A Trust-Aware Task Offloading Framework in Mobile Edge Computing
A Trust-Aware Task Offloading Framework in Mobile Edge Computing
211106, China
Corresponding author: Guohua Shen ([email protected])
This work was supported in part by the National Natural Science Foundation of China under Grant 61772270, in part by the National Key
Research and Development Program of China under Grant 2018YFB1003902 and Grant 2016YFB1000802, and in part by the Key
Laboratory of Safety-Critical Software, Ministry of Industry and Information Technology of China under Grant 1015-XCA1816403.
ABSTRACT Task offloading in Mobile Edge Computing (MEC) is a solution to augment resource-limited
mobile devices’ capabilities by migrating tasks to the edge of the network (i.e., edge servers and idle devices).
At present, a lot of work is focused on optimizing policies to reduce latency or energy consumption for users.
However, they mostly ignore that services are not necessarily trustworthy because the resource providers are
complex, dynamic, and unreliable. The trustworthiness of a service in our paper mainly includes two aspects.
One is that resource providers will not violate users’ privacy. The other is that resource providers will perform
well to ensure the effectiveness of services. To solve this problem, we propose a trust-aware task offloading
framework. The main purpose of the framework is to select a resource provider for a user to reduce latency
or energy consumption and ensure service trustworthiness at the same time. The framework can be divided
into three modules (i.e., trust evaluation, filtering and selection). By combining trust evaluation and filtering
modules, some resource providers that are not trusted by users are filtered out to ensure that the services
provided to users are trustworthy. In the selection module, we select an appropriate provider for a user from
the qualified (i.e., left after the filtering process) resource providers based on an offloading policy. The
experimental results show that our framework not only reduces latency or energy consumption for users, but
also reduces the failure rate of tasks.
INDEX TERMS Mobile edge computing (MEC), task offloading, trust evaluation, machine learning, privacy
protection.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
VOLUME 7, 2019 150105
D. Wu et al.: Trust-Aware Task Offloading Framework in MEC
the services provided are trustworthy. Offloading in MEC is The framework can be divided into three modules (i.e., trust
more complex than that in cloud computing. The resource evaluation, filtering, and selection). In the trust evaluation
providers in cloud computing are usually several large com- module, we introduce identity trust and behavior trust to
panies, while the resource providers in MEC can be either evaluate resource providers, and establish a novel trust evalu-
MEC servers or idle devices around the network. Therefore, ation mechanism based on machine learning. In the filtering
resource providers in MEC have new characteristics such as module, we filter out some resource providers with low trust
dynamic, complex, and unreliable, which make it difficult to level by filtering algorithm based on the results of trust eval-
ensure that services are trustworthy. uation. Based on the two modules, we are able to ensure the
The trustworthiness of a service in our paper mainly trustworthiness of services. In the selection module, we select
includes two aspects. One aspect is that resource providers the appropriate one from the qualified resource providers for
will not violate users’ privacy, which we refer to as Priv − the user to perform the task according to the offloading policy.
trustworthiness. The essence of task offloading is the out- The main contributions of the paper are as follows: (1)
sourcing of computation, so the privacy of users must also 1) To ensure the Priv − trustworthiness, we introduce
be protected in the process. When a task contains sensi- task sensitivity to measure the threat to the user’s pri-
tive information, it will pose a threat to personal privacy if vacy if the sensitive information contained in the task
such information is acquired by malicious devices and used is exposed. We introduce online social networks into
maliciously. Zhang et al. [6]–[8] pointed out that since user MEC, which maps the trust relationship established by
data in mobile edge computing is usually processed in semi- device owners in the social layer into the identity trust
trusted authorized entities, it is likely to cause data leakage relationship between devices. If a provider’s identity
or data loss. The other is that resource providers will perform trust level is lower than task sensitivity, it is untrustwor-
well to ensure the effectiveness of services, which we refer thy. To ensure the Effe − trustworthiness, we introduce
to as Effe − trustworthiness. If the number of misbehav- behavior trust to evaluate the behavior performance of
ing providers increases, there will be some bad situations, resource providers. Users have the required behavior
such as high task failure rate or actual latency far beyond levels of services. If a provider’s behavior trust level
prediction, which will disrupt offloading and lead to low is lower than the user’s required behavior level, it is
offloading effectiveness. For example, a resource provider untrustworthy.
