Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 1

Joint Optimization of Offloading Utility and Privacy


for Edge Computing Enabled IoT
Xiaolong Xu, Member, IEEE, Chengxun He, Zhanyang Xu, Lianyong Qi*, Member, IEEE,
Shaohua Wan, Senior Member, IEEE and Md Zakirul Alam Bhuiyan, Senior Member, IEEE

Abstract—Currently, edge computing, emerging as a burgeon- to cloud data center for supporting massive data analytics and
ing paradigm, is powerful to handle real-time resource provision application execution [3].
for the IoT applications. However, due to the spatial distribution However, with the continuous explosion and expansion of
of the geographically sparse IoT devices and the resource limita-
tions of the edge computing units (ECUs), the resource utilization IoT devices, a huge volume of raw data is generated [4].
of corresponding edge servers is relatively insufficient, and the According to a recent survey by Gartner, the total number
execution performance is ineffective to some extent. Meanwhile, of connected devices in 2020 will reach 20.8 billion [5].
privacy leakage including personal information, location and This proliferation of devices and associated data streams has
media data, etc., during the transmission process from IoTs put a huge burden on IoT infrastructures [6]. Consequently,
devices to edge servers severely restricts the application of ECUs
in IoT. To address these challenges, a two-phase offloading it is inadequate to process computation tasks efficiently for
optimization strategy is put forward for joint optimization of cloud computing on account of the ever-growing bandwidth
offloading utility and privacy in edge computing enabled IoT. pressure resulted from data transmission [7]. On the other
Technically, a utility-aware task offloading method, named UTO, side, the cloud is always placed in the center of the network
is devised first to obtain the goal of maximizing the resource and remote from the IoT devices, which causes high latency
utilization of ECUs and minimizing the implementation time cost.
Then a joint optimization method, named JOM, for utility and and transmission energy consumption [8]. In particular, cloud
privacy trade-offs is designed to balance the privacy preservation computing is unsuitable for the IoT applications with real-time
and execution performance. Eventually, experimental evaluations restrictions, e.g., data processing in the Internet of Vehicles.
are designed to illustrate the efficiency and reliability of UTO and Even if there are no stringent timing constraints for the IoT
JOM. applications, uploading all the colossal data to remote cloud
Index Terms—Privacy, Utility, IoT, Edge Computing, Offload- directly also induce vast liability on the Internet [9].
ing A promising philosophy that emerges recently, i.e., edge
computing (EC), is powerful to solve the current problems
I. I NTRODUCTION where resource provisioning are pushed from the cloud infras-
Internet of Things (IoT) is expected to efficiently improve tructure to the edge of the Internet [10]. In the EC philosophy,
the performance of software services through supporting mul- the smart IoT devices at the edge of the Internet are not
tiple intelligence fields like modern medical, digital home only the data producer but also service provider. Benefiting
and smart transportation [1]. Generally, embedded IoT devices from EC, an extensive scope of IoT devices resoundingly
are insufficient to hold the computation-intensive tasks, e.g., gain the requested resources in real-time by migrating their
tanglesome data mining and high definition video decoding. computation-intensive tasks to ECUs for execution, known as
To satisfy the computation and storage requests of the tasks computation offloading [11]. Computation offloading settles
generated by IoT devices, cloud computing has become the the problem of latency and bandwidth efficiently, and improve
most fashionable computation philosophy for dealing with the quality and availability of the services provided by luxu-
these assignments [2]. A convenient implementation manner rious IoT devices [12].
for the process of these tasks is transmitting all generated data Nevertheless, since the data generated by the IoT devices
becomes more and more complex, ECUs need to withstand
X. Xu, C. He and Z. Xu are with the School of Computer and Software, more pressure inevitably. At the same time, the disclosure of
Nanjing University of Information Science and Technology, Nanjing, China. sensitive information is a great calamity, particularly in the
X. Xu is with Jiangsu Engineering Center of Network Monitoring, Nanjing
University of Information Science and Technology, Nanjing, China. running of IoT [13]. During the transmission process from IoT
Email: njuxlxu@gmail.com,cxunhey@gmail.com,zhanyang xu@nuist.edu.cn devices to ECUs, a series of unexpected leakages of sensitive
L. Qi is with the School of Information Science and Engineering, Qufu data, e.g., user location, telephone number, and personal
Normal University, China.
E-mail: lianyongqi@gmail.com (corresponding author) picture, makes the computation offloading more sophisticated
S. Wan is with School of Information and Safety Engineering, Zhongnan [14]. Although the applying of EC intellectualizes the use of
University of Economics and Law, Wuhan, China. IoT devices, privacy information leakage still demands to be
E-mail: shaohua.wan@ieee.org
M. Z. A. Bhuiyan is with the Department of Computer and Information considered as a critical problem [15]. With these observations,
Sciences, Fordham University, New York, NY 10458 USA. it remains challenging to improve the implementation utility,
E-mail: zakirulalam@gmail.com including the resource utilization and time consumption of
Copyright (c) 20xx IEEE. Personal use of this material is permitted.
However, permission to use this material for any other purposes must be ECUs, and achieve privacy preservation simultaneously. Given
obtained from the IEEE by sending a request to pubs-permissions@ieee.org. this challenge, a two-phase offloading optimization strategy is

