• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Deng Xiaoheng, Guan Peiyuan, Wan Zhiwen, Liu Enlu, Luo Jie, Zhao Zhihui, Liu Yajun, Zhang Honggang. Integrated Trust Based Resource Cooperation in Edge Computing[J]. Journal of Computer Research and Development, 2018, 55(3): 449-477. DOI: 10.7544/issn1000-1239.2018.20170800
Citation: Deng Xiaoheng, Guan Peiyuan, Wan Zhiwen, Liu Enlu, Luo Jie, Zhao Zhihui, Liu Yajun, Zhang Honggang. Integrated Trust Based Resource Cooperation in Edge Computing[J]. Journal of Computer Research and Development, 2018, 55(3): 449-477. DOI: 10.7544/issn1000-1239.2018.20170800

Integrated Trust Based Resource Cooperation in Edge Computing

More Information
  • Published Date: February 28, 2018
  • Edge computing, as a new computing paradigm, is designed to share resources of edge devices, such as CPU computing ability, bandwidth, storage capacity and so on, to meet the requirements of the real-time response, privacy and security, computing autonomy. With the development of Internet of things (IoT) and mobile Internet technology, edge computing is of great potential of being widely used. This paper investigates the basic features, concepts and definitions, the latest state of art, and the challenge and trends of edge computing. Based on the key challenge of guarantee of users’ quality of experience (QoE), privacy and security in edge computing, we focus on the requirement of users and consider the quality of experience of users to optimize the edge computing system. We integrate three aspects of trust properties, which are identity trust, behavior trust and ability trust, to evaluate resources and users to ensure the success of resource sharing and collaborative optimization in edge computing. This paper also investigates various computing modes such as cloud computing, P2P computing, CS and grid computing, and constructs a multi-layer, self-adaptive, uniform computing model to dynamically match different application scenarios. This model has four contributions: 1) reveal the mechanism of parameters mapping between quality of service (QoS) and quality of experience; 2) construct identity trust, behavior trust of resources and users evaluation mechanisms; 3) form an integrated trust evaluation architecture and model; 4) design a resource scheduling algorithm for stream processing scenario, considering the computing ability, storage capacity and dynamical channel capacity depends on mobility to improve the quality of experience of users. Through this model and mechanism, resources in the end point, edge network, cloud center three levels are expected to be trusted sharing and optimized using, and the users' QoE needs are well satisfied. At last, simulation results show the validity of the model.
  • Related Articles

    [1]Li Yuan, Yang Sen, Sun Jing, Zhao Huiqun, Wang Guoren. Influential Cohesive Subgraph Discovery Algorithm in Dual Networks[J]. Journal of Computer Research and Development, 2023, 60(9): 2096-2114. DOI: 10.7544/issn1000-1239.202220337
    [2]Qian Zhongsheng, Yang Jiaxiu, Li Duanming, Ye Zulai. Event Recommendation Strategy Combining User Long-Short Term Interest and vent Influence[J]. Journal of Computer Research and Development, 2022, 59(12): 2803-2815. DOI: 10.7544/issn1000-1239.20210693
    [3]Liu Haijiao, Ma Huifang, Zhao Qiqi, Li Zhixin. Target Community Detection with User Interest Preferences and Influence[J]. Journal of Computer Research and Development, 2021, 58(1): 70-82. DOI: 10.7544/issn1000-1239.2021.20190775
    [4]LiJin, YueKun, ZhangDehai, LiuWeiyi. Robust Influence Blocking Maximization in Social Networks[J]. Journal of Computer Research and Development, 2016, 53(3): 601-610. DOI: 10.7544/issn1000-1239.2016.20148341
    [5]Wu Linping, Wei Yong, Xu Xiaowei, Liu Xu. Impact of System Noise by Quantitative Analysis[J]. Journal of Computer Research and Development, 2015, 52(5): 1146-1152. DOI: 10.7544/issn1000-1239.2015.20131921
    [6]Wang Hao, Li Guohuan, Yao Hongliang, Li Junzhao. Stock Network Community Detection Method Based on Influence Calculating Model[J]. Journal of Computer Research and Development, 2014, 51(10): 2137-2147. DOI: 10.7544/issn1000-1239.2014.20130575
    [7]Zhang Yue, Zhang Hongli, Zhang Weizhe, and Lu Junjia. Identifying the Influential Users in Network Forum[J]. Journal of Computer Research and Development, 2013, 50(10): 2195-2205.
    [8]Ding Zhaoyun, Zhou Bin, Jia Yan, Zhang Lumin. Topical Influence Analysis Based on the Multi-Relational Network in Microblogs[J]. Journal of Computer Research and Development, 2013, 50(10): 2155-2175.
    [9]Liu Huaxiao, Jin Ying, and Ma Pengfei. An Approach to Requirements Change Impact Analysis[J]. Journal of Computer Research and Development, 2013, 50(8): 1769-1777.
    [10]Ma Chi, Li Zhi, Zhang Hong, and Liu Fengyu. Survivability Research on the Impact of Node Failure in MANET[J]. Journal of Computer Research and Development, 2012, 49(3): 550-557.
  • Cited by

    Periodical cited type(3)

    1. 王粲,邹伟东,夏元清. 基于衰减正则化项的I-ELM智能制造动态调度. 人工智能. 2023(01): 17-28 .
    2. 王一宾,缪佳李,程玉胜. 信息适应性分层粒化的多标签特征选择. 安庆师范大学学报(自然科学版). 2022(04): 37-43 .
    3. 曹天成,姚丽莎,陶朗. 隶属度阈值函数极限学习机的多标签学习. 怀化学院学报. 2022(05): 59-67 .

    Other cited types(8)

Catalog

    Article views (2818) PDF downloads (2287) Cited by(11)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return