who only wants to benefit from task offloading does not 2) Based on the relationship between task sensitivity
contribute resources or reduces a large number of resources and identity trust, as well as the relationship between
without agreement. If we do not consider the trustworthiness behavior level required by the user and behavior trust
of services, even if offloading policies achieve good results level of a provider, a trust-based filtering algorithm is
in the optimization of latency or energy consumption, it is proposed to filter out those unqualified providers.
difficult to apply task offloading in practice because of the 3) We propose a trust-aware task offloading framework to
low effectiveness or the potential threat to users’ privacy. reduce latency or energy consumption and ensure the
To ensure the trustworthiness of services (i.e., Priv − trustworthiness of services for users at the same time.
trustworthiness and Effe − trustworthiness), we conduct a The remainder of this paper is organized as follows:
trust evaluation of these two aspects. On the one hand, to pro- Section II briefly introduces the related work. Section III
tect a user’s privacy, we introduce task sensitivity to measure describes the relevant preliminary knowledge. Section IV
the threat to the user’s privacy caused by the exposure of sen- introduces our trust-aware task offloading framework in
sitive information contained in the task, and introduce identity detail. Section V introduces the experimental evaluation of
trust to evaluate the trust degree of the user to providers. our framework. Finally, we make a summary and put forward
When the task sensitivity is higher than the identity trust level the direction of future research.
of a provider, it indicates that the provider is not trusted by
the user to complete the task. On the other hand, to ensure II. RELATED WORK
the effectiveness of services, we introduce behavior trust To select trustworthy resource providers, we need to establish
to evaluate whether providers are misbehaving. Users have a trust evaluation mechanism. Meanwhile, facing a large
their required behavior levels of services. When a provider’s number of resource providers, we need to select an appro-
behavior trust level is lower than a user’s required behavior priate resource provider to complete a task according to an
level, it is not trusted by the user to complete the task. offloading policy. Therefore, in this section, we focus on trust
However, it is difficult to choose an appropriate weight for evaluation and task offloading policies in MEC.
each trust factor in establishing a trust evaluation mechanism.
Therefore, we establish a novel trust evaluation mechanism A. TRUST EVALUATION IN MOBILE EDGE COMPUTING
by formalizing trust evaluation as a classification problem in Trust evaluation has received extensive attention and research
machine learning. in areas including cloud computing, mobile cloud computing,
Overall, to reduce latency or energy consumption and and peer-to-peer computing [9]–[12]. At present, people are
ensure the trustworthiness of services at the same time, building some new trust evaluation mechanisms based on the
we propose a trust-aware task offloading framework. new characteristics of MEC.
According to the sources of trust factors, we classify the in the case of limited computing resources of MEC. The
existing evaluation work in MEC into three categories: indi- author proposed a layered MEC deployment architecture and
rect trust models (based on reputation), direct trust mod- solved the multi-user offloading problem by using Stackel-
els (based on direct interaction records), and hybrid models berg game theory. The author’s proposed offloading scheme
(both direct and indirect trust factors). Hussain and Almourad not only provides a significant improvement in reducing
[13], [14] studied how to compute the reputation of edge latency over local execution, but also guides the deployment
data centers, using centralized trust management, which of MEC servers. Liu et al. [20] introduced a cloud-assisted
stores the reputation of LTE deployed clouds. Through this edge computing framework with a three-tier network, and the
system, users can anonymously evaluate cloudlet services. energy consumption minimization problem is formalized as a
Zhou et al. [15] proposed a method to learn users’ prefer- mixed integer programming. Dong [21] proposed a dynamic,
ences based on their contexts, previous behaviors, and social decentralized resource allocation policy based on latency and
intimacy. He designed a trust evaluation mechanism based on energy consumption, which is used to deal with the prob-
users’ preferences to guarantee trustworthy edge computing. lem of task offloading between multiple heterogeneous edge
To enhance the reliability of trust evaluation, we will take into nodes and central clouds.