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 2

designed to jointly optimize the offloading utility and ensure


privacy protection for EC enabled IoT. Cloud layer

The main contributions of this paper are summarized as:


• The ECUs resource utilization model and the time cost Edge layer
model are constituted under the IoT offloading architec- ...
ture in cloud-edge computing. ...
• A utility-aware computation offloading method, named
UTO, is devised first to obtain the goal of maximizing
the resource utilization of ECUs and minimizing the
implementation time cost. IoT layer ...
• A joint optimization method, named JOM, for utility
and privacy trade-offs is designed to balance the privacy
preservation and execution performance. - Cloud Data Center - Access Point - IoT Devices

• Conduct experimental evaluation and comparison analysis - Edge Server - Data Offloading - Edge Computing Unit

to illustrate the efficiency and reliability of our proposed


methods. Fig. 1: A system offloading architecture for IoT in cloud-edge
computing.
The remainder of this paper is organized as follows. In
Section II, we list the related work. Then, resource model
of utility-aware task offloading is defined in Section III. B. ECU Resource Utilization Model
The method dedicated to solve this model is proposed in
section IV. Furthermore, a joint optimization method for utility Resource utilization is a pivotal indicator to measure the
and privacy trade-offs is raised in section V. Experimental enforcement of the ECUs which can be reflected by the usage
evaluation is presented in Section VI. Eventually, conclusion of VM instances to a certain extent in the virtualized platforms
and future works are drawn in Section VII. [16]. In this paper, to efferently manage the heterogeneous
edge servers and answer the wide variety of task demands,
the virtualized technique is exercised. Denote αm as the total
II. R ELATE W ORK amount of VM instances for the m-th (m = 1, 2, ..., M ) edge
server sm . Benefiting from the virtualized technique, all the
Due to limited space in this paper, we have provided the edge servers in the same ECU can be treated as a big edge
related work in Appendix A of a supplementary file. server, then the total amount of available VM instances, i.e.,
the capacity of ECU, for cw (w = 1, 2, ..., W ) is calculated
by
III. S YSTEM D ESIGN M
X
w
λw = αm · δm , (1)
A. Offloading Architecture and Resource Model
m=1
Currently, the ever-evolving paradigms, including cloud where δmw
is a binary variable to estimate whether sm locates in
computing and edge computing have presented advantageous w
cw . Specifically, δm = 1 means sm locates in cw , and δm w
=0
power to improve the Quality of Service (QoS). To efficiently means sm dose not locates in cw .
provision the real-time services for the IoT applications, the
With the capacity of the ECUs, the resource utilization of
ECUs, with limited computing power, are placed dispersedly.
cw is deduced as
Fig. 1 reveals a system offloading architecture for IoT in cloud-
edge computing, consisted of three layers, i.e., IoT layer, edge M
1 XX
N
n w
layer and cloud layer. uw (X) = βn · fm (X) · δm , (2)
λw m=1 n=1
Denote the IoT devices collection as D = {d1 , d2 , · · · , dN },
where N is the total amount of devices in D. Hypothesize where βn is the demanded amount of VM instances for tn .
each IoT device submits just one task, the IoT tasks are At last, fmn
(X) stands for a binary variable aiming to judge
denoted as T = {t1 , t2 , · · · , tN }. Denote the ECU collection whether tn is hosted in sm , which is determined by
as C = {c1 , c2 , · · · , cW } where W is the total amount of
ECUs in C. Each ECU is composed of an access point (AP)

n 1, tn is deployed on sm ,
and multiple assembled edge servers. Accordingly, there are fm (X) = . (3)
0, otherwise.
W APs, denoted as P = {p1 , p2 , · · · , pW }, and M edge
servers, denoted as S = {s1 , s2 , · · · , sM }. The task mirrors Then to obtain the goal resource utilization of all the ECUs,
and carried information are transmitted to the edge servers the occupied volume of all the ECUs should be identified,
through the APs. denoted as γ(X), which is determined by
Invite X = {x1 , x2 , · · · , xN } to be the ultimate optimal W
deployment strategy for T , where xn ∈ C(n = {1, 2, · · · , N }) X
γ(X) = gw (X), (4)
is the location which the task tn is placed on eventually. w=1

