Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability framework

Published: 10 December 2023 Publication History

Abstract

The need for low‐latency service support at the network edge has increased due to new applications such as autonomous vehicles, facial recognition, and augmented reality. Multi‐access edge computing (MEC) has emerged as a promising component of next‐generation 5G and 6G networks that provides additional storage and computing capacity at the network edge to enhance application performance, load balancing, and reduce latency. Security challenges remain, and a zero trust security framework has the potential to reduce risk and improve visibility. A zero trust management module is introduced to authenticate users after a successful registration. This article presents a three‐layer MEC model implementing a trust‐aware load balancing decision process. A Q‐learning algorithm is used to estimate trust values. Task trust and indirect trust relationships are recorded using blockchain technology. Blockchain will enable a transparent and secure mechanism that contributes to secure resource management in an MEC environment. The results provided by a framework simulation highlight the improved security outcome.

Graphical Abstract

This contribution presents a novel framework combining blockchain, Q‐learning, and Zero Trust Management Module (ZTMM) for secure MEC load balancing. It uses Q‐learning to introduce an Edge Authenticator (EA) for trust estimation and load‐balancing decisions based on server capability. The approach ensures trustworthiness validation via blockchain, incorporates ZTMM for UE identity validation, and demonstrates Proof‐of‐Concept (PoC) experiments validating security‐enhanced, trust‐aware load balancing in dynamic MEC environments.