account both indirect trust factors and dircet trust factors. In addition to the above-mentioned offloading policies to
According to the technology used, we divide the exist- reduce latency or energy consumption from the perspective
ing evaluation work in MEC into two categories: emerg- of selecting the appropriate resource provider, there are other
ing technology-based models and formula-based models. interesting research on optimizing offloading policies from
Xu et al. [16] presented a novel trustless crowd-intelligence the perspective of communication and computation cooper-
ecosystem based on the common decentralization feature of ation. Li et al. [22] exploited the idea of computation repli-
mobile edge computing and blockchain technology, which cation which allows each user to offload its task to multiple
can ensure that all trustless objects in the whole system edge nodes to speed up the downloading phase via trans-
must perform trusted operations. The formula-based models mission cooperation. Their results show that computation
always assign a weight to each trust factor and integrate them replication is very useful for reducing communication latency
into a value. Yuan and Li [17] made some discussions on in tasks where the output data size is larger than the input
trust management in mobile edge computing, and elaborated data size. On the contrary, sometimes multiple users can use
the reasons and significance of trust management. He pro- collaborative properties to share part of a user’s computation
posed a trust computing mechanism based on multi-source tasks. Al-Shuwaili and Simeone [23] leveraged the inherent
feedback (MSTrust). collaborative properties of Augmented Reality (AR) appli-
However, in the traditional formula method, how to give cations and proposed a novel resource allocation approach
each trust factor an appropriate weight is a very difficult over both communication and computation resources. In this
problem. Although the value derived from the formula-based way, different users are able to share part of the computation
approach can be used as a reference for the trust level, it is tasks as well as the input and output data. Our research is
not accurate enough to be in accordance with the user’s to optimize the policy by selecting an appropriate resource
expectations because trust is a subjective metric. Besides, provider for the user to complete the task.
they are not easily understood by users directly. It is necessary Based on the above analysis, the offloading policy in
to provide users with an accurate and intuitive trust evaluation our framework aims to select the appropriate resource
method. Compared with the above solutions, trust evaluation provider for the user, taking into account latency and energy
in our framework is formalized as a classification problem in consumption.
machine learning.
Based on the above analysis, we will take hybrid trust III. PRELIMINARIES
factors into consideration and utilize a classification approach Corresponding to the two aspects of service trustworthiness,
in machine learning to establish a trust evaluation mechanism we need to introduce task sensitivity, identity trust evaluation,
for mobile edge computing. and behavior trust evaluation.
Task sensitivity and identity trust evaluation are introduced
B. TASK OFFLOADING POLICIES IN MOBILE to ensure the Priv − trustworthiness. We compare the task
EDGE COMPUTING sensitivity level with the identity trust level of a provider to
So far, task offloading has gained a lot of researchers’ atten- protect the privacy of the user. If the task sensitivity is higher
tion. An offloading policy is an important part of offloading than the identity trust level of a provider, it indicates that the
process, determining which tasks will be offloaded and where provider is unqualified to complete the task.
they will be offloaded. Behavior trust evaluation is introduced to ensure the
From the existing work, the objectives of offloading poli- Effe − trustworthiness. We compare the behavior level
cies are mainly divided into three types: reducing latency, required by the user and the behavior trust level of a provider
reducing energy consumption, and balancing latency and to ensure the effectiveness of services. If the behavior trust
energy consumption [18]. Zhang et al. [19] proposed an level of a provider is lower than the user’s required behavior
optimal offloading scheme with the goal of reducing latency level, the provider is unqualified. These providers who are
task is 0, that is, the task is not sensitive. If there are n TABLE 1. Elements of identity trust feature vector.
personal information items needed in a task, the number
of relevant sensitivity composed of each two personal
information items is Cn2 . Therefore, the computation of
task sensitivity has a low complexity O(n2 ).
0
if n = 0
St = f (s1 ) if n = 1 (1)
MAX F(si , sj ), f (si ), f (sj ) if n >= 2
B. FILTERING
The filtering module is mainly used to filter out unqualified
nodes. If the task sensitivity level is higher than a provider’s FIGURE 5. D2D connection associated with behavior trust graph.
identity trust level, the provider is unqualified. If the behavior
trust level of a provider is lower than the user’s required
behavior level, the provider is unqualified. device j, and the weight of the directed edge represents the
For the convenience of description, a computation task level of identity trust. In particular, when a device and another
model is constructed here. For a computation task, we use device belong to the same user, the weight of the directed edge
a five-tuple hIi , Li , Oi , Si , Bi i to describe it. Ii is the input between the two devices is 3.
data size of the task, which includes program code, input Next, we introduce the D2D connection graph and the
parameters, and so on. Li is the amount of computing resource D2D connection associated with behavior trust graph. Based
(i.e., number of CPU cycles) required by the task. Oi is the on the technology of D2D communication, we can acquire
output data size of the task. Si represents the sensitivity level the devices in the current D2D communication range in real
of the task, which is obtained by analyzing the sensitivity of time. These devices within the communication range can
the sensitive information set contained in the task. Bi repre- form a connectable graph, which is a D2D connection graph,
sents the behavior trust level required by the user generating as shown in Fig. 4. Each node represents a device. If there
the task. is a connection between two devices, it means that the two
To establish the relationship between the candidate devices are in the range of communication with each other.
