Computer Science ›› 2023, Vol. 50 ›› Issue (8): 286-293.doi: 10.11896/jsjkx.230100082

• Information Security • Previous Articles     Next Articles

Study on Optimized Offloading for Data Security in Industrial Scene

WANG Biao1, WANG Da2, KE Ji1, MA Yuqing2, ZHANG Yipu1, WANG Changqing3, LI Aijun3   

  1. 1 School of Energy and Electrical Engineering,Chang'an University,Xi'an,710061,China
    2 School of Electronics and Control Engineering,Chang'an University,Xi'an,710061,China
    3 School of Automation,Northwestern Polytechnical University,Xi'an,710072,China
  • Received:2023-01-16 Revised:2023-04-23 Online:2023-08-15 Published:2023-08-02
  • About author:WANG Biao,born in 1969,Ph.D professor.His main research interests include analysis and optimization of complex networks and multi-agent control.
    KE Ji,born in 1982,Ph.D,lecturer.His main research interests include analysis and control of complex networks,edge computing,hybrid feedback control and energy management.
  • Supported by:
    Key Projects of Natural Science Basic Research Program of Shaanxi Province(2019JZL-06) and 2023 Key Research and Development Program of Shaanxi Province,China(2023-YBSF-285).

Abstract: The problem of security offloading in data transmission in industrial scenarios has gained wide attention.This paper is the first to integrate security policy as a decision variable into the optimization problem.It applies computational offloading principles and differential evolutionary algorithms,and proposes a data security offloading algorithm.Firstly,mathematical modeling conducted for four computing modes of industrial field devices:local computing,local edge computing,cross-plant edge computing in this paper,and cloud computing,as well as data security,and a data security offloading model is constructed by integrating multi-level security policies,task offloading,and resource allocation.Then,the security-optimized offloading scheme is formed by designing the objective function of maximizing device satisfaction by considering the effects of time delay and security risk probability.Finally,for this optimization problem,a data security offloading algorithm based on an improved differential evolution stra-tegy is proposed to maximize the device satisfaction of the system while satisfying the optimal solution with the latency and secu-rity risk requirements.Compared with the GASORA,GSOJRA and DEDSTO-NS algorithms,the proposed algorithm enables the field devices to satisfy the delay and risk probability requirements.Furthermore,it improves the device satisfaction by 35% while guaranteeing data security.Simulation results confirm the effectiveness of the proposed method and have some realistic application value.

Key words: Security strategy, Data security offloads, Differential evolution, Security risk probability, Equipment satisfaction

CLC Number: 

