2015 24th International Conference on Computer Communication and Networks (ICCCN) 2015
DOI: 10.1109/icccn.2015.7288465
|View full text |Cite
|
Sign up to set email alerts
|

Security-Aware Resource Allocation for Mobile Cloud Computing Systems

Abstract: In this paper, a novel resource allocation algorithm is proposed for secure mobile cloud computing systems. The mobile request for using cloud resource is classified according to its level of security requirement and the amount of required resource for remote computing. We formulate the resource allocation problem as a semi-Markov decision process under the average reward criterion, where the average reward of states is expected to be optimized. Through maximizing the long-term reward while meeting the system … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 15 publications
(20 reference statements)
0
12
0
Order By: Relevance
“…Within the purview of MEC and MCC, there has been a few initiatives for security-and risk-centric managers to support the orchestration of the cloud resources. A optimized allocation of the virtual resources to ensure performant and secure execution stand out as the major contributions behind the works [17], [18], and [19], where the differences lie in the fact that [17] applies to a system with multiple cloud layers while the others emphasized a standalone wireless and cloud system. Additionally, the authors provided a detailed cost function that can be used by MNOs to estimate the economical benefits of providing security services.…”
Section: Security Risk-aware Edge Server Orchestration a Related mentioning
confidence: 99%
See 1 more Smart Citation
“…Within the purview of MEC and MCC, there has been a few initiatives for security-and risk-centric managers to support the orchestration of the cloud resources. A optimized allocation of the virtual resources to ensure performant and secure execution stand out as the major contributions behind the works [17], [18], and [19], where the differences lie in the fact that [17] applies to a system with multiple cloud layers while the others emphasized a standalone wireless and cloud system. Additionally, the authors provided a detailed cost function that can be used by MNOs to estimate the economical benefits of providing security services.…”
Section: Security Risk-aware Edge Server Orchestration a Related mentioning
confidence: 99%
“…Content may change prior to final publication. [9] Resource exhaustion, hardware failure, and SLA violations No Experimentation [12] Resource revocation risk No Experimentation [13] Data leakage No Graph Theory and heuristic [14] Reduce the risk of co-resident attack No Simulation [15] Reduce the risk of co-resident attack No Simulation [16] Reduce the risk of co-resident attack No Simulation [17] Virtual resources to protect the task execution Yes Semi-Markov Decision Process [18] Virtual resources to protect the task execution No Semi-Markov Decision Process [19] Virtual resources to protect the task execution No Semi-Markov Decision Process [20] Virtual resources to protect the task execution No Markov reward model and simulated annealing [21] Security overhead to protect the task execution Yes Genetic Algorithm [22] Security overhead to protect the task execution Yes Deep Reinforcement Learning [23] Computation and communication uncertainties Yes Game Theory [24] Risk-neutral user, risk-averse user, risk-seeking user Yes Simulation [25] IDS at the edge of the network Yes Stochastic Differential Equation [26] Service failure No Graph Theory [27] Service and server failure No System Optimization and Heuristics Our work…”
Section: Security Risk-aware Edge Server Orchestration a Related mentioning
confidence: 99%
“…It outcomes with several challenges and solutions with managing resource strategy which give surety scalability, manageability, versatility, efficiency, and dependability of mobile cloud computing [16,17]. The resource allocation of MCC is a great challenging to face while estimating the relative size of the infrastructures [18,19]. Few investigations have discussed these issues earlier [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…It can be calculated using Equation 17, , (17) where loss E is the energy loss, F is the loss factor, T is the time period, peak loss load P is the load losses at peak load, P no load loss is the no-load losses.…”
Section: Energy Lossmentioning
confidence: 99%
“…The management of the network and cloud resources in cloud computing comes with several challenges, and to address these challenges, it is necessary to develop a resource management approach which ensures the scalability, manageability, adaptability, efficiency, and dependability of cloud computing [25] [15]. The management of MCC resources is also a great challenge owing to the number of objectives that need to be met while considering the relative size (large) of the infrastructures [17] [20]. Few studies have previously addressed these issues [18] [19] [20] [26], and as a consequence, it is a salient issue for service providers to design powerful resource management schemes that will satisfy the requirements of the MCC applications in real time [21].…”
Section: Introductionmentioning
confidence: 99%