Blockchain-Based Resource Allocation Model in Fog Computing
Abstract
:1. Introduction
1.1. Background
1.2. Related Works
1.3. Motivations and Contributions
- A blockchain-based fog computing resource contribution model is proposed, which considers a satisfaction degree (task completion degree) as an evaluation index for service provided by fog computing service providers.
- Using differential game theory to solve the proposed model, the numerical simulation is used to discuss the interaction between the optimal resource contribution strategy of the fog node and the optimal benefit under the optimal strategy.
2. Materials and Methods
2.1. Problem Formulation and System Model
- Setup: When a new node (whose public and private key is ) is added to the system, the newly joined node first updates its public key to the member public key ; next, the new public key will be used to calculate the membership signature :
- Proposal: The types of proposals in the consensus phase mainly include the consensus node in the alliance chain, which allows the new node to join the new consensus member proposal in the alliance, ; proposal to package “transaction information” into blocks and upload them to the alliance chain, ; proposal to deal with forks and eventually reach a consensus, ; proposal to discover and punish a malicious user, .
- Consensus identity generation: When the consensus node of the alliance chain receives the proposal to create a new consensus member, it verifies that the random function calculates the condition of participating in the consensus committee according to its stack. If the condition is met and the identity is legal, the consensus vote is performed. The specific algorithm is shown in Algorithm 1.
Algorithm 1. Algorithm of creating a new node in Delegated Proof of Stake (DPoS). Input: (The influence of the fog computing node, stake); (Node information); seed: or ; prop:creat Output: MCC: Membership of Consensus Committee or Null 1: ; ; 2: 3: 4: while do 5: 6: end while 7: if i > 0 then 8: 9: 10: return 11: else 12: return null - Voting: consensus nodes with legal status in the alliance chain vote for consensus based on the type of proposal received, as shown below:
- Counting: The node of the alliance chain collects the consensus votes received. When the number of votes of a proposal exceeds the threshold set by the system and the signature set is verified, the consensus node reaches a consensus.
- Cryptographic digital currency is a decentralized currency compared to legal tender. As the most successful product of blockchain technology, cryptographic digital currency allows people to move freely and securely from one currency to another without the help of intermediaries. The issuance of money is done spontaneously and impartially by the participants and is not supervised by any external agency, even the central bank or government agency.
- Compared with legal tender, encrypted digital currency is encrypted and anonymous. Encrypted digital currency based on blockchain technology has all the advantages of blockchain technology to ensure the security of all aspects of currency circulation. Moreover, the private key is the only voucher for holding the currency. The public key is publicly disclosed and does not bind any personal information of the private key holder, making the operation anonymous.
- Compared with traditional electronic currency, digital currency is a kind of currency that cannot be tampered with and is open and transparent. Since accounts for encrypted digital currency are recorded in the public ledger of blockchain, it means that transactions for digital currency, once confirmed, cannot be tampered with and are open to all users across the network.
- Compared with traditional electronic money, digital money can deliver value. In the Internet, traditional electronic currency can only deliver information, but cannot deliver value. Every transfer of encrypted digital currency in the network is itself a transfer of value, and transfer is a re-authorization of the right to use value.
2.2. Game Formulation and Model Solving
Algorithm 2. The resources contribution algorithm of fog computing nodes based on blockchain. |
A Differential Game Algorithm for Fog Computing Node Resource Contribution Based on Blockchain |
Input: Total number of nodes N, Differential equation (21) |
Output: Optimal strategy , Optimal income , Satisfaction |
1. Set equation parameters , , , , , , , , , , , |
2. For t = 1 to T |
3. Solve the optimal strategy using equations (11), (14), and (16) |
4. Using equation (18) to solve the optimal benefit and satisfaction |
5. Solving the optimal state trajectory using equation (21) |
6. End For |
7. Return optimal state, optimal strategy and optimal revenue track |
3. Results
4. Discussion
Author Contributions
Funding
Conflicts of Interest
References
- Ai, Z.; Zhou, Y.; Song, F. A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors 2018, 18, 1926. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Bonomi, F. Connected vehicles, the internet of things, and fog computing. In Proceedings of the Eighth ACM International Workshop on Vehicular Inter-Networking (VANET), Las Vegas, NV, USA, 19–23 September 2011