References

[1]
Li K, Wang X, Ni Q, Huang M. Entropy‐based reinforcement learning for computation offloading service in software‐defined multi‐access edge computing. Future Gener Comput Syst. 2022;136:241‐251.
[2]
GSMA . Operator platform telco edge requirements. Technical Report OPG.02. GSM Association; 2021. https://www.gsma.com/futurenetworks/wp‐content/uploads/2021/06/OPG‐Telco‐Edge‐Requirements‐2021.pdf
[3]
Jin H, Gregory MA, Li S. A review of intelligent computation offloading in multiaccess edge computing. IEEE Access. 2022;10:71481‐71495.
[4]
Liang B, Gregory MA, Li S. Multi‐access edge computing fundamentals, services, enablers and challenges: a complete survey. J Netw Comput Appl. 2021;199:103308.
[5]
Ali B, Gregory MA, Li S. Multi‐access edge computing architecture, data security and privacy: a review. IEEE Access. 2021;9:18706‐18721.
[6]
Rose S, Borchert O, Mitchell S, Connelly S. Zero trust architecture. Technical Report SP 800‐207. National Institute of Standards and Technology; 2020.
[7]
Strom BE, Applebaum A, Miller DP, Nickels KC, Pennington AG, Thomas CB. Mitre Att&Ck: design and philosophy. Technical Report. The MITRE Corporation; 2018.
[8]
DoD . DoD zero trust strategy. U.S. Department of Defense, Recommendation; 2022. https://dodcio.defense.gov/Portals/0/Documents/Library/DoD‐ZTStrategy.pdf
[9]
Ali B, Hijjawi S, Campbell LH, Gregory MA, Li S. A maturity framework for zero‐trust security in multiaccess edge computing. Secur Commun Netw. 2022;2022:3178760.
[10]
Arabi AAM, Nyamasvisva TE, Valloo S. Zero trust security implementation considerations in decentralised network resources for institutions of higher learning. Int J Infrastruct Res Manag. 2022;10(1):79‐90.
[11]
Hossain MS, Nwakanma CI, Lee JM, Kim D‐S. Edge computational task offloading scheme using reinforcement learning for IIoT scenario. ICT Express. 2020;6(4):291‐299.
[12]
Saeik F, Avgeris M, Spatharakis D, et al. Task offloading in edge and cloud computing: a survey on mathematical, artificial intelligence and control theory solutions. Comput Netw. 2021;195:108177.
[13]
Ma S, Song S, Yang L, Zhao J, Yang F, Zhai L. Dependent tasks offloading based on particle swarm optimization algorithm in multi‐access edge computing. Appl Soft Comput. 2021;112:107790.
[14]
Laroui M, Ibn‐Khedher H, Ali Cherif M, Moungla H, Afifi H, Kamel AE. SO‐VMEC: service offloading in virtual mobile edge computing using deep reinforcement learning. Trans Emerg Telecommun Technol. 2021;33:e4211.
[15]
Aazam M, Zeadally S, Flushing EF. Task offloading in edge computing for machine learning‐based smart healthcare. Comput Netw. 2021;191:108019.
[16]
Fang J, Shi J, Lu S, Zhang M, Ye Z. An efficient computation offloading strategy with mobile edge computing for IoT. Micromachines. 2021;12(2):204.
[17]
Jayasinghe U, Lee GM, MacDermott Á, Rhee WS. TrustChain: a privacy preserving blockchain with edge computing. Wirel Commun Mob Comput. 2019;2019:2014697.
[18]
Refaey A, Hammad K, Magierowski S, Hossain E. A blockchain policy and charging control framework for roaming in cellular networks. IEEE Netw. 2019;34(3):170‐177.
[19]
Rivera AV, Refaey A, Hossain E. A blockchain framework for secure task sharing in multi‐access edge computing. IEEE Netw. 2021;35(3):176‐183.
[20]
Li G, Ren X, Wu J, et al. Blockchain‐based mobile edge computing system. Inform Sci. 2021;561:70‐80.
[21]
Feng Z, Zhou P, Wang Q, Qi W. A dual‐layer zero trust architecture for 5G industry MEC applications access control. 2022 IEEE 5th International Conference on Electronic Information and Communication Technology (ICEICT). IEEE; 2022:100‐105.
[22]
Bello Y, Hussein AR, Ulema M, Koilpillai J. On sustained zero trust conceptualization security for mobile core networks in 5G and beyond. IEEE Trans Netw Serv Manag. 2022;19(2):1876‐1889.
[23]
Hu C, Li J, Shi H, Ning B, Gu Q. Decentralized offloading strategies based on reinforcement learning for multi‐access edge computing. Information. 2021;12(9):343.
[24]
Zhou S, Jadoon W, Shuja J. Machine learning‐based offloading strategy for lightweight user mobile edge computing tasks. Complexity. 2021;2021:6455617.
[25]
Guo S, Hu X, Guo S, Qiu X, Qi F. Blockchain meets edge computing: a distributed and trusted authentication system. IEEE Trans Industr Inform. 2019;16(3):1972‐1983.
[26]
ETSI . Multi‐access edge computing (MEC); framework and reference architecture. Technical Report GS MEC 003. ETSI; 2019.
[27]
Ushmaev O, Kuznetsov V, Gudkov V. Extraction of binary features from fingerprint topology. 2011 International Conference on Hand‐Based Biometrics. IEEE; 2011:1‐6.
[28]
Huang Y. Deep Q‐networks. Deep Reinforcement Learning. Springer; 2020:135‐160.
[29]
Hernández‐Carlón JJ, Pérez‐Romero J, Sallent O, Vilà I, Casadevall F. A deep Q‐network‐based algorithm for multi‐connectivity optimization in heterogeneous cellular‐networks. Sensors. 2022;22(16):6179.
[30]
Denko MK, Sun T, Woungang I. Trust management in ubiquitous computing: a Bayesian approach. Comput Commun. 2011;34(3):398‐406.
[31]
Behrisch M, Bieker L, Erdmann J, Krajzewicz D. SUMO: simulation of urban mobility: an overview. SIMUL 2011, the Third International Conference on Advances in System Simulation. ThinkMind; 2011:63‐68.
[32]
Sommer C, Eckhoff D, Brummer A, et al. Veins: the open source vehicular network simulation framework. Recent Advances in Network Simulation. Springer; 2019.
[33]
Varga A. OMNeT++. Springer; 2010:35‐59.
[34]
Ali B, Gregory MA, Li S. Uplifting healthcare cyber resilience with a multi‐access edge computing zero‐trust security model. 2021 31st International Telecommunication Networks and Applications Conference (ITNAC). IEEE; 2021:192‐197.
[35]
Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y. Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Netw. 2019;33(3):10‐17.
[36]
Wu D, Shen G, Huang Z, Cao Y, Du T. A trust‐aware task offloading framework in mobile edge computing. IEEE Access. 2019;7:150105‐150119.

Cited By

View all
  • (2025)Enhancing cloud security with intelligent load balancing and malicious request classificationCluster Computing10.1007/s10586-024-04754-328:1Online publication date: 1-Feb-2025
  • (2024)Advancing IAM in the Finance Sector by Integrating Zero Trust and Blockchain TechnologyMobile Web and Intelligent Information Systems10.1007/978-3-031-68005-2_7(83-99)Online publication date: 18-Aug-2024

Index Terms

  1. Trust‐aware task load balancing in multi‐access edge computing based on blockchain and a zero trust security capability framework
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Transactions on Emerging Telecommunications Technologies
    Transactions on Emerging Telecommunications Technologies  Volume 34, Issue 12
    December 2023
    301 pages
    EISSN:2161-3915
    DOI:10.1002/ett.v34.12
    Issue’s Table of Contents
    This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

    Publisher

    John Wiley & Sons, Inc.

    United States

    Publication History

    Published: 10 December 2023

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Enhancing cloud security with intelligent load balancing and malicious request classificationCluster Computing10.1007/s10586-024-04754-328:1Online publication date: 1-Feb-2025
    • (2024)Advancing IAM in the Finance Sector by Integrating Zero Trust and Blockchain TechnologyMobile Web and Intelligent Information Systems10.1007/978-3-031-68005-2_7(83-99)Online publication date: 18-Aug-2024

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media