Computer Science ›› 2023, Vol. 50 ›› Issue (4): 241-248.doi: 10.11896/jsjkx.211200194

• Computer Network • Previous Articles     Next Articles

Auction-based Edge Cloud Deadline-aware Task Offloading Strategy

PEI Cui1, FAN Guisheng1,2, YU Huiqun1, YUE Yiming1   

  1. 1 Department of Computer Science and Engineering,East China University of Science and Technology,Shanghai 200237,China
    2 Shanghai Key Laboratory of Computer Software Evaluating and Testing,Shanghai 200237,China
  • Received:2021-12-16 Revised:2022-01-13 Online:2023-04-15 Published:2023-04-06
  • About author:PEI Cui,born in 1996,postgraduate.Her main research interests include edge computing,task unloading method and smart contract.
    FAN Guisheng,born in 1980,Ph.D,associate professor,is a member of China Computer Federation.His mian research interests include formal methods for complex software system,service oriented computing,and techniques for analysis of software architecture.
  • Supported by:
    National Natural Science Foundation of China(62276097) .

Abstract: With the advent of the Internet of everything and the 5G era,the amount of data that mobile users need to process does not match their data processing capabilities,offloading a large number of tasks to limited edge servers for execution is bound to produce competition.The introduction of auction modelcan solve the problem of resource competition among users.At present,most task offloading works based on auction ignore the deadline perception of tasks,the general task offloading work only consi-ders delay-sensitive tasks,and does not consider ensuring the security of the offloading process.Therefore,an auction based deadline-aware task offloading(ABDTO) strategy is proposed,which uses the auction mechanism based on smart contract to realize the optimal allocation of deadline-aware tasks(delay-sensitive tasks and non-delay-sensitive tasks) to the edge ser-vers,and the total utility(i.e.total profit) is taken as the evaluationcriterion to achieve a win-win situation between mobile users and edge ser-vers.The heuristic genetic algorithm is used to conduct simulation experiments.Compared with TACD,UPPER and RND algorithms,ABDTO strategy has higher overall utility.Finally,using Remix,Ganache,etc.to establish the Ethereum private blockchain network for simulation,which proves the correctness and feasibility of the strategy.

Key words: Edge cloud, Auction mechanism, Deadline aware, Task offloading, Smart contract

CLC Number: 

