最大化设备满意度的目标函数,形成了安全优化卸载方案。针对该优化问题,提出了一种基于改进的差分进化策略的数据安全卸载算法,在满足最优解的同时,在满足时延和安全风险的要求下实现系统的设备满意度最大化。相比GASORA算法、GSOJRA算法和DEDSTO-NS算法,所提算法不仅使现场设备满足了时延和风险概率的要求,并在保障数据安全性的同时,将设备满意度提高了35%。仿真结果证实了所提方法的有效性,且有一定的现实应用价值。
中图分类号:
[1]TALEB T,SAMDANIS K,MADA B,et al.On multi-access edge computing:A survey of the emerging 5G network edge cloud architecture and orchestration[J].IEEE Communications Surveys and Tutorials,2017,19(3):1657-1681. [2]YIN Y,CAO Z,XU Y,et al.QoS prediction for service recommendation with features learning in mobile edge computing environment[J].IEEE Transactions on Cognitive Communications and Networking,2020,6(4):1136-1145. [3]FANG W,DING S,LI Y,et al.OKRA:Optimal task and re-source allocation for energy minimization in mobile edge computing systems[J].Wireless Networks,2019,25(5):2851-2867. [4]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541. [5]ELGENDY I A,MUTHANNA A,HAMMOUDEH M,et al.Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing[J].Big Data,2021,9(4):265-278. [6]SONG Y B,JIN X Y,YAN F,et al.Secure and energy-efficient offloading strategies for mobile edge computing in vehicular networking[J].Journal of Tsinghua University(Natural Science Edition),2021,61(11):1246-1253. [7]JIANG X,SUN Y,LIU B,et al.Combinatorial double auctionfor resource allocation with differential privacy in edge computing[J].Computer Communications,2022,185:13-22. [8]YAO Y,WANG Z,ZHOU P.Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT:an ADMM approach[J].Computers and Security,2020,96:101886. [9]ZHOU Y S,TAN C,TANG F.A multidimensional security query scheme for fog-enhanced industrial Internet of Things[J].Journal of Communication,2020,41(8):175-186. [10]REN T Y,WANG X H,GUO G X,et al.Design of data security system for power IoT based on multi-level authentication and lightweight encryption[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2020,40(6):12-19. [11]HE X L,REN Z Y,SHI C H,et al.Cloud-fog network for medi-cal big data and its distributed computing scheme[J].Journal of Xi'an Jiaotong University,2016,50(10):71-77. [12]LI Z,CHANG V,HU H,et al.Profit maximization for security-aware task offloading in edge-cloud environment[J].Journal of Parallel and Distributed Computing,2021,157:43-55. [13]ZHANG Y,LIU Y,ZHOU J,et al.Slow-movement particleswarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing[J].Future Generation Computer Systems,2020,112:148-161. [14]REN J,HE Y,YU G,et al.Joint communication and computation resource allocation for cloud-edge collaborative System[C]//2019 IEEE Wireless Communications and Networking Conference.2019:1-6. [15]JIANG W,ZHANG X,MA Y.Energy aware real-time scheduling policy with guaranteed security protection[C]//19th Asia and South Pacific Design Automation Conference.2014:317-322. [16]SINGHAL N,RAINA J.Comparative analysis of AES and RC4 algorithms for better utilization[J].International Journal of Computer Trends and Technology,2011,2(6):177-181. [17]TRAD A,BAHATTAB A A,OTHMAN S B.Performance trade-offs of encryption algorithms for wireless sensor networks[C]//2014 World Congress on Computer Applications and Information Systems(WCCAIS).IEEE,2014:1-6. [18]ALAM M,KHAN M.Performance and efficiency analysis ofdifferent block cipher algorithms of symmetric key cryptography[J].International Journal of Advanced Research in Computer Science and Software Engineering,2013,3(10):713-720. [19]ZHU A,WEN Y.Computing offloading strategy using improved genetic algorithm in mobile edge computing system[J].Journal of Grid Computing,2021,19(3):38. [20]SARVABHATLA M,KONDA S,VORUGUNTI C S,et al.A network aware energy efficient offloading algorithm for mobile cloud computing over 5G network[C]//2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).IEEE,2017:69-74. |
|