  • TP393
[1]TALEB T,SAMDANIS K,MADA B,et al.On multi-access edge computing:A survey of the emerging 5G network edge cloud architecture and orchestration[J].IEEE Communications Surveys and Tutorials,2017,19(3):1657-1681.
[2]YIN Y,CAO Z,XU Y,et al.QoS prediction for service recommendation with features learning in mobile edge computing environment[J].IEEE Transactions on Cognitive Communications and Networking,2020,6(4):1136-1145.
[3]FANG W,DING S,LI Y,et al.OKRA:Optimal task and re-source allocation for energy minimization in mobile edge computing systems[J].Wireless Networks,2019,25(5):2851-2867.
[4]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541.
[5]ELGENDY I A,MUTHANNA A,HAMMOUDEH M,et al.Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing[J].Big Data,2021,9(4):265-278.
[6]SONG Y B,JIN X Y,YAN F,et al.Secure and energy-efficient offloading strategies for mobile edge computing in vehicular networking[J].Journal of Tsinghua University(Natural Science Edition),2021,61(11):1246-1253.
[7]JIANG X,SUN Y,LIU B,et al.Combinatorial double auctionfor resource allocation with differential privacy in edge computing[J].Computer Communications,2022,185:13-22.
[8]YAO Y,WANG Z,ZHOU P.Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT:an ADMM approach[J].Computers and Security,2020,96:101886.
[9]ZHOU Y S,TAN C,TANG F.A multidimensional security query scheme for fog-enhanced industrial Internet of Things[J].Journal of Communication,2020,41(8):175-186.
[10]REN T Y,WANG X H,GUO G X,et al.Design of data security system for power IoT based on multi-level authentication and lightweight encryption[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2020,40(6):12-19.
[11]HE X L,REN Z Y,SHI C H,et al.Cloud-fog network for medi-cal big data and its distributed computing scheme[J].Journal of Xi'an Jiaotong University,2016,50(10):71-77.
[12]LI Z,CHANG V,HU H,et al.Profit maximization for security-aware task offloading in edge-cloud environment[J].Journal of Parallel and Distributed Computing,2021,157:43-55.
[13]ZHANG Y,LIU Y,ZHOU J,et al.Slow-movement particleswarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing[J].Future Generation Computer Systems,2020,112:148-161.
[14]REN J,HE Y,YU G,et al.Joint communication and computation resource allocation for cloud-edge collaborative System[C]//2019 IEEE Wireless Communications and Networking Conference.2019:1-6.
[15]JIANG W,ZHANG X,MA Y.Energy aware real-time scheduling policy with guaranteed security protection[C]//19th Asia and South Pacific Design Automation Conference.2014:317-322.
[16]SINGHAL N,RAINA J.Comparative analysis of AES and RC4 algorithms for better utilization[J].International Journal of Computer Trends and Technology,2011,2(6):177-181.
[17]TRAD A,BAHATTAB A A,OTHMAN S B.Performance trade-offs of encryption algorithms for wireless sensor networks[C]//2014 World Congress on Computer Applications and Information Systems(WCCAIS).IEEE,2014:1-6.
[18]ALAM M,KHAN M.Performance and efficiency analysis ofdifferent block cipher algorithms of symmetric key cryptography[J].International Journal of Advanced Research in Computer Science and Software Engineering,2013,3(10):713-720.
[19]ZHU A,WEN Y.Computing offloading strategy using improved genetic algorithm in mobile edge computing system[J].Journal of Grid Computing,2021,19(3):38.
[20]SARVABHATLA M,KONDA S,VORUGUNTI C S,et al.A network aware energy efficient offloading algorithm for mobile cloud computing over 5G network[C]//2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).IEEE,2017:69-74.
[1] ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220.
[2] MENG Yiyue, PENG Rong, LYU Qibiao. Text Material Recommendation Method Combining Label Classification and Semantic QueryExpansion [J]. Computer Science, 2023, 50(1): 76-86.
[3] LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222.
[4] LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266.
[5] CEN Jian-ming, FENG Quan-xi, ZHANG Li-li, TONG Rui-chao. Empirical Study on the Forecast of Large Stock Dividends of Listed Companies Based on DE-lightGBM [J]. Computer Science, 2022, 49(11A): 211000017-7.
[6] CHEN Ying, HUANG Pei-xuan, CHEN Jin-ping, WANG Zu-yi, SHEN Ying-shan, FAN Xiao-mao. Hybrid Particle Swarm Optimization Algorithm Based on Hierarchical Learning and Different Evolution for Solving Capacitated Vehicle Routing Problem [J]. Computer Science, 2022, 49(11A): 210800271-7.
[7] YANG Hao, YAN Qiao. Adversarial Character CAPTCHA Generation Method Based on Differential Evolution Algorithm [J]. Computer Science, 2022, 49(11A): 211100074-5.
[8] YU Jia-shan, WU Lei. Two Types of Leaders Salp Swarm Algorithm [J]. Computer Science, 2021, 48(4): 254-260.
[9] ZHANG Zhi-qiang, LU Xiao-feng, SUI Lian-sheng, LI Jun-huai. Salp Swarm Algorithm with Random Inertia Weight and Differential Mutation Operator [J]. Computer Science, 2020, 47(8): 297-301.
[10] HOU Gai, HE Lang, HUANG Zhang-can, WANG Zhan-zhan, TAN Qing. Pyramid Evolution Strategy Based on Differential Evolution for Solving One-dimensional Cutting Stock Problem [J]. Computer Science, 2020, 47(7): 166-170.
[11] BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312.
[12] LI Zhang-wei,WANG Liu-jing. Population Distribution-based Self-adaptive Differential Evolution Algorithm [J]. Computer Science, 2020, 47(2): 180-185.
[13] WANG Xuan, MAO Ying-chi, XIE Zai-peng, HUANG Qian. Inference Task Offloading Strategy Based on Differential Evolution [J]. Computer Science, 2020, 47(10): 256-262.
[14] DONG Ming-gang,LIU Bao,JING Chao. Multi-objective Differential Evolution Algorithm with Fuzzy Adaptive Ranking-based Mutation [J]. Computer Science, 2019, 46(7): 224-232.
[15] NI Hong-jie, PENG Chun-xiang, ZHOU Xiao-gen, YU Li. Differential Evolution Algorithm with Stage-based Strategy Adaption [J]. Computer Science, 2019, 46(6A): 106-110.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!