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 3

where gw (X) is used to mark the occupation status of cw , length, the amount of employed VMs, and the processing per-
defined by formance of each VM instances. The processing performance
 of each VM is denoted as p and the instruction length for tn
1, cw is occupied,
gw (X) = (5) is denoted as mipsn, then the time cost of process is obtained
0, otherwise.
by
With the resource utilization of each ECU by (2) and the N
X mipsn
total occupied amount of ECUs by (4), the average resource Kexe (X) = . (12)
λn · p
utilization of all the ECUs is acquired by n=1
PW After task processing, the corresponding result data will be
uw (X)
U (X) = w=1 . (6) generated, which should be transmitted to the IoT devices and
γ(X)
the data center. The feedback time of the results for tn from
C. Time Cost Model of Tasks in IoT the edge server to the IoT devices also consists of three parts
which are similar to the task transmission time. Denote πn as
Time cost for implementing the tasks is the main concern for the data size of the feedback results, then the three parts (i.e.,
the IoT customers [17] [18]. With shorter time consumption, the data transmission time from edge server to AP, the data
comes better QoS. The time consumption mainly comprises transmission time among APs, and the data transmission time
four parts, i.e., the migration cost through APs, the process from AP to the IoT device) of feedback time are calculated
time in the ECU, the feedback time for returning the result by
data, and the offloading time from edge servers to the cloud πn
ZnEA (xn ) = , (13)
data center. ωA2E
The migration time for the tasks to the target ECUs is
divided into three parts, i.e., the transmission time from IoT πn · (σn (xn ) + 1)
ZnAP (xn ) = (14)
device to AP, the transmission time among APs, and the ωA2A
transmission time from AP to edge server.
and
The transmission time of tn from the IoT device to AP is πn · (σn (xn ) + 1)
defined by ZnAP (xn ) = . (15)
θn ωA2A
KnDA (xn ) = , (7) Then the total data feedback time is determined by
ωD2A
where θn is the image size of tn needs migration and ωD2A Znreturn (xn ) = ZnDA (xn ) + ZnAP (xn ) + Ztrans
AE
(xn ). (16)
is the data transmission rate between the IoT device and AP.
The task image should be transferred across multiple APs The execution results also demand to be transmitted to the
from the original edge server to the destination one. Suppose cloud for storage, therefore the time of data transmission from
the amount of the passing APs is denoted as σn (xn ), then the the edge server to the cloud platform is calculated by
transmission time for tn to pass through APs is calculated by πn πn
GCloud
n (xn ) = + . (17)
θn · (σn (xn ) + 1) ωA2E ωA2C
KnAP (xn ) = , (8)
ωA2A As the feedback process from the edge servers to the IoT
where ωD2A is the data transmission rate between two con- devices is concurrent with the uploading process from the edge
nected APs. servers to the cloud, the overall data offloading time for tn is
Then the task image should be transmitted from the desti- calculated by
nation AP to the goal edge server. The relevant transmission Knof f (xn ) = max{Znreturn (xn ), GCloud (xn )}. (18)
n
time for tn is calculated by
θn Correspondingly, the total data offloading time for all the
AE
Ktrans (xn ) = , (9) tasks is defined by
ωA2E
N
where ωD2A is the data transmission rate from the edge server X
to AP. K of f (X) = Knof f (xn ). (19)
From (7), (8) and (9), the total time cost of transmission for n=1

tn from the IoT device to the target edge server is calculated In summary, the total amount of time consumption is
by calculated by
Kntrans (xn ) = KnDA (xn ) + KnAP (xn ) + Ktrans
AE
(xn ). (10) K(X) = K trans (X) + K of f (X). (20)
Then the overall time cost of transmission is calculated by
N IV. A U TILITY-AWARE TASK O FFLOADING M ETHOD
X
trans
K (X) = Kntrans (xn ). (11) In this section, a NSGA-III based utility-aware task offload-
n=1 ing method for EC enabled IoT, named UTO, is devised first
When the task image is transferred, the task starts execution to obtain the goal of maximizing the resource utilization of
immediately. The processing time is decided by the instruction ECUs and minimizing the implementation time cost.