resource providers and the devices generating tasks, we need If there is a small blue ellipse in a node, it indicates that a task
to construct three related graphs, which are described in detail is generated on the device node. The small ellipse has a task
as follows. sensitivity attribute Si which indicates that the sensitivity level
Specifically, we introduce the device identity trust graph of the task is r. On the basis of Fig. 4, we introduce behavior
Gtru to model the social tie among the devices, as shown trust between devices, and form a D2D connection associated
in Fig. 3. Each node represents a device. If there is a directed with behavior trust graph, as shown in Fig. 5. If there is a
edge from node i to node j, it indicates that the owner of directed edge from node i to node j, the weight of the edge
device i has an identity trust relationship with the owner of represents the behavior trust level of j given by i.
After constructing the above diagrams, we can perform Algorithm 1 Trust-Based Filtering Algorithm 1
filtering in the nodes filtering sub-module to remove those Input: a task Ti , task’s id: task_id
unqualified nodes. Output: d2dTrust[ ]
For a task Ti = hIi , Li , Oi , Si , Bi i on device i, the filtering
1: get device number device_i via task_id
module will remove the nodes that can not meet the require-
2: get the position location_i of devicei
ments of Si and Bi . Si determines the required identity trust
3: get the array d2dConnection [ ] of devices within the
level, while Bi determines the required behavior trust level.
D2D communication range of devicei via location_i
According to whether the task contains sensitive information,
4: si =getTaskSensitivity(Ti )
there are two cases.
5: bi =getBehaviorLevel(Ti )
In one case, when the task does not contain any sensitive
6: if si =0 then
information, we think that the sensitivity level of the task is
7: for each d2d_j in d2dConnection [ ] do
0. We no longer need to consider identity trust. For a task
8: Bt=getBehaviorTrust(device_i, d2d_j)
Ti on device i, the qualified node j in the array d2dTrust[ ]
9: if Bt > bi then
must satisfy the following requirement: In Fig. 5, there is an
10: d2dTrust [counter]=d2d_j
edge from i to j and the weight of the edge is greater than or
11: counter++
equal to Bi (i.e., Bi <= Bt(i, j) ). In this case, the qualified
12: end if
nodes in the array d2dTrust[ ] are within the range of its D2D
13: end for
communication and meet the required behavior trust level at
14: else
the same time.
15: get the owner deviceIOwner of device i by device_i
In the other case, when the task contains sensitive infor-
16: get the array social_person [ ] of human who have
mation, the sensitivity level of the task is Si . We need to
social relationship with deviceIOwner
combine Fig. 3 and Fig. 5 for filtering. For a task Ti on device
17: trustPerson[ ]=returnTrustPerson(si , social_person[ ])
i, the qualified node j in the array d2dTrust[ ] must satisfy the
following requirements: In Fig. 5, there is an edge from i to
18: for each d2d_j in d2dConnection [ ] do
j and the weight of the edge is greater than or equal to Bi
19: Bt=getBehaviorTrust(device_i, d2d_j)
(i.e., Bi <= Bt(i, j) ); in Fig. 3, there is an edge from i to j
20: if Bt > bi then
and the weight of the edge is greater than or equal to the Si of
21: deviceJOwner=getOwnerOfDevice(d2d_j)
the task in Fig. 5 (i.e., Si <= It(i, j) ).
22: if deviceIOwner==deviceJOwner then
We give the corresponding trust-based filtering algorithm 1
23: d2dTrust [counter]=d2d_j
as follows.
24: counter++
25: end if
C. SELECTION
26: for each trust_id in trustPerson [ ] do
Qualified nodes after filtering are considered to be trusted by 27: if deviceJOwner==trust_id then
the user both in identity and behavior. For one thing, they 28: d2dTrust [counter]=d2d_j
will not illegally obtain our sensitive information; for another, 29: counter++
they behave well during the task offloading process. 30: end if
Faced with a large number of candidate nodes, how to 31: end for
select a corresponding node to complete the task is gener- 32: end if
ally determined by an offloading policy. In an offloading 33: end for
policy, there may be only one execution mode or several 34: end if
optional execution modes. In this module, we adopt a hybrid 35: return d2dTrust [ ]
offloading policy, which mainly provides four alternative
modes of task execution, as shown in Fig. 6. This policy
mainly refers to the work of Chen et al. [29] and we expand • D2D-Assisted edge server offloaded execution: A
latency on this basis. The four modes it provides are described device with poor cellular connection first transmits its
as follows. computation task to a neighboring device through D2D
• Local execution: Users can choose to perform tasks
communication. The neighboring device has a strong
on their mobile devices without the overhead of task cellular connection, which can help it to offload the
offloading. task to an edge server for execution. After the task
• D2D offloaded execution: Devices in proximity at the
is completed, the output can be obtained through the
network edge can share their computing resources neighboring device.
