Slicing-based reliable resource orchestration for secure software-defined edge-cloud computing systems

  • Jianhang Tang
  • , Jiangtian Nie*
  • , Zehui Xiong
  • , Jun Zhao
  • , Yang Zhang
  • , Dusit Niyato
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

26 Citations (Scopus)

Abstract

The edge-cloud computing and network slicing have emerged as promising solutions to fulfill the diversity of IoT applications enabled by 5G and beyond. However, edge-cloud computing systems are composed of various hardware facilities, leading to difficulties in hardware control and management. With network slicing, underlying resource sharing among multiple slice users is allowed, leading to potential attacks to the slice formulation processes and malicious usage of network slices that may result in inefficient resource utilization of the system. To address the aforementioned network slice security issue, we first propose a new systematic framework, named software-defined edge-cloud computing (SD-ECC), which applies standard software to control the hardware infrastructure regardless of vendor variations. With SD-ECC, resource slices are formulated by including storage and computational resources provided by edge and cloud servers. Then, we study an optimal slicing-based resource orchestration problem by considering slice-initiated attacks as possible adversaries, which includes both interslice and intraslice resource orchestrations. A secure slicing-based resource orchestration (SS-RO) algorithm is designed by minimizing the delay and resource utilization simultaneously to mitigate the impacts of the slice-initiated attacks, where the Benders decomposition is employed to obtain the interslice orchestration outcome, and a quadratic transformation method is applied to derive the intraslice orchestration solution. The experimental results demonstrate that the proposed SS-RO algorithm outperforms baseline schemes in terms of the ratio of accepted attacking tasks, energy consumption, and system throughput.

Original languageEnglish
Pages (from-to)2637-2648
Number of pages12
JournalIEEE Internet of Things Journal
Volume9
Issue number4
Early online date25 Aug 2021
DOIs
Publication statusPublished - 15 Feb 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Data analytics
  • Network slicing
  • Resource orchestration
  • Slicing security

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Slicing-based reliable resource orchestration for secure software-defined edge-cloud computing systems'. Together they form a unique fingerprint.

Cite this