  • TP301
[1]FU Y W,MENG X J.The Development Status and Countermeasures of Edge Computing Technology[J].Sci-tech in China,2019,265(10):12-15.
[2]WANG H Q,ZHANG F,LI T,et al.Security and privacy-protection technologies in smart contract[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2019,39(4):63-71.
[3]ZHANG L,LIU B X,ZHANG R Y,et al.Overview of Blockchain Technology[J].Computer Engineering,2019,45(5):1-12.
[4]HUANG J F,LIU J.Survey on Blockchain Research[J].Journal of Beijing University of Posts and Telecommunications,2018,41(2):1-8.
[5]YANG J,SUN Y,LIU F.Research on trust scheme of sealed blockchain auction based on Ethereum smart contract[J].Computer Science and Applications,2020,10(5):868-882.
[6]FAN J L,LI X H,NIE T Z,et al.Survey on Smart Contract Based on Blockchain System[J].Computer Science,2019,46(11):1-10.
[7]GAO H,LI X J,ZHOU B W,et al.Energy efficient computing task offloading strategy for deep neural networks in mobile edge computing[J].Computer Integrated Manufacturing Systems,2020,26(6):1607-1615.
[8]WEI F,CHEN S X,ZOU W X.A Greedy Algorithm for Task Offloading in Mobile Edge Computing System[J].China Communications,2018,15(11):149-157.
[9]YU H Y,WANG Q Y,GUO S T.Energy-Efficient Task Offloading and Resource Scheduling for Mobile Edge Computing[C]//2018 IEEE International Conference on Networking,Architecture and Storage(NAS).Chongqing,China:IEEE,2018.
[10]SUN J N,GU Q,ZHENG T,et al.Joint Optimization of Computation Offloading and Task Scheduling in Vehicular Edge Computing Networks[J].IEEE Access,2020,8:10466-10477.
[11]CHAKROUN O,CHERKAOUI S.Resource Allocation for Delay Sensitive Applications in Mobile Cloud Computing[C]//41st IEEE Conference on Local Computer Networks(LCN).IEEE,2016:615-618.
[12]SARKAR I,ADHIKARI M,KUMAR N,et al.Dynamic Task Placement for Deadline-Aware IoT Applications in Federated Fog Networks[J].IEEE Internet of Things Journal,2022,9(2):1469-1478.
[13]MITHUN M,VIKAS K,QI Z,et al.Optimal Pricing for Off-loaded Hard- and Soft-Deadline Tasks in Edge Computing[J].IEEE Transactions on Intelligent Transportation Systems,2021,23(7):9829-9839.
[14]ZHOU G Q,WU J G,CHEN L.TACD:A Three-Stage Auction Scheme for Cloudlet Deployment in Wireless Access Network[C]//12th International Conference on Wireless Algorithms,Systems,and Applications(WASA).Guilin,PEOPLES R CHINA:2017:877-882.
[15]XIA C P,CHEN H,LIU X L,et al.ETRA:Efficient Three-Stage Resource Allocation Auction for Mobile Blockchain in Edge Computing[C]//2018 IEEE 24th International Conference on Parallel and Distributed Systems(ICPADS).Singapore,SINGAPORE:IEEE,2018:701-705.
[16]LIU X L,WU J G,CHEN L,et al.Efficient Auction Mechanism for Edge Computing Resource Allocation in Mobile Blockchain[C]//2019 IEEE 21st International Conference on High Performance Computing and Communications;IEEE 17th International Conference on Smart City;IEEE 5th International Confe-rence on Data Science and Systems(HP-CC/Smart City/DSS).Zhangjiajie,China:IEEE,2019.
[17]KUMAR D,BARANWAL G,RAZA Z,et al.A Truthful Combinatorial Double Auction-based Marketplace Mechanism for Cloud Computing[J].Journal of Systems and Software,2018,140:91-108.
[18]TAFSIRI S A,YOUSEFI S.Combinatorial Double Auction-based Resource Allocation Mechanism in Cloud Computing Market[J].Journal of Systems and Software,2018,137:322-334.
[19]AGGARWAL A,KUMAR N,VIDYARTHI D P,et al.Fog-Integrated Cloud Architecture enabled multi-attribute combinatorial reverse auctioning framework[J/OL].https://www.scien-cedirect.com/science/article/pii/S1569190X21000307.
[20]MA X Y,XU D,WOLTER K.Blockchain-enabled feedback-based combinatorial double auctionfor cloud markets[J].Future Generation Computer Systems the International Journal of Escience,2022,127:225-239.
[21]GAO Z P,LIN B,XIAO K L,et al.A Dynamic Resource Allocation Algorithm Based on Auction Model in Mobile Blockchain Network[C]//2019 3rd International Conference on Electronic Information Technology and Computer Engineering(EITCE).Xiamen,China:IEEE,2019.
[22]ASIF I M,BENAY R,SARBANI R.Auction based ResourceAllocation Mechanism in Federated Cloud Environment:TARA[J].IEEE Transactions on Services Computing,2022,15(1):470-483.
[23]LIU T L,WU J G,CHEN L,et al.Smart Contract-Based Long-Term Auction for Mobile Blockchain Computation Offloading[J].IEEE Access,2020,8(99):36029-36042.
[24]DESAI H,KANTARCIOGLU M,KAGAL L.A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions[C]//2019 IEEE International Conference on Blockchain(Blockchain).Atlanta,GA,USA:IEEE,2019:34-43.
[25]LIU Y M,YU R,LI X,et al.Decentralized Resource Allocation for Video Transcoding and Delivery in Blockchain-Based System With Mobile Edge Computing[J].IEEE Transactions on Vehi-cular Technology,2019,68(11):11169-11185.
[26]SONMEZ C,OZGOVDE A,ERSOY C.EdgeCloudSim:An environment for performance evaluation of Edge Computing systems[C]//The 2nd International Conference on Fog and Mobile Edge Computing(FMEC 2017).IEEE,2017.
[27]HU Q H,CHENG H C,ZHANG X Q,et al.Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing[J/OL].https://link.springer.com/article/10.1007/s12083-021-01240-0#citeas.
[28]HUANG H,YE Q,ZHOU Y T.Deadline-Aware Task Offloa-ding with Partially-Observable Deep Reinforcement Learning for Multi-Access Edge Computing[J].IEEE Transactions on Network Science and Engineering,2022,9(6):3870-38851.
[1] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[2] SHANG Yuye, YUAN Jiabin. Task Offloading Method Based on Cloud-Edge-End Cooperation in Deep Space Environment [J]. Computer Science, 2023, 50(2): 80-88.
[3] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[4] HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305.
[5] LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279.
[6] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[7] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[8] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[9] XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11.
[10] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[11] GAO Yue-hong, CHEN Lu. Survey of Research on Task Offloading in Mobile Edge Computing [J]. Computer Science, 2022, 49(11A): 220400161-7.
[12] WANG Chen-hua, HOU Shou-lu, LIU Xiu-lei. Cost-aware IoT Data Processing in Edge-Cloud Collaborative Computing [J]. Computer Science, 2022, 49(11A): 211000101-7.
[13] ZHANG Bo-jun, LI Jie, HU Kai, ZENG Jun-hao. Distributed Encrypted Voting System Based on Blockchain [J]. Computer Science, 2022, 49(11A): 211000212-6.
[14] CHEN Qiao-song, HE Xiao-yang, XU Wen-jie, DENG Xin, WANG Jin, PIAO Chang-hao. Reentrancy Vulnerability Detection Based on Pre-training Technology and Expert Knowledge [J]. Computer Science, 2022, 49(11A): 211200182-8.
[15] GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di. Blockchain-based Role-Delegation Access Control for Industrial Control System [J]. Computer Science, 2021, 48(9): 306-316.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!