through D2D communication to help other devices com- It is noteworthy that we think for users from users’ point of
plete their tasks, and these devices can benefit from the view to minimize the consumption of all users in the system.
mode. Edge servers (also known as MEC servers) generally have
• Direct edge server offloaded execution: A device can constant power supply. Therefore, we do not add the energy
offload its tasks directly to an edge server. consumption of MEC servers to the cost of execution modes.
V. PERFORMANCE EVALUATION
To verify the effectiveness of our proposed framework,
we have carried out some experiments. We mainly used
LIBSVM tool [30] for model training in trust evaluation
module and EdgeCloudSim [31], [32] for simulating mobile
edge computing environment. LIBSVM tool is an integrated
toolkit developed for supported vector machine and has
been widely used. EdgeCloudSim is a simulation tool that
supports the modeling of both computational and networking
resources to handle the edge computing scenarios and it
has good extensibility. It includes task generation module,
FIGURE 7. An illustration of bipartite graph of task execution modes. mobility module, network environment simulation module,
offloading policy module and so on. User devices include
how to choose an appropriate execution mode for each user? smart bracelet, wearable glasses, wearable medical devices,
The node selection sub-module can also help us to solve this mobile phones, tablets, computers, etc., covering a wide
problem. range. D2D connections between devices will change with
To face the multi-user scenario in MEC, the multi-user movement of devices, which depends on mobility mod-
offloading problem is reduced to a matching problem of ule in the EdgeCloudSim. Meanwhile, the cellular data
bipartite graph. To minimize the overhead of the whole sys- rate decreases with the increase of the number of devices
tem, we use the minimum-weight bipartite perfect matching in the hotspot, because we simulate the network environ-
solution over the bipartite graph to select a suitable node for ment by this tool. We modified and extended this tool
each user device to complete a task. to test the effectiveness of our framework. In particular,
The nodes left by the common action of the three graphs we searched for answers to the following three research
of the filtering module are qualified. If users request the questions:
behavior trust level of resource providers to be acceptable, • RQ1: How does the classification of machine learning
a bipartite graph consisting of the candidate nodes (edge perform in trust evaluation (i.e., identity trust and behav-
servers or qualified devices) and the tasks nodes waiting to ior trust)?
select execution modes is shown in Fig. 7. The graph is • RQ2: After introducing behavior trust evaluation, can
divided into the side of task generation (referred to as the the misbehaving nodes be filtered out for users to
initial side) and the side of optional execution modes (referred improve the performance of task offloading?
to as the execution side). A node i of the initial side indicates • RQ3: What is the performance of our framework in
that device i has a task, and a node j of the execution side reducing latency or energy consumption for users?
represents an optional object for task offloading. The weight
of one edge represents the time and energy consumption A. EXPERIMENTS ON RQ1
when a task chooses this execution mode. The construction 1) EXPERIMENTAL DESIGN OF PREDICTION PERFORMANCE
method of the bipartite graph is given as follows. By using the Firstly, we need to collect relevant data, and then label them
minimum-weight bipartite perfect matching method, we can with different levels. Secondly, after the dataset is ready,
choose an appropriate node for each task. For our prob- to give full play to its performance, SVM needs to select an
lem, the number of edges is proportional to the number of appropriate kernel, the kernel’s parameters, and soft margin
nodes N, and hence our bipartite matching method has a parameter C. Since there may be linearly inseparable in trust
low complexity of O(N 2 ), which can scale well for practical evaluation, we choose the RBF kernel. The best combination
implementation. of C and γ is often selected by a grid search with expo-
• Local execution: There is an edge between a task node i nentially growing sequences of C and the kernel’s parameter
and its corresponding local node i, and the weight of this γ . Finally, there are several measures commonly used in
edge is θil . machine learning. For each category, a confusion matrix is
• D2D offloaded execution: There is an edge between a shown in Tab. 3, where m1 represents the number of items
task node i and a node j if node j is in i’s d2dTrust[ ] after correctly predicted for the category, m2 represents the number
filtering for device i, and the weight of this edge is θijd . of items that should fall into this category but are predicted
• Direct edge server offloaded execution: There is an edge to fall outside that category, m3 represents the number of
between a task node i and its subscribed server node, and items that do not belong to this category but are predicted
the weight of this edge is θimc .
