Visible to the public Optimizing the Allocation of Secure Fog Resources based on QoS Requirements

TitleOptimizing the Allocation of Secure Fog Resources based on QoS Requirements
Publication TypeConference Paper
Year of Publication2021
AuthorsMassey, Keith, Moazen, Nadia, Halabi, Talal
Conference Name2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
Keywordscloud computing, Computational modeling, Conferences, Fog Computing, fog security, Internet of Things, Multi-Objective Optimization, pubcrawl, quality of service, resilience, Resiliency, resource allocation, Scalability, security, Security Optimization, Virtual machining
AbstractFog computing plays a critical role in the provisioning of computing tasks in the context of Internet of Things (IoT) services. However, the security of IoT services against breaches and attacks relies heavily on the security of fog resources, which must be properly implemented and managed. Increasing security investments and integrating the security aspect into the core processes and operations of fog computing including resource management will increase IoT service protection as well as the trustworthiness of fog service providers. However, this requires careful modeling of the security requirements of IoT services as well as theoretical and experimental evaluation of the tradeoff between security and performance in fog infrastructures. To this end, this paper explores a new model for fog resource allocation according to security and Quality of Service (QoS). The problem is modeled as a multi-objective linear optimization problem and solved using conventional, off-the-shelf optimizers by applying the preemptive method. Specifically, two objective functions were defined: one representing the satisfaction of the security design requirements of IoT services and another that models the communication delay among the different virtual machines belonging to the same service request, which might be deployed on different intermediary fog nodes. The simulation results show that the optimization is efficient and achieves the required level of scalability in fog computing. Moreover, a tradeoff needs to be pondered between the two criteria during the resource allocation process.
DOI10.1109/CSCloud-EdgeCom52276.2021.00035
Citation Keymassey_optimizing_2021