Skip to main content

Advertisement

Log in

Task offloading for edge computing in industrial Internet with joint data compression and security protection

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the increase of intelligent devices in the industrial Internet, the computing tasks of these devices are growing exponentially. However, due to the centralized deployment and long backhaul characteristics of cloud computing, it is difficult to meet the requirements of high real-time and high security industrial tasks. Edge computing offloads tasks to the edge side to effectively reduce latency and protect data security. In this paper, we establish an optimization model of task offloading with joint data compression and security protection. In our model, in order to solve the load problem of super-large tasks on link bandwidth in the industrial Internet, a data compression model is established by formulating the computing load of compression and decompression as a nonlinear function of the compression ratio. The model can determine the optimal compression ratio and reduce the transmission latency of the task. In addition, we establish a security protection model by setting different security levels for each task. Based on this model, tasks are offloaded to different locations to improve data security and meet the computing requirements of different tasks. To solve the task offloading strategy, we design an offloading algorithm based on the improved simulated annealing particle swarm algorithm (ISA-PSO). The simulation results show that the established offloading model has remarkable effect in data security protection, latency, and cost reductions, and the objective value is reduced by 17.41% after adding the compression model. Compared with the existing edge computing offloading algorithms, ISA-PSO has better convergence level and offloading effect, which can reduce the weighted cost by up to 27%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of data and materials

The data and material used to support the findings of this study are available from the corresponding author upon request.

References

  1. Elgendy IA, Zhang WZ, Liu CY et al (2021) An efficient and secured framework for mobile cloud computing. IEEE Trans Cloud Comput 9(2):844–844

    Article  Google Scholar 

  2. Noor TH, Zeadally S, Alfazi A et al (2018) Mobile cloud computing: challenges and future research directions. J Netw Comput Appl 115(1):70–85

    Article  Google Scholar 

  3. Jararweh Y, Doulat A, AlQudah O et al (2016) The future of mobile cloud computing: integrating cloudlets and mobile edge computing. In: IEEE 23rd International Conference on Telecommunications (ICT), pp 1–5

  4. Ahmed A and Ahmed E et al (2016) A survey on mobile edge computing. In: 10th International Conference on Intelligent Systems and Control (ISCO), pp 1–8

  5. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78(1):680–698

    Article  Google Scholar 

  6. Bai Y, Chen L, Song L et al (2020) Risk-aware edge computation offloading using bayesian stackelberg game. IEEE Trans Netw Serv Manag 17(2):1000–1012

    Article  Google Scholar 

  7. Thai MT, Lin YD, Lai YC et al (2019) Workload and capacity optimization for cloud-edge computing systems with vertical and horizontal offloading. IEEE Trans Netw Serv Manag 17(1):227–238

    Article  Google Scholar 

  8. Abbas N, Zhang Y, Taherkordi A et al (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465

    Article  Google Scholar 

  9. Jin X, Hua W, Wang Z et al (2022) A survey of research on computation offloading in mobile cloud computing. Wireless Netw 28(1):1563–1585

    Article  Google Scholar 

  10. Li X, You C, Andreev S et al (2018) Wirelessly powered crowd sensing: joint power transfer, sensing, compression, and transmission. IEEE J Sel Areas Commun 37(2):391–406

    Article  Google Scholar 

  11. Zhang W, Wen Y, Zhang YJ et al (2017) Mobile cloud computing with voltage scaling and data compression. In: 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp 1–5

  12. Ni J, Lin X, Shen XS (2019) Toward edge-assisted Internet of Things: from security and efficiency perspectives. IEEE Netw 33(2):50–57

    Article  Google Scholar 

  13. Zhang T, Li Y, Chen CLP (2021) Edge computing and its role in industrial internet: methodologies, applications, and future directions. Inf Sci 55(1):34–65