to fall into this category, and m4 represents the number of
• D2D-Assisted edge server offloaded execution: There is items that do not belong to this category and are correctly
an edge between a task node i and a bundled node (j and predicted. In our experiments, three measures are taken into
the edge server serving for j) if node j is in i’s d2dTrust[ ] consideration: precision, recall and F-measure. The precision
after filtering for device i, and the weight of this P is P = m1 / (m1 + m3 ). The recall R is R = m1 / (m1 + m2 ),
edge is θijdc . and the F-measure is defined as F = 2PR/ (P + R).
2) THE RESULT
RQ3: What is the performance of our framework in reducing
latency or energy consumption for users?
In Web services, users need to provide some personal
information required by services as input when enjoying
services. Similar to Web services, a task generated by an
application needs to collect some personal information as
FIGURE 12. Energy reduction rate.
input to complete a specific function. The information items
that need to be collected are predetermined, predefined, and
limited in number. For the computation of task sensitivity, The average energy reduction rate of the two scenarios
if there are n personal information items needed in a task, is shown in Fig. 12. As the number of devices increases,
the number of relevant sensitivity composed of each two the number of alternative devices for D2D connections
personal information items is Cn2 . Therefore, combined with increases, so the energy reduction rate increases a little under
the analysis of the task sensitivity formula, the computation TATOF. As the number of devices continues to grow, the cel-
of task sensitivity has a low complexity of O(n2 ). For the lular data rate between devices in a hotspot and edge servers
trust evaluation, once the model is completed in the training decreases. As a result, transmission time increases and energy
phase, the trust classifier is obtained. In practice, the time reduction rate in the system decreases. Under TATOF, with
cost of predicting trust level based on the classifier is low. the help of D2D and D2D-Assist execution modes, the energy
For the filtering process, if the number of devices in the reduction rate is superior to that of only_edge scenario.
communication range of device i is N , the process has a In conclusion, although our TATOF takes into account trust
low complexity of O(N 2 ) because the identity trust level and evaluation mechanism and filters out unqualified resource
behavior trust level of these N devices need to be considered providers to ensure service trustworthiness, it can still reduce
at the same time. Therefore, our framework does not cause latency or energy consumption for users.
too much time overhead.
As the number of devices in the system increases, the aver- VI. CONCLUSION AND FUTURE WORK
age time reduction rate of the two scenarios is shown We introduce online social networks into mobile edge com-
in Fig. 11. When the number of devices in the system puting and propose a trust-aware task offloading framework.
increases gradually, the cellular data rate between a device To ensure the trustworthiness of services, we introduce iden-
in a hotspot and an edge server decreases, and the trans- tity trust and behavior trust into trust evaluation in mobile
mission time increases. At the same time, as the number of edge computing. To address the challenge that it is difficult to
devices increases, edge servers have to handle more tasks, assign an appropriate weight to each trust factor, we formalize
so the servers’ response time to tasks increases. Due to the trust evaluation of mobile edge computing into a classifica-
above two reasons, the time reduction rate of only_edge is tion problem. Then, we filter out unqualified nodes that do not
gradually reduced, and our TATOF, with the help of D2D meet the requirements of tasks. Finally, the selection module
and D2D-Assist execution modes, can still maintain a better selects one of the qualified providers for a user to execute the
performance than only_edge. task based on the offloading policy. Based on our framework,
we are able to reduce latency or energy consumption and [19] K. Zhang, Y. Mao, S. Leng, S. Maharjan, and Y. Zhang, ‘‘Optimal delay
ensure the trustworthiness of the services for users. constrained offloading for vehicular edge computing networks,’’ in Proc.
ICC, Paris, France, May 2017, pp. 1–6.
In future work, we plan to add more related factors into a [20] F. Liu, Z. Huang, and L. Wang, ‘‘Energy-efficient collaborative task com-
trust feature vector and conduct experiments on larger dataset. putation offloading in cloud-assisted edge computing for IoT sensors,’’
Meanwhile, we will conduct further research on mobility Sensors, vol. 19, no. 5, p. 1105, Mar. 2019.
