Abstract
The edge-cloud computing and network slicing have emerged as promising solutions to fulfill the diversity of IoT applications enabled by 5G and beyond. However, edge-cloud computing systems are composed of various hardware facilities, leading to difficulties in hardware control and management. With network slicing, underlying resource sharing among multiple slice users is allowed, leading to potential attacks to the slice formulation processes and malicious usage of network slices that may result in inefficient resource utilization of the system. To address the aforementioned network slice security issue, we first propose a new systematic framework, named software-defined edge-cloud computing (SD-ECC), which applies standard software to control the hardware infrastructure regardless of vendor variations. With SD-ECC, resource slices are formulated by including storage and computational resources provided by edge and cloud servers. Then, we study an optimal slicing-based resource orchestration problem by considering slice-initiated attacks as possible adversaries, which includes both interslice and intraslice resource orchestrations. A secure slicing-based resource orchestration (SS-RO) algorithm is designed by minimizing the delay and resource utilization simultaneously to mitigate the impacts of the slice-initiated attacks, where the Benders decomposition is employed to obtain the interslice orchestration outcome, and a quadratic transformation method is applied to derive the intraslice orchestration solution. The experimental results demonstrate that the proposed SS-RO algorithm outperforms baseline schemes in terms of the ratio of accepted attacking tasks, energy consumption, and system throughput.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.