Abstract
Edge computing offloading involves moving computational tasks from traditional cloud computing data centers to edge servers or terminal devices closer to data sources, or idle resource devices. This aims to reduce task response times and enhance service efficiency. However, the dynamic and unreliable nature of edge computing environments can lead to malicious attacks on resource devices, potentially compromising system trustworthiness. Current research primarily focuses on performance optimization and latency reduction, often overlooking service trustworthiness. Therefore, this paper addresses resource device trustworthiness in edge computing, proposing an efficient multi-source trust aggregation scheme to ensure the selection of trustworthy service providers for edge computing offloading. It establishes trust relationships, combines direct and indirect trust, and introduces time decay and energy factors for trust evaluation. Furthermore, the paper integrates trust measurement with collaborative filtering and presents an adaptive aggregation algorithm for calculating and updating global trustworthiness. Through simulation experiments, it validates the effectiveness of the proposed scheme in the selection of service providers for edge computing offloading. The results demonstrate that this approach effectively filters unreliable recommendations, reduces interference from malicious nodes, and enhances the trustworthiness and stability of edge computing offloading services.
Similar content being viewed by others
References
Adewuyi AA, Cheng H, Shi Q, Cao J, Macdermott A, Wang X (2019) Ctrust: a dynamic trust model for collaborative applications in the internet of things. IEEE Int Things J 6(3):5432–5445. https://doi.org/10.1109/JIOT.2019.2902022
Alnasser A, Sun H, Jiang J (2020) Recommendation-based trust model for vehicle-to-everything (v2x). IEEE Int Things J 7(1):440–450. https://doi.org/10.1109/JIOT.2019.2950083
Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) Btem: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605–616. https://doi.org/10.1016/j.future.2019.02.004
Bajaj K, Sharma B, Singh R (2022) Implementation analysis of iot-based offloading frameworks on cloud/edge computing for sensor generated big data. Comp Int Syst 8(5):3641–3658. https://doi.org/10.1007/s40747-021-00434-6
Cao K, Liu Y, Meng G, Sun Q (2020) An overview on edge computing research. IEEE Access 8:85714–85728. https://doi.org/10.1109/ACCESS.2020.2991734
Chae Y, DiPippo LC, Sun YL (2015) Trust management for defending on-off attacks. IEEE Trans Parallel Distrib Syst 26(4):1178–1191. https://doi.org/10.1109/TPDS.2014.2317719
Chen X, Liu G (2022) Federated deep reinforcement learning-based task offloading and resource allocation for smart cities in a mobile edge network. Sensors 22(13):4738. https://doi.org/10.3390/s22134738
Deng X, Guan P, Wan Z, Liu E, Luo J, Zhao Z, Liu Y, Zhang H (2018) Integrated trust based resource cooperation in edge computing. J Comput Res Dev 55(3):449–477
Golpîra H, Khan SAR, Safaeipour S (2021) A review of logistics internet-of-things: current trends and scope for future research. J Indust Inform Integrat 22:100194. https://doi.org/10.1016/j.jii.2020.100194
Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408–25420. https://doi.org/10.1109/ACCESS.2017.2769878
Kong W, Li X, Hou L, Li Y (2020) An efficient and credible multi-source trust fusion mechanism based on time decay for edge computing. Electronics. https://doi.org/10.3390/electronics9030502
Kumar R, Rani S, Awadh MA (2022) Exploring the application sphere of the internet of things in industry 4.0: a review, bibliometric and content analysis. Sensors 22(11):4276. https://doi.org/10.3390/s22114276
Li W, Song H (2015) Art: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Int Transport Syst 17(4):960–969. https://doi.org/10.1109/TITS.2015.2494017
Mohammed LB, Anpalagan A, Jaseemuddin M (2021) Energy and latency efficient caching in mobile edge networks: Survey, solutions, and challenges. Wireless Personal Commun. https://doi.org/10.1007/s11277-023-10187-9
Mousa A, Bentahar J, Alam O (2021) Multi-dimensional trust for context-aware services computing. Expert Syst with Appl 172:114592. https://doi.org/10.1016/j.eswa.2021.114592