[21] C. Dong and W. Wen, ‘‘Joint optimization for task offloading in edge
management of task migration. When a device is out of the computing: An evolutionary game approach,’’ Sensors, vol. 19, no. 3,
original communication range due to movement, we want to p. 740, Feb. 2019.
choose an appropriate way to return the output data of the task [22] K. Li, M. Tao, and Z. Chen, ‘‘Exploiting computation replication for
mobile edge computing: A fundamental computation-communication
to the device. tradeoff study,’’ 2019, arXiv:1903.10837. [Online]. Available: https://
arxiv.org/abs/1903.10837
REFERENCES [23] A. Al-Shuwaili and O. Simeone, ‘‘Energy-efficient resource alloca-
tion for mobile edge computing-based augmented reality applica-
[1] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ‘‘A survey of mobile cloud tions,’’ IEEE Wireless Commun. Lett., vol. 6, no. 3, pp. 398–401,
computing: Architecture, applications, and approaches,’’ Wireless Com- Jun. 2017.
mun. Mobile Comput., vol. 13, no. 18, pp. 1587–1611, Dec. 2013. [24] Standards for Privacy of Individually Identifiable Health Information,
[2] E. Cuervo, A. Balasubramanian, D.-K. Cho, A. Wolman, S. Saroiu, Standard 45 CFR Parts 160 and 164, HIPAA, Dec. 2000.
R. Chandra, and P. Bahl, ‘‘MAUI: Making smartphones last longer [25] J. R. Weible, ‘‘Privacy and data: An empirical study of the influence
with code offload,’’ in Proc. MobiSys, San Francisco, CA, USA, 2010, of types of data and situational context upon privacy perceptions,’’
pp. 49–62. Ph.D. dissertation, Dept. Elect. Eng., Mississippi State Univ., Starkville,
[3] Z. M. Fadlullah, F. Tang, B. Mao, N. Kato, O. Akashi, T. Inoue, MS, USA, 1993.
and K. Mizutani, ‘‘State-of-the-art deep learning: Evolving machine [26] W. Sherchan, S. Nepal, and C. Paris, ‘‘A survey of trust in social
intelligence toward tomorrow’s intelligent network traffic control sys- networks,’’ ACM Comput. Surv., vol. 45, no. 4, pp. 47:1–47:33,
tems,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 4, pp. 2432–2455, Aug. 2013.
4th Quart., 2017. [27] G. Yin, F. Jiang, S. Cheng, X. Li, and X. He, ‘‘AUTrust: A practical trust
[4] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, ‘‘A survey on measurement for adjacent users in social networks,’’ in Proc. CGC, Hunan,
mobile edge computing: The communication perspective,’’ IEEE Commun. China, Nov. 2012, pp. 360–367.
Surveys Tuts., vol. 19, no. 4, pp. 2322–2358, 4th Quart., 2017. [28] K. Zhao and L. Pan, ‘‘A machine learning based trust evaluation framework
[5] F. Bonomi, R. A. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and for online social networks,’’ in Proc. IEEE TrustCom, Beijing, China,
its role in the Internet of Things,’’ in Proc. MCC SIGCOMM, Helsinki, Sep. 2014, pp. 69–74.
Finland, 2012, pp. 13–16. [29] X. Chen, Z. Zhou, W. Wu, D. Wu, and J. Zhang, ‘‘Socially-motivated coop-
[6] J. Zhang, B. Chen, and Y. Zhao, ‘‘Data security and privacy-preserving in erative mobile edge computing,’’ IEEE Netw., vol. 32, no. 6, pp. 177–183,
edge computing paradigm: Survey and open issues,’’ IEEE Access, vol. 6, Nov./Dec. 2018.
pp. 18209–18237, 2018. [30] C.-C. Chang and C.-J. Lin, ‘‘LIBSVM: A library for support vector
[7] M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, ‘‘Security machines,’’ ACM Trans. Intell. Syst. Technol., vol. 2, no. 3, pp. 27:1–27:27,
and privacy in device-to-device (D2D) communication: A review,’’ IEEE 2011.
Commun. Surveys Tuts., vol. 19, no. 2, pp. 1054–1079, 2nd Quart., 2017. [31] C. Sonmez, A. Ozgovde, and C. Ersoy, ‘‘EdgeCloudSim: An envi-
[8] R. Roman, J. López, and M. Mambo, ‘‘Mobile edge computing, fog et al.: ronment for performance evaluation of edge computing systems,’’
A survey and analysis of security threats and challenges,’’ Future Gener. Trans. Emerg. Telecommun. Technol., vol. 29, no. 11, Aug. 2018,
Comp. Syst., vol. 78, pp. 680–698, Jan. 2018. Art. no. e3493.
