Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing
Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2020-04, Vol.79 (15-16), p.10751-10780 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 10780 |
---|---|
container_issue | 15-16 |
container_start_page | 10751 |
container_title | Multimedia tools and applications |
container_volume | 79 |
creator | Li, Zhongjin Hu, Haiyang Huang, Binbin Chen, Jie Li, Chuanyi Hu, Hua Huang, Liguo |
description | Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [
O
(1/
V
),
O
(
V
)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm. |
doi_str_mv | 10.1007/s11042-019-08557-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2395163073</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2395163073</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-769ac4009af0f28f876fbf0784d94d780b56d537fc1ef8926c00513f2f3470fa3</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-AU8Bz9FJ0jTtURa_YMGDeg7ZdLJ0adOatIj_3mgFb55mDs87Hw8hlxyuOYC-SZxDIRjwmkGllGbiiKy40pJpLfhx7mUFTCvgp-QspQMAL5UoVgRf0M2xnT6pDQ0dMfoh9jY4ZPbDRqQR0zBHh9R23eDs1A6BZoRimDCOsU1I-7mb2h6b1tI20H7YtR1SbPZI3dCP89SG_Tk58bZLePFb1-Tt_u5188i2zw9Pm9stc5LXE9NlbV0BUFsPXlS-0qXfedBV0dRFoyvYqbJRUnvH0Ve1KB2A4tILLwsN3so1uVrmjnF4nzFN5pCvD3mlEbJWvJSgZabEQrk4pBTRm_xIb-On4WC-dZpFp8k6zY_OnF4TuYRShsMe49_of1JfabB5Zg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2395163073</pqid></control><display><type>article</type><title>Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing</title><source>SpringerLink Journals - AutoHoldings</source><creator>Li, Zhongjin ; Hu, Haiyang ; Huang, Binbin ; Chen, Jie ; Li, Chuanyi ; Hu, Hua ; Huang, Liguo</creator><creatorcontrib>Li, Zhongjin ; Hu, Haiyang ; Huang, Binbin ; Chen, Jie ; Li, Chuanyi ; Hu, Hua ; Huang, Liguo</creatorcontrib><description>Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [
O
(1/
V
),
O
(
V
)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-019-08557-2</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Audio data ; Bandwidths ; Computation offloading ; Computer Communication Networks ; Computer Science ; Computer simulation ; Data Structures and Information Theory ; Data transmission ; Delay ; Edge computing ; Energy conservation ; Energy consumption ; Mobile computing ; Multimedia ; Multimedia Information Systems ; Optimization ; Optimization techniques ; Queues ; Resource allocation ; Security ; Special Purpose and Application-Based Systems ; Wireless networks</subject><ispartof>Multimedia tools and applications, 2020-04, Vol.79 (15-16), p.10751-10780</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-769ac4009af0f28f876fbf0784d94d780b56d537fc1ef8926c00513f2f3470fa3</citedby><cites>FETCH-LOGICAL-c319t-769ac4009af0f28f876fbf0784d94d780b56d537fc1ef8926c00513f2f3470fa3</cites><orcidid>0000-0002-6070-8524</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-019-08557-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-019-08557-2$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,778,782,27907,27908,41471,42540,51302</link.rule.ids></links><search><creatorcontrib>Li, Zhongjin</creatorcontrib><creatorcontrib>Hu, Haiyang</creatorcontrib><creatorcontrib>Huang, Binbin</creatorcontrib><creatorcontrib>Chen, Jie</creatorcontrib><creatorcontrib>Li, Chuanyi</creatorcontrib><creatorcontrib>Hu, Hua</creatorcontrib><creatorcontrib>Huang, Liguo</creatorcontrib><title>Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [
O
(1/
V
),
O
(
V
)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm.</description><subject>Algorithms</subject><subject>Audio data</subject><subject>Bandwidths</subject><subject>Computation offloading</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Computer simulation</subject><subject>Data Structures and Information Theory</subject><subject>Data transmission</subject><subject>Delay</subject><subject>Edge computing</subject><subject>Energy conservation</subject><subject>Energy consumption</subject><subject>Mobile computing</subject><subject>Multimedia</subject><subject>Multimedia Information Systems</subject><subject>Optimization</subject><subject>Optimization techniques</subject><subject>Queues</subject><subject>Resource allocation</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Wireless networks</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1LxDAQhoMouK7-AU8Bz9FJ0jTtURa_YMGDeg7ZdLJ0adOatIj_3mgFb55mDs87Hw8hlxyuOYC-SZxDIRjwmkGllGbiiKy40pJpLfhx7mUFTCvgp-QspQMAL5UoVgRf0M2xnT6pDQ0dMfoh9jY4ZPbDRqQR0zBHh9R23eDs1A6BZoRimDCOsU1I-7mb2h6b1tI20H7YtR1SbPZI3dCP89SG_Tk58bZLePFb1-Tt_u5188i2zw9Pm9stc5LXE9NlbV0BUFsPXlS-0qXfedBV0dRFoyvYqbJRUnvH0Ve1KB2A4tILLwsN3so1uVrmjnF4nzFN5pCvD3mlEbJWvJSgZabEQrk4pBTRm_xIb-On4WC-dZpFp8k6zY_OnF4TuYRShsMe49_of1JfabB5Zg</recordid><startdate>20200401</startdate><enddate>20200401</enddate><creator>Li, Zhongjin</creator><creator>Hu, Haiyang</creator><creator>Huang, Binbin</creator><creator>Chen, Jie</creator><creator>Li, Chuanyi</creator><creator>Hu, Hua</creator><creator>Huang, Liguo</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-6070-8524</orcidid></search><sort><creationdate>20200401</creationdate><title>Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing</title><author>Li, Zhongjin ; Hu, Haiyang ; Huang, Binbin ; Chen, Jie ; Li, Chuanyi ; Hu, Hua ; Huang, Liguo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-769ac4009af0f28f876fbf0784d94d780b56d537fc1ef8926c00513f2f3470fa3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Audio data</topic><topic>Bandwidths</topic><topic>Computation offloading</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Computer simulation</topic><topic>Data Structures and Information Theory</topic><topic>Data transmission</topic><topic>Delay</topic><topic>Edge computing</topic><topic>Energy conservation</topic><topic>Energy consumption</topic><topic>Mobile computing</topic><topic>Multimedia</topic><topic>Multimedia Information Systems</topic><topic>Optimization</topic><topic>Optimization techniques</topic><topic>Queues</topic><topic>Resource allocation</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Zhongjin</creatorcontrib><creatorcontrib>Hu, Haiyang</creatorcontrib><creatorcontrib>Huang, Binbin</creatorcontrib><creatorcontrib>Chen, Jie</creatorcontrib><creatorcontrib>Li, Chuanyi</creatorcontrib><creatorcontrib>Hu, Hua</creatorcontrib><creatorcontrib>Huang, Liguo</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Zhongjin</au><au>Hu, Haiyang</au><au>Huang, Binbin</au><au>Chen, Jie</au><au>Li, Chuanyi</au><au>Hu, Hua</au><au>Huang, Liguo</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2020-04-01</date><risdate>2020</risdate><volume>79</volume><issue>15-16</issue><spage>10751</spage><epage>10780</epage><pages>10751-10780</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [
O
(1/
V
),
O
(
V
)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-019-08557-2</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0002-6070-8524</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2020-04, Vol.79 (15-16), p.10751-10780 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2395163073 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Audio data Bandwidths Computation offloading Computer Communication Networks Computer Science Computer simulation Data Structures and Information Theory Data transmission Delay Edge computing Energy conservation Energy consumption Mobile computing Multimedia Multimedia Information Systems Optimization Optimization techniques Queues Resource allocation Security Special Purpose and Application-Based Systems Wireless networks |
title | Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T17%3A48%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20and%20performance-aware%20resource%20allocation%20for%20enterprise%20multimedia%20in%20mobile%20edge%20computing&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Li,%20Zhongjin&rft.date=2020-04-01&rft.volume=79&rft.issue=15-16&rft.spage=10751&rft.epage=10780&rft.pages=10751-10780&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-019-08557-2&rft_dat=%3Cproquest_cross%3E2395163073%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2395163073&rft_id=info:pmid/&rfr_iscdi=true |