Niwattanakul S, Singthongchai J, Naenudorn E, Wanapu S (2013) Using of jaccard coefficient for keywords similarity. In: Proceedings of the International Multiconference of Engineers and Computer Scientists, vol. 1, pp. 380–384
Naouri A, Wu H, Nouri NA, Dhelim S, Ning H (2021) A novel framework for mobile-edge computing by optimizing task offloading. IEEE Int. Things J 8(16):13065–13076. https://doi.org/10.1109/JIOT.2021.3064225
Ogundoyin SO, Kamil IA (2021) A trust management system for fog computing services. Int Things 14:100382. https://doi.org/10.1016/j.iot.2021.100382
Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput Sec 112:102494. https://doi.org/10.1016/j.cose.2021.102494
Pang B, Teng Z, Sun H, Du C, Li M, Zhu W (2021) A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network. IEEE Wireless Commun Lett 10(8):1613–1617. https://doi.org/10.1109/LWC.2021.3070630
Ranaweera P, Jurcut AD, Liyanage M (2021) Survey on multi-access edge computing security and privacy. IEEE Commun Surv Tutorials 23(2):1078–1124. https://doi.org/10.1109/COMST.2021.3062546
Rydning DR-JG-J, Reinsel J, Gantz J (2018) The digitization of the world from edge to core. Framingham Int Data Corp 16:1–28
Shabut AM, Dahal KP, Bista SK, Awan IU (2014) Recommendation based trust model with an effective defence scheme for manets. IEEE Trans Mobile Comput 14(10):2101–2115. https://doi.org/10.1109/TMC.2014.2374154
Suh T, Cho Y (2019) An enhanced trust mechanism with consensus-based false information filtering algorithm against bad-mouthing attacks and false-praise attacks in wsns. Electronics 8(11):1359. https://doi.org/10.3390/electronics8111359
Sun B, Li D (2017) A comprehensive trust-aware routing protocol with multi-attributes for wsns. IEEE Access 6:4725–4741. https://doi.org/10.1109/ACCESS.2017.2786944
Tisue S, Wilensky U (2004) Netlogo: a simple environment for modeling complexity. Int Conf Complex Syst 21:16–21
Uslaner EM (2018) The Oxford Handbook of Social and Political Trust. Oxford University Press
Velusamy D, Pugalendhi G, Ramasamy K (2019) A cross-layer trust evaluation protocol for secured routing in communication network of smart grid. IEEE J Select Areas Commun 38(1):193–204. https://doi.org/10.1109/JSAC.2019.2952035
Wang T, Qiu L, Sangaiah AK, Liu A, Bhuiyan MZA, Ma Y (2020) Edge-computing-based trustworthy data collection model in the internet of things. IEEE Int Things J 7(5):4218–4227. https://doi.org/10.1109/JIOT.2020.2966870
Wu Q, Liu Q, Zhang L, Zhang Z (2014) A trusted routing protocol based on geodtn+ nav in vanet. China Commun 11(14):166–174. https://doi.org/10.1109/CC.2014.7085617
Wu X, Huang J, Ling J, Shu L (2019) Bltm: beta and lqi based trust model for wireless sensor networks. IEEE Access 7:43679–43690. https://doi.org/10.1109/ACCESS.2019.2905550
Xia H, Xiao F, Zhang S-s, Hu C-q, Cheng X-z (2019) Trustworthiness inference framework in the social internet of things: A context-aware approach. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 838–846. https://doi.org/10.1109/INFOCOM.2019.8737491 . IEEE
Yu S, Dab B, Movahedi Z, Langar R, Wang L (2020) A socially-aware hybrid computation offloading framework for multi-access edge computing. IEEE Trans Mobile Comput 19(6):1247–1259. https://doi.org/10.1109/TMC.2019.2908154
Zaman SKu, Jehangiri AI, Maqsood T, Haq Nu, Umar AI, Shuja J, Ahmad Z, Dhaou IB, Alsharekh MF (2023) Limpo: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing. Cluster Comput 26(1):99–117. https://doi.org/10.1007/s10586-021-03518-7
Zhang P, Zhou M, Kong Y (2021) A double-blind anonymous evaluation-based trust model in cloud computing environments. IEEE Trans Syst , Man, Cybernet: Syst 51(3):1805–1816. https://doi.org/10.1109/TSMC.2019.2906310
Zhang L, Zou Y, Wang W, Jin Z, Su Y, Chen H (2021) Resource allocation and trust computing for blockchain-enabled edge computing system. Comput Sec 105:102249. https://doi.org/10.1016/j.cose.2021.102249
Author information
Authors and Affiliations
Contributions
Chunxiang Wang and Guiping Zheng wrote the main manuscript text and Zhangbing Zhou developed the overall logical framework and prepared the pictures. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, C., Zhou, Z. & Zheng, G. Efficient weighted multi-source trust aggregation scheme for edge computing offloading. Soc. Netw. Anal. Min. 14, 33 (2024). https://doi.org/10.1007/s13278-023-01196-4
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-023-01196-4