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 4

A. Objective Formulation 4) Crossover and Mutation: The operation of crossover


From the last section, the resource utilization and the total is performed to produce new individuals by bonding two
time cost are defined. The purpose of this section is to accom- chromosomes. That means two chromosomes exchange their
plish the goal of maximizing the average resource utilization genes around a determined crossover point, which generates
and minimizing the total time consumption. The objective the new chromosomes.
problem in a formal way with the concomitant constraints is The operation of mutation changes the genes to produce
defined as new individuals which has better values of fitness. Every gene
max(U (X)), min(K(X)). (21) in the chromosome is altered with same probability. This
vital operation is leveraged to ensure the diversity of different
N individual and the equal mutation probability of each gene.
5) Selection: Selecting the chromosomes for the next popu-
X
n
s.t. βn · fm (X) < αm , (22)
n=1
lation is our primary purpose, which generates the individuals
W
of higher fitness values. When the operation of crossover and
X mutation is accomplished, the size of population is doubled.
0≤ gw (X) ≤ M (23)
In order to ensure the next generation, until the amount of the
w=1
picked solutions become two times of P Z, the solutions for
The constraint (22) means the summation of VMs demanded offspring are selected randomly in the largest non-domination
by the tasks on the m-th ECU should meet the limit amount of front. Through minimizing of the time consumption and max-
VMs on this ECU. The constraint (23) means the summation imizing of the resource utility, the fitness value of individuals
of employed ECUs should be limited between 0 and M . could be normalized.
After the operation of normalization, the fitness values of
B. Utility-Aware Offloading Based on NSGA-III the resource utilization and the time consumption are restricted
As illustrated in (21), maximizing the average resource in [0,1). The feasible solutions for the offspring has achieved
utilization and minimizing the overall time consumption are a 2-dimensional hyperplane. Hence, in the 2-dimensional
defined as an optimization problem with multiple objectives. hyperplane, a group of reference points with the normalized
The NSGA-III algorithm is an efficient instrument for solving solutions are divided. The solutions are legitimately sorted in
multi-objective optimization problems [19]. In this section, the non-dominated front, by the amount of related reference
NSGA-III is applied to solve the defined problem. Due to points. All of the solutions are selected randomly with opti-
limited space in this paper, we have provided the procedure mum number of associated reference points repeatedly over
of utility-aware offloading method based on NSGA-III in multiple runs until all the solutions have been picked. By
Appendix B of a supplementary file. enforcing the operation of selection, the optimal solution are
1) Encoding: The offloading strategy for tasks is encoded selected for the descendant.
firstly. In genetic algorithm (GA), computation offloading
strategy is figured by gene, all of the genes compromise the C. Offloading Strategy Selection Using SAW and MCDM
chromosome. A batch of genes constitutes a chromosome, Due to limited space in this paper, we have provided this
which indicates the selected outcome of the offloading strate- subsection in Appendix C of a supplementary file.
gies.
2) Fitness Functions and Constraints: After the operation
D. UTO Overview
of encoding, the fitness functions are leveraged as decision
criterions to identify appropriate solution. An individual chro- The overview of the NSGA-III based UTO is illustrated
mosome is a offloading strategy, which represents a viable in Algorithm 1 which demands the maximum of iteration R
outcome of the objective problem we defined. Furthermore, and outputs the candidate computation offloading strategy X.
the fitness functions of objective problem involve two different First, we obtain the tasks generated by the IoT devices at line
types: the average resource utilization for each ECU and 1. Then, crossover and mutation operation is activated at line
total time cost for each computing task, which are indicated 5 and 6, the calculation of the fitness functions is executed
by (6) and (20) separately. The purpose of this algorithm at lines 7 to 10. After that, the optimal individuals for ensure
is to select the optimal solution to optimize the presented the offspring is picked at line 10. Furthermore, the maximum
fitness functions. In this method, in order to optimize the time utility values of the schedule strategy are calculated at line 14
consumption and the resource utilization, a hybrid offloading and 15. The whole procedure is reproduced until the maximum
strategy is explored. The corresponding constraints are indi- number of iterations are reached. Eventually, the candidate
cated by (22) and (23). strategy with higher fitness value is selected.
3) Initialization: The related elements of genetic algorithm
is decided in the process of initialization, including the possi- V. A J OINT O PTIMIZATION M ETHOD FOR U TILITY AND
bility of mutation M P , the population size P Z, the crossover P RIVACY T RADE -O FFS
possibility CP , and the maximum of iteration R. In the Privacy data may be intercepted by the criminals advisedly
parallel schedule of genetic algorithm, chromosome indicates during the transmission of computing tasks, which results in
the collection of offloading strategies, which is denoted as the sensitive data divulgation. In order to ensure the trans-
U Si = (us1 , us2 , ...usN ). mission security of computation offloading for IoT devices,