[9] G. Shang-Fu and Z. Jian-Lei, ‘‘A survey of reputation and trust mechanism [32] Simulation Tools: EdgeCloudSim. Accessed: Oct. 16, 2019. [Online].
in peer-to-peer network,’’ in Proc. Int. Conf. Ind. Control Electron. Eng., Available: http://github.com/CagataySonmez/EdgeCloudSim
Aug. 2012, pp. 116–119. [33] Kddcup. Accessed: Oct. 16, 2019. [Online]. Available: http://www.
[10] Z. Yan, P. Zhang, and A. V. Vasilakos, ‘‘A survey on trust management kddcup2012.org/c/kddcup2012-track1
for Internet of Things,’’ J. Netw. Comput. Appl., vol. 42, pp. 120–134, [34] X. Chen and J. Zhang, ‘‘When D2D meets cloud: Hybrid mobile
Jun. 2014. task offloadings in fog computing,’’ in Proc. IEEE ICC, Paris, France,
[11] W. Li, J. Cao, K. Hu, J. Xu, and R. Buyya, ‘‘A trust-based agent learning May 2017, pp. 1–6.
model for service composition in mobile cloud computing environments,’’ [35] X. Chen, L. Pu, L. Gao, W. Wu, and D. Wu, ‘‘Exploiting massive D2D
IEEE Access, vol. 7, pp. 34207–34226, 2019. collaboration for energy-efficient mobile edge computing,’’ IEEE Wireless
[12] X. Lin, R. Lu, X. Liang, and X. Shen, ‘‘STAP: A social-tier-assisted packet Commun., vol. 24, no. 4, pp. 64–71, Aug. 2017.
forwarding protocol for achieving receiver-location privacy preservation
in VANETs,’’ in Proc. IEEE Comput. Commun. Soc., Shanghai, China,
Apr. 2011, pp. 2147–2155.
[13] M. Hussain and B. M. Almourad, ‘‘Trust in mobile cloud computing with
LTE-based deployment,’’ in Proc. IEEE 14th Int. Conf. Commun. Assoc.
Workshops, Bali, Indonesia, Dec. 2014, pp. 643–648.
[14] W. Ahmad, S. Wang, A. Ullah, Sheharyar, and Z. Mahmood, ‘‘Reputation-
aware trust and privacy-preservation for mobile cloud computing,’’ IEEE
Access, vol. 6, pp. 46363–46381, 2018.
[15] P. Zhou, K. Wang, J. Xu, and D. Wu, ‘‘Differentially-private and trustwor-
thy online social multimedia big data retrieval in edge computing,’’ IEEE
Trans. Multimedia, vol. 21, no. 3, pp. 539–554, Mar. 2019.
[16] J. Xu, S. Wang, B. K. Bhargava, and F. Yang, ‘‘A blockchain-enabled DEXIANG WU received the B.S. degree in com-
trustless crowd-intelligence ecosystem on mobile edge computing,’’ puter science from Jiangsu Normal University.
IEEE Trans. Ind. Informat., vol. 15, no. 6, pp. 3538–3547, Jun. 2019. She is currently pursuing the M.S. degree with
doi: 10.1109/TII.2019.2896965. the Computer Science Department, Nanjing Uni-
[17] J. Yuan and X. Li, ‘‘A multi-source feedback based trust calculation versity of Aeronautics and Astronautics, Nanjing.
mechanism for edge computing,’’ in Proc. IEEE INFOCOM, Honolulu, Her current research interests include mobile edge
HI, USA, Apr. 2018, pp. 819–824. computing, cloud computing, access control, pri-
[18] M.-H. Chen, B. Liang, and M. Dong, ‘‘Joint offloading decision and vacy preservation, and service composition.
resource allocation for multi-user multi-task mobile cloud,’’ in Proc. IEEE
ICC, Kuala Lumpur, Malaysia, May 2016, pp. 1–6.
GUOHUA SHEN received the M.S. and Ph.D. YAN CAO is currently pursuing the Ph.D. degree
degrees in computer science from the Nanjing Uni- with the Computer Science Department, Nanjing
versity of Aeronautics and Astronautics, China. University of Aeronautics and Astronautics, Nan-
He is currently an Associate Professor with the jing. Her research interests include formal method,
College of Computer Science and Engineering, access control, cyber physical systems, informa-
Nanjing University of Aeronautics and Astronau- tion security and privacy preservation, and mobile
tics. His research interests include requirement edge computing.
traceability, fog computing, description logic,
semantic web, and web services and ontology.