• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于信任度的数据处理卸载的安全多层移动边缘计算模型。

A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust.

机构信息

Department of Computer Technology and Computation, University of Alicante, 03690 Alicante, Spain.

Department of Information Technology, Ghent University, 9052 Ghent, Belgium.

出版信息

Sensors (Basel). 2018 Sep 23;18(10):3211. doi: 10.3390/s18103211.

DOI:10.3390/s18103211
PMID:30249043
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6210598/
Abstract

Current mobile devices need to run applications with high computational demands and critical response times. The mobile edge computing (MEC) paradigm was developed to improve the performance of these devices. This new computation architecture allows for the mobile devices to execute applications on fog nodes at the network edge; this process is called data processing offloading. This article presents a security model for the externalization of application execution in multi-tier MEC environments. The principal novelty of this study is that the model is able to modify the required security level in each tier of the distributed architecture as a function of the degree of trust associated with that tier. The basic idea is that a higher degree of trust requires a lower level of security, and vice versa. A formal framework is introduced that represents the general environment of application execution in distributed MEC architectures. An architecture is proposed that allows for deployment of the model in production environments and is implemented for evaluation purposes. The results show that the security model can be applied in multi-tier MEC architectures and that the model produces a minimal overhead, especially for computationally intensive applications.

摘要

当前的移动设备需要运行具有高计算需求和关键响应时间的应用程序。移动边缘计算 (MEC) 范例的开发是为了提高这些设备的性能。这种新的计算架构允许移动设备在网络边缘的雾节点上执行应用程序;这个过程称为数据处理卸载。本文提出了一种用于在多层 MEC 环境中进行应用程序执行外部化的安全模型。这项研究的主要新颖之处在于,该模型能够根据与该层相关联的信任度来修改分布式架构中每个层所需的安全级别。基本思想是,更高的信任度需要更低的安全性,反之亦然。引入了一个正式框架,该框架代表了分布式 MEC 架构中应用程序执行的一般环境。提出了一种架构,允许在生产环境中部署该模型并进行评估目的的实现。结果表明,安全模型可应用于多层 MEC 架构,并且模型产生的开销很小,特别是对于计算密集型应用程序。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/94745a4a8f5e/sensors-18-03211-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/3bb341a1ebe8/sensors-18-03211-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/02f98e628318/sensors-18-03211-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/c71ef1bc8e1f/sensors-18-03211-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/5cd0e170298b/sensors-18-03211-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/d356d1d54891/sensors-18-03211-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/5b1bee5bb23a/sensors-18-03211-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/4f40969b6634/sensors-18-03211-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/94745a4a8f5e/sensors-18-03211-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/3bb341a1ebe8/sensors-18-03211-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/02f98e628318/sensors-18-03211-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/c71ef1bc8e1f/sensors-18-03211-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/5cd0e170298b/sensors-18-03211-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/d356d1d54891/sensors-18-03211-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/5b1bee5bb23a/sensors-18-03211-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/4f40969b6634/sensors-18-03211-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/86c9/6210598/94745a4a8f5e/sensors-18-03211-g008.jpg

相似文献

1
A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust.基于信任度的数据处理卸载的安全多层移动边缘计算模型。
Sensors (Basel). 2018 Sep 23;18(10):3211. doi: 10.3390/s18103211.
2
A survey of security, privacy and trust issues in vehicular computation offloading and their solutions using blockchain.车载计算卸载中的安全、隐私和信任问题调查及其区块链解决方案
Open Res Eur. 2023 Oct 25;3:110. doi: 10.12688/openreseurope.16189.2. eCollection 2023.
3
An integrated three-tier trust management framework in mobile edge computing using fuzzy logic.一种基于模糊逻辑的移动边缘计算中的集成三层信任管理框架。
PeerJ Comput Sci. 2021 Sep 15;7:e700. doi: 10.7717/peerj-cs.700. eCollection 2021.
4
Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks.基于模糊决策的多层边缘计算网络高效任务卸载管理方案
Sensors (Basel). 2021 Feb 20;21(4):1484. doi: 10.3390/s21041484.
5
Energy-Aware and Secure Task Offloading for Multi-Tier Edge-Cloud Computing Systems.面向多层边缘云计算系统的节能与安全任务卸载
Sensors (Basel). 2023 Mar 20;23(6):3254. doi: 10.3390/s23063254.
6
An Efficient Computation Offloading Strategy with Mobile Edge Computing for IoT.一种用于物联网的基于移动边缘计算的高效计算卸载策略。
Micromachines (Basel). 2021 Feb 17;12(2):204. doi: 10.3390/mi12020204.
7
HAGP: A Heuristic Algorithm Based on Greedy Policy for Task Offloading with Reliability of MDs in MEC of the Industrial Internet.基于贪心策略的启发式算法用于工业互联网中移动边缘计算的 MDs 可靠性的任务卸载。
Sensors (Basel). 2021 May 18;21(10):3513. doi: 10.3390/s21103513.
8
Task Offloading Based on Lyapunov Optimization for MEC-Assisted Vehicular Platooning Networks.基于李雅普诺夫优化的移动边缘计算辅助车联网的任务卸载。
Sensors (Basel). 2019 Nov 15;19(22):4974. doi: 10.3390/s19224974.
9
Computation Offloading and User-Clustering Game in Multi-Channel Cellular Networks for Mobile Edge Computing.多通道蜂窝网络中用于移动边缘计算的计算卸载和用户聚类博弈
Sensors (Basel). 2023 Jan 19;23(3):1155. doi: 10.3390/s23031155.
10
Multi-Server Multi-User Multi-Task Computation Offloading for Mobile Edge Computing Networks.移动边缘计算网络中的多服务器多用户多任务计算卸载。
Sensors (Basel). 2019 Mar 24;19(6):1446. doi: 10.3390/s19061446.

引用本文的文献

1
Possible Applications of Edge Computing in the Manufacturing Industry-Systematic Literature Review.边缘计算在制造业中的可能应用——系统文献综述。
Sensors (Basel). 2022 Mar 22;22(7):2445. doi: 10.3390/s22072445.
2
Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing.基于分层边缘计算的大视频数据存储智能隐私保护
Sensors (Basel). 2020 Mar 10;20(5):1517. doi: 10.3390/s20051517.
3
Nanosystems, Edge Computing, and the Next Generation Computing Systems.纳米系统、边缘计算和下一代计算系统。

本文引用的文献

1
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks.两层移动无线传感器网络中保障时空Top-k查询的两种典型方案的比较研究
Sensors (Basel). 2018 Mar 15;18(3):871. doi: 10.3390/s18030871.
2
Service Migration from Cloud to Multi-tier Fog Nodes for Multimedia Dissemination with QoE Support.支持QoE的多媒体传播从云到多层雾节点的服务迁移
Sensors (Basel). 2018 Jan 24;18(2):329. doi: 10.3390/s18020329.
3
Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
Sensors (Basel). 2019 Sep 19;19(18):4048. doi: 10.3390/s19184048.
群体感知助力社交雾计算系统的安全服务推荐
Sensors (Basel). 2017 Jul 30;17(8):1744. doi: 10.3390/s17081744.
4
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.一种雾计算-云计算环境下的安全可验证外包访问控制方案
Sensors (Basel). 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695.
5
A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.一种基于雾计算的车载自组网中使用空间众包的安全与隐私保护导航方案。
Sensors (Basel). 2017 Mar 24;17(4):668. doi: 10.3390/s17040668.