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 5

Algorithm 1 Generating candidate computation offloading Then, the correlation of tn,l and pn,l is demonstrated by
strategies by UTO    
tn tn,1 tn,2 · · · tn,l
Require: R = . (26)
Pn pn,1 pn,2 · · · pn,l
Ensure: X
1: Obtain computing tasks from IoT devices The average implementation time of l-th type of privacy
2: for i = 1 to I do data is calculated by
3: r=1 N L
while r <= R do 1 X X θn,l
4: K 0 (t) = pn,l (27)
5: Crossover operations to generate the offspring N n=1 ω
l=1
6: Mutation operations to ensure the offspring
7: for Individuals in population do where θn,l represent the size of l-th type data in computing
8: Calculate resource utilization by (1) to (6) task tn and ω is the data process rate from IoT devices to
9: Calculate total time consumption by (7) to (20) ECUs,
10: end for Invite Y = {y(t1 ), y(t1 ), · · · , y(tn )} to represent the value
11: Environmental selection operation to ensure the of entropy for the computing tasks collection in T . The privacy
offspring entropy value of tn is calculated as
12: r=r+1 L
X
13: end while y(tn ) = − pn,l · log2 pn,l . (28)
14: Evaluate utility value of the individuals with SAW and l=1
MCDM Therefore, the correlation of the optimal strategy X and the
15: Select the optimal solution entropy value Y is demonstrated by
16: end for    
17: return X X x1 x2 · · · xn
= . (29)
Y y(t1 ) y(t2 ) · · · y(tn )
Eventually, the summation of privacy entropy value of all
the computing tasks, which are waiting to be transmitted, are
transmitted data generated by the computing tasks placed in
divided into several parts. By this way, even if some parts
xn is obtained as
of the computing tasks are intercepted, the criminals could
obtain the whole information in the computing tasks. Entropy N
1 X
is actually a measure of disorder, with more types of data y(t) = y(tn ). (30)
N n=1
are cut, comes higher level of randomness. Higher the level
of randomness is, safer the computing computing tasks are.
However, the high entropy results in some problems such as B. Privacy Formulation
how to deploy the tasks in the same breath to improve the In this section, our purpose is to achieve the goal of
average resource utilization and transmission time. Therefore, maximizing the privacy entropy and minimizing the average
how to optimize the trade-off between the privacy entropy and transmission time of privacy data as possible as we can. The
the deployment strategy of computing tasks is resolved in this objective problem of formalization is defined as
section.
max(Y (t)), min(K 0 (t)), (31)
A. Privacy Entropy Model And the concomitant constraint is defined as
As described in section II , there are N IoT devices L
and computing tasks denoted as D and T respectively. The
X
s.t. pn,l = 1. (32)
relationship between the optimal strategy X and the placed l=1
computing tasks T is demonstrated by
   
X x1 x2 · · · xn VI. C OMPARISON AND A NALYSIS OF E XPERIMENTAL
= . (24)
T t1 t2 · · · tn RESULTS

Based on the theory of information entropy, the data of A. Experimental Context


computing task tn generated by the device dn solicit to be In the experiment, the Shinelon Y-7000 PC is deployed
transmitted is divided into L types to balance the data size and as the edge servers to form the ECUs. Main disposition of
calculate the probability of transmitting the l-th type data. De- this PC we choose are Intel Core I5-8400H with Turbo Boos
noted the divided data collection as tn = {tn,1 , tn,2 , · · · , tn,l }, technology, 8 GB of Micron RAM, and 250GB of SAMSUNG
where tn,l represents the l-th data of computing tasks tn 970 evo plus solid drive. In Table II, six vital notations
deployed in xn and λ represents the parameter of Poisson and the scope of the values applied in our experiment is
distribution. The probability of delivering tn,l follows the illustrated [20]. In order to accomplish the effectiveness of this
Poisson distribution which is defined by experiment, five different amount of IoT devices to produce
λtn,l −λ computing tasks with diverse scope. The numbers of IoT
pn,l = e , l = 0, 1, 2, · · · , L. (25) devices are set as 100, 200, 300, 400, and 500 respectively.
tn,l !

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 6

TABLE I: Key notations of employed VMs in each ECU and the number of used
ECUs. Fig. 3 describes the average resource utilization based
Notations Description Notations value
The amount of IoT devices 100,200,300,400,500
on Benchmark, NF, FF and UTO in different scales of tasks.
The amount of VMs on each server 7 It is clear that UTO performs well while NF method performs
The transmission rate between APs 450 Mbit/s worst in all scales of tasks. It is concluded that UTO max-
The transmission rate between AP and edge server 500 Mbit/s
The transmission rate between AP and data Center 550 Mbit/s
imizes the resource utilization of ECU, and the computing
The transmission data of VM [0.5GB,0.8GB] resources are saved.
The transmission data of VM [0.5GB,0.8GB]
The probability of delivering l-th type data [0, 1] 1.2
Benchmark
NF
1 FF

Average resource utilization


UTO

Aiming to ensure the comprehensiveness and impartiality 0.8

of this experiment, three basic methods are leveraged to make 0.6


comparisons with our UTO and JOM methods.
• Benchmark: Tasks is offloaded to the ECU that covers 0.4

the corresponding IoT devices. When the former ECU 0.2


has no enough idle space to perform next task, this task
is deployed on the following edge server. This procedure 0
100 200 300 400 500
is reproduced until all the tasks are offloaded. The number of tasks
• Next Fit (NF): Search the free location in next ECU every
Fig. 3: Comparison analysis of average resource utilization
times, deploy present task in this ECU. This procedure
with diverse task ranges by Benchmark, NF, FF and UTO.
is reproduced until all the tasks are offloaded [21].
• First Fit (FF): Search from the first free location in ECU,
deploy the task in this area that meets the requirements. 3) Total Time consumption: The total time cost consists
If this ECU still has enough room, then deploy next task of migration time, process time, feedback time and offloading
on it. This procedure is reproduced until all the tasks are time. The process time and the offloading time is equal, and the
offloaded [22]. two value is not evaluated. The total time affects the experience
of customers. In addition, the low latency is significant to the
Information industry. Based on the analyze of Fig. 4, the total
B. Performance Evaluation
time in our proposed method is 15.39, 31.83, 51.26, 62.12
1) The Amount of Employed ECUs: The amount of em- and 75.50 (s), and the total time is the least compared with
ployed ECUs by the methods Benchmark, NF, FF and UTO the other three methods.
are analyzed and compared in Fig. 2. It is distinct that the
employed ECUs by UTO is fewer compared with the other 100.00
three methods under any circumstances. When the number of 90.00
Benchmark
NF
the task is 100, the disparity between the four methods is thin. 80.00 FF
UAP
However, as the amount of tasks growth, the disparity between 70.00
Total Time 澻瀆澼

them becomes pronounced, which means that UTO performs 60.00


better. Based on the analysis, NF method performs worst, and 50.00

our proposed method UTO performs best. 40.00


30.00
600 20.00
Benchmark
NF 10.00
The number of employed ECUs

500 FF
UTO 0.00
100 200 300 400 500
400
The number of tasks

300

200
Fig. 4: Comparison analysis of total time cost with diverse
task ranges by Benchmark, NF, FF and UTO.
100

0 4) Migration Time consumption: Likewise, the migration


100 200 300 400 500 time, which is an important part of the total time, needs
The number of tasks
to be evaluated. Fig. 5 shows the comparison analysis of
Fig. 2: Comparison analysis of the amount of employed ECUs migration time using Benchmark, NF, FF and UTO with
with diverse task ranges by Benchmark, NF, FF and UTO. different scales of ECUs. The migration time indicates the time
consumed by the tasks migration between ECUs. Therefore,
2) Average Resource Utilization: The average resource the appropriate migration route, which needs to be optimized,
utilization, which is a significant standard on behalf of the makes contributions to the migration time. Based on the
resource occupancy among ECUs, is calculated by the amount analyze of Fig. 2, the migration time in our optimization is

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 7

10.54, 22.06, 35.86, 42.56 and 54.31 (s), and the migration 180.00
Benchmark
time is the least compared with the other three methods. 160.00
NF
140.00 FF

Privavy Entropy
70.00 120.00 JOM
Benchmark
NF 100.00
60.00
FF
UTO 80.00
50.00
Migration Time (s)

60.00
40.00 40.00

30.00 20.00

0.00
20.00 100 200 300 400 500
The number of tasks
10.00

0.00
100 200 300 400 500 Fig. 7: Comparison analysis of privacy entropy with diverse
The number of tasks task ranges by Benchmark, NF, FF, and JOM.
Fig. 5: Comparison analysis of migration time cost with
diverse task ranges by Benchmark, NF, FF and UTO.
VII. C ONCLUSION AND F UTURE W ORK
5) Feedback Time consumption: The calculation of feed- In this paper, we focus on the investigation of the of-
back time is approximately one-fifth of the migration time. The floading problem considering the implementation utility (i.e.,
feedback time is used to indicate that the tasks are transmitted the resource utilization of ECUs and the time cost for task
back. If the feedback time equals 0, the tasks, which have been execution). To achieve the trade-offs of utility and privacy,
processed, are not transmitted back to the first ECU. With the a two-phase offloading strategy has been designed. In the
growth of the value of the computing tasks, the diversity of the first phase, we selected the utility-aware offloading strategy
four methods has not become bigger. Based on the analyze of by using NSGA-III to achieve the optimization of utilization
Fig. 6, the migration time in our method is 2.11, 4.41, 7.17, and time cost. Then in the second phase, the utility and the
8.51 and 10.27 (s). The feedback time also costs the least privacy entropy have been both taken into consideration as
compared with Benchmark, NF and FF methods. two main metrics to be optimized at same time. For future
work, we will continue to improve and extend UTO and JOM
to be applied in real world environment. Besides, the privacy-
14.00
Benchmark aware offloading problem in edge computing for 5G will be
NF
12.00 FF investigated.
UTO
10.00
Feedback Time 澻瀆澼

8.00
VIII. ACKNOWLEDGMENT
6.00
This research is supported by the National Natural Sci-
ence Foundation of China under grant no. 61702277 and
4.00
no. 61872219, the Priority Academic Program Development
2.00 of Jiangsu Higher Education Institutions (PAPD) fund, and
0.00 Jiangsu Collaborative Innovation Center on Atmospheric En-
100 200 300 400 500 vironment and Equipment Technology (CICAEET).
The number of tasks

Fig. 6: Comparison analysis of feedback time cost with diverse R EFERENCES


task ranges by Benchmark, NF, FF and UTO. [1] W. Shi, J. Cao, Q. Zhang, Y. Li, L. Xu, Edge computing: Vision and
challenges, IEEE Internet of Things Journal 3 (5) (2016) 637–646.
[2] K. Zhang, S. Leng, Y. He, S. Maharjan, Y. Zhang, Cooperative content
6) Privacy Entropy: We compare the privacy entropy cal- caching in 5g networks with mobile edge computing, IEEE Wireless
culated in JOM. It is obvious that JOM performs better than Communications 25 (3) (2018) 80–87.
the Benchmark, NF and FF in terms of privacy entropy. The [3] H. Dai, Y. Liu, G. Chen, X. Wu, T. He, A. X. Liu, Y. Zhao, SCAPE:
Safe Charging with Adjustable Power, IEEE/ACM Transactions on
privacy entropy indicates the security of the transmission. As Networking 26 (1) (2018) 520–533.
the value of the privacy entropy increases, the security will [4] M. R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel,
increase too. Based on the analysis in Fig. 7, with the growth L. Ladid, Internet of things in the 5g era: Enablers, architecture, and
business models, IEEE Journal on Selected Areas in Communications
of the tasks scales, the privacy entropy grows linearly. The 34 (3) (2016) 510–527.
concrete value of privacy entropy engendered by JOM is 31.72, [5] Cisco, Transformation to a next generation iot service provider, Cisco
63.00, 94.05, 125.23 and 156.20 when the number of tasks is White Paper (2015) 1–12.
[6] M. Bouet, V. Conan, Mobile edge computing resources optimization:
100, 200, 300, 400 and 500, respectively. A geo-clustering approach, IEEE Transactions on Network and Service
7) Utility Value: Due to limited space in this paper, we have Management 15 (2) (2018) 787–796.
[7] L. Liu, Z. Chang, X. Guo, S. Mao, T. Ristaniemi, Multiobjective
provided this subsection in Appendix D of a supplementary optimization for computation offloading in fog computing, IEEE Internet
file. of Things Journal 5 (1) (2017) 283–294.

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2944007, IEEE Internet of
Things Journal
IEEE INTERNET OF THINGS JOURNAL 8

[8] W. Hou, W. Li, L. Guo, Y. Sun, X. Cai, Recycling edge devices in Zhanyang XU received Ph.D. degree from the Nan-
sustainable internet of things networks, IEEE Internet of Things Journal jing University of Posts and Telecommunications,
4 (5) (2017) 1696–1706. China, in 2011. He worked as a research scholar at
[9] X. Xie, T. Yuan, X. Zhou, X. Cheng, Research on trust model in Arizona State University, USA, from May. 2014 to
container-based cloud service, Computers, Materials and Continua 56 (2) June 2015. He is currently an associate professor
(2018) 273–283. at the school of computer and software, Nanjing
[10] J. Zhang, N. Xie, X. Zhang, K. Yue, W. Li, D. Kumar, Machine learning University of Information Science and Technology.
based resource allocation of cloud computing in auction, Computers, He has published more than 15 papers in the in-
Materials & Continua 56 (1) (2018) 123–135. ternational journals and conferences. His research
[11] P. Mach, Z. Becvar, Mobile edge computing: A survey on architecture 澳
interests include Software Engineering, IoT, cloud
and computation offloading, IEEE Communications Surveys & Tutorials computing and big data.
19 (3) (2017) 1628–1656.
[12] L. Qi, Y. Chen, Y. Yuan, S. Fu, X. Zhang, X. Xu, A qos-aware virtual
machine scheduling method for energy conservation in cloud-based
cyber-physical systems, World Wide Web (2019) 1–23.
[13] P. Gope, B. Sikdar, Lightweight and privacy-preserving two-factor
authentication scheme for iot devices, IEEE Internet of Things Journal Lianyong Qi received his PhD degree in Department
6 (1) (2018) 580–589. of Computer Science and Technology from Nanjing
[14] C. Li, B. Palanisamy, Privacy in internet of things: from principles to University, China, in 2011. Now, he is an asso-
technologies, IEEE Internet of Things Journal 6 (1) (2018) 488–505. ciate professor of the School of Information Science
[15] S.-C. Cha, T.-Y. Hsu, Y. Xiang, K.-H. Yeh, Privacy enhancing technolo- and Engineering, Chinese Academy of Education
gies in the internet of things: Perspectives and challenges, IEEE Internet Big Data, Qufu Normal University, China. He has
of Things Journal 6 (2) (2018) 2159–2187. already published more than 50 papers including
[16] M. Chen, Y. Hao, Task offloading for mobile edge computing in JSAC, TCC, TBD, FGCS, JCSS, CCPE, ICWS and
software defined ultra-dense network, IEEE Journal on Selected Areas ICSOC, etc. His research interests include services
in Communications 36 (3) (2018) 587–597. computing, big data and IoT.
[17] S. Bi, Y. J. Zhang, Computation rate maximization for wireless pow-
ered mobile-edge computing with binary computation offloading, IEEE
Transactions on Wireless Communications 17 (6) (2018) 4177–4190.
[18] Z. Ding, P. Fan, H. V. Poor, Impact of non-orthogonal multiple access
on the offloading of mobile edge computing, IEEE Transactions on
Communications 67 (1) (2018) 375–390.
[19] K. Deb, H. Jain, An evolutionary many-objective optimization algorithm Shaohua Wan received the joint Ph.D. degree from
using reference-point-based nondominated sorting approach, part i: solv- the School of Computer, Wuhan University and the
ing problems with box constraints, IEEE Transactions on Evolutionary Department of Electrical Engineering and Computer
Computation 18 (4) (2013) 577–601. Science, Northwestern University, USA in 2010.
[20] K. R. Sollins, Iot big data security and privacy versus innovation, IEEE Since 2015, he has been holding a post-doctoral
Internet of Things Journal 6 (2) (2019) 1628–1635. position at the State Key Laboratory of Digital Man-
[21] Y. Guo, S. Wang, A. Zhou, J. Xu, J. Yuan, C.-H. Hsu, User allocation- ufacturing Equipment and Technology, Huazhong
aware edge cloud placement in mobile edge computing, Software: University of Science and Technology. From 2016
Practice and Experience (2019). to 2017, he was a visiting professor at with the
[22] S. Wang, A. Zhou, R. Bao, W. Chou, S. S. Yau, Towards green service Department of Electrical and Computer Engineering,
composition approach in the cloud, IEEE Transactions on Services Technical University of Munich, Germany. He is
Computing (2018). currently an Associate Professor with the School of Information and Safety
Engineering, Zhongnan University of Economics and Law. His main research
interests include deep learning for Internet of Things and Cyber-Physical
Xiaolong Xu received Ph.D. degree from the Nan- Systems. He is an author of over 60 peer-reviewed research papers and books.
jing University, China, in 2016. He worked as a He is a senior member of IEEE.
research scholar at Michigan State University, USA,
from Apr. 2017 to May 2018. He is currently an
assistant professor at the school of computer and
software, Nanjing University of Information Science
and Technology. He has published more than 60
peer review papers in the international journals and Md Zakirul Alam Bhuiyan (M’09-SM’17) is cur-
conferences, including TCC, TETCI, TCSS, TBD, rently an Assistant Professor of the Department of
JNCA, SPE, CCPE, FGCS, ICWS, ICSOC, etc. Computer and Information Sciences at the Fordham
His research interests include fog computing, edge University, NY, USA, the Founding Director of
computing, IoT, cloud computing and big data. Fordham Dependable and Secure System Lab (De-
pendSys). Earlier, he worked as an Assistant Profes-
sor at the Temple University. His research focuses on
dependability, cybersecurity, big data, and IoT/CPS
Applications. His work in these areas published in
top-tier venues, including IEEE TC, TPDS, TDSC,
Chengxun He received his B.S. in Computer Sci- 澳

TII, COMMAG, IoT-J, ACM TOSN, TAAS, CS,


ence and Technology Engineering from Nanjing
INF, INS, JSA, JNCA, and so on. He has served as a guest/associate editor for
University of Information Science and Technology
IEEE (TII, TBD, TCC, IoT-J), ACM (TOMM, TCPS), INS, FGCS, JNCA, and
in 2019. He is currently studying for his masters
so on. He has been an ESI Highly Cited Researcher (since 2017) and received
degree in Computer Science and Technology in Nan-
numerous awars, including the IEEE TCSC Early Career Researcher, the
jing University of Information Science and Technol-
IEEE Outstanding Leadership Award. and IEEE Service Award. He has also
ogy. His areas of interest are mobile computing, big
served as an organizer, general chair, program chair, workshop chair, and TPC
data, cloud computing and machine learning.
member of various international conferences, including IEEE INFOCOM. He
is a senior member of IEEE and a member of ACM.

2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

You might also like