Resource allocation and computation offloading with data security for mobile edge computing

Ibrahim A. Elgendy, Weizhe Zhang*, Yu Chu Tian, Keqin Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

122 Scopus citations

Abstract

With the considerable growth of mobile users (MUs) and IoT devices, complex applications and multimedia services are rapidly increasing, thereby requiring additional computations and high data communication. However, these devices are still resource-constrained with limited computation power and energy. Furthermore, security is considered a critical issue for sensitive information communication. This study presents a multiuser resource allocation and computation offloading model with data security to address the limitations of such devices. First, the computation and radio resources are jointly considered for multiuser scenarios to guarantee the efficient utilization of shared resources. In addition, an AES cryptographic technique is introduced as a security layer to protect sensitive information from cyber-attacks. Furthermore, an integrated model, which jointly considers security, computation offloading, and resource allocation, is formulated to minimize time and energy consumption of the entire system. Finally, an offloading algorithm is developed with detailed processes to determine the optimal computation offloading decision for MUs. Simulation results show that our model and algorithm can significantly improve the performance of the entire system compared with local execution and full offloading schemes.

Original languageEnglish
Pages (from-to)531-541
Number of pages11
JournalFuture Generation Computer Systems
Volume100
DOIs
StatePublished - Nov 2019
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2019 Elsevier B.V.

Keywords

  • Computation offloading
  • Internet of Things (IoT)
  • Mobile-edge computing
  • Optimization
  • Security

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Resource allocation and computation offloading with data security for mobile edge computing'. Together they form a unique fingerprint.

Cite this