    Article  Google Scholar 

  14. Shu C, Zhao Z, Han Y et al (2019) Multi-user offloading for edge computing networks: a dependency-aware and latency-optimal approach. IEEE Internet Things J 7(3):1678–1689

    Article  Google Scholar 

  15. Yang L, Zhong C, Yang Q et al (2020) Task offloading for directed acyclic graph applications based on edge computing in industrial internet. Inf Sci 540(1):51–68

    Article  Google Scholar 

  16. Hao X, Zhao R, Yang T et al (2021) A risk-sensitive task offloading strategy for edge computing in industrial Internet of Things. EURASIP J Wirel Commun Netw 1:1–18

    Google Scholar 

  17. Chen W, Zhang Z, Hong Z et al (2019) Cooperative and distributed computation offloading for blockchain-empowered industrial Internet of Things. IEEE Internet Things J 6(5):8433–8446

    Article  Google Scholar 

  18. Baranwal G, Vidyarthi DP (2021) Computation offloading model for smart factory. J Ambient Intell Humaniz Comput 12(8):8305–8318

    Article  Google Scholar 

  19. Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutor 19(3):1628–1656

    Article  Google Scholar 

  20. Chen M, Hao Y (2018) Task offloading for mobile edge computing in software defined ultra-dense network. IEEE J Sel Areas Commun 36(3):587–597

    Article  Google Scholar 

  21. Qiu X, Zhai L, Wang H (2019) Time-minimized offloading for mobile edge computing systems. IEEE Access 7(1):135439–135447

    Article  Google Scholar 

  22. Yang G, Hou L, He X et al (2020) Offloading time optimization via Markov decision process in mobile-edge computing. IEEE Internet Things J 8(4):2483–2493

    Article  Google Scholar 

  23. Kai C, Zhou H, Yi Y et al (2020) Collaborative cloud-edge-end task offloading in mobile-edge computing networks with limited communication capability. IEEE Trans Cogn Commun Netw 7(2):624–634

    Article  Google Scholar 

  24. Choi HS, Yu H, Lee EY (2019) Latency-classification-based deadline-aware task offloading algorithm in mobile edge computing environments. Appl Sci 9(21):4696

    Article  Google Scholar 

  25. Wang Y, Tao X, Zhang X et al (2019) Cooperative task offloading in three-tier mobile computing networks: an ADMM framework. IEEE Trans Veh Technol 68(3):2763–2776

    Article  Google Scholar 

  26. Zhan W, Luo C, Min G et al (2020) Mobility-aware multi-user offloading optimization for mobile edge computing. IEEE Trans Veh Technol 69(3):3341–3356

    Article  Google Scholar 

  27. Fang J, Shi J, Lu S et al (2021) An efficient computation offloading strategy with mobile edge computing for IoT. Micromachines 12(2):204

    Article  Google Scholar 

  28. Li C, Cai Q, Zhang C et al (2021) Computation offloading and service allocation in mobile edge computing. J Supercomput 77(12):13933–13962

    Article  Google Scholar 

  29. Song S, Ma S, Zhao J et al (2021) Cost-efficient multi-service task offloading scheduling for mobile edge computing. Appl Intell 1:1–13

    Google Scholar 

  30. Xu D, Li Q, Zhu H (2019) Energy-saving computation offloading by joint data compression and resource allocation for mobile-edge computing. IEEE Commun Lett 23(4):704–707

    Article  Google Scholar 

  31. Ren J, Yu G, Cai Y et al (2018) Latency optimization for resource allocation in mobile-edge computation offloading. IEEE Trans Wireless Commun 17(8):5506–5519

    Article  Google Scholar 

  32. Nguyen TT, Ha VN, Le LB et al (2019) Joint data compression and computation offloading in hierarchical fog-cloud systems. IEEE Trans Wireless Commun 19(1):293–309

    Article  Google Scholar 

  33. Xu X, He C, Xu Z et al (2020) Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet Things J 7(4):2622–2629

    Article  Google Scholar 

  34. He X, Jin R, Dai H (2020) Physical-layer assisted secure offloading in mobile-edge computing. IEEE Trans Wireless Commun 19(6):4054–4066

    Article  Google Scholar 

  35. Huang B, Li Y, Li Z et al (2019) Security and cost-aware computation offloading via deep reinforcement learning in mobile edge computing. Wirel Commun Mob Comput 1:1–20

    Google Scholar 

  36. Zhang WZ, Elgendy IA, Hammad M et al (2020) Secure and optimized load balancing for multitier IoT and edge-cloud computing systems. IEEE Internet Things J 8(10):8119–8132

    Article  Google Scholar 

  37. Zahid M, Javaid N, Ansar K et al (2018) Hill climbing load balancing algorithm on fog computing. In: International Conference on P2P. Parallel, Grid, Cloud and Internet Computing. Springer, pp 238–251

  38. Han X, Dong Y, Yue L et al (2021) State-transition simulated annealing algorithm for constrained and unconstrained multi-objective optimization problems. Appl Intell 51(2):775–787

    Article  Google Scholar 

  39. You Q, Tang B (2021) Efficient task offloading using particle swarm optimization algorithm in edge computing for industrial internet of things. J Cloud Comput 10(1):1–11

    Article  Google Scholar 

  40. Nadimi-Shahraki MH, Taghian S, Mirjalili S (2021) An improved grey wolf optimizer for solving engineering problems. Expert Syst Appl 166(1):113917

    Article  Google Scholar 

  41. Ding J, Xue N et al (2019) Learning RoI transformer for oriented object detection in aerial images. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 2849–2858

  42. Redmon J, Farhadi A (2017) YOLO9000: better, faster, stronger. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 7263–7271

  43. Beheshti Z, Shamsuddin SM (2015) Non-parametric particle swarm optimization for global optimization. Appl Soft Comput 28:345–359

    Article  Google Scholar 

  44. Bi J, Yuan H, Duanmu S et al (2020) Energy-optimized partial computation offloading in mobile-edge computing with genetic simulated-annealing-based particle swarm optimization. IEEE Internet Things J 8(5):3774–3785

    Article  Google Scholar 

  45. Dai Y, Xu D, Maharjan S et al (2018) Joint computation offloading and user association in multi-task mobile edge computing. IEEE Trans Veh Technol 67(12):12313–12325

    Article  Google Scholar 

  46. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):329–423

    Article  Google Scholar 

  47. Detti P (2021) A new upper bound for the multiple Knapsack problem. Comput Oper Res 129(1):105210

    Article  MATH  Google Scholar 

  48. Gao K, Cao Z, Zhang L et al (2019) A review on swarm intelligence and evolutionary algorithms for solving flexible job shop scheduling problems. IEEE/CAA J Autom Sin 6(4):904–916

    Article  Google Scholar 

  49. Pham QV, Mirjalili S, Kumar N et al (2020) Whale optimization algorithm with applications to resource allocation in wireless networks. IEEE Trans Veh Technol 69(4):4285–4297

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Communication Soft Science Program of Ministry of Industry and Information Technology of China (No. 2022-R-43), the Natural Science Basic Research Program of Shaanxi (No. 2021JQ-719), the Special Scientific Research Program of Education Department of Shaanxi (No. 22JK0562), the Graduate Innovation Fund of Xi’an University of Posts and Telecommunications (No. CXJJYL2021017), the Youth Innovation Team of Shaanxi Universities “Industrial Big Data Analysis and Intelligent Processing,” and the Special Funds for Construction of Key Disciplines in Universities in Shaanxi.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yurong Ding.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Z., Ding, Y., Jin, X. et al. Task offloading for edge computing in industrial Internet with joint data compression and security protection. J Supercomput 79, 4291–4317 (2023). https://doi.org/10.1007/s11227-022-04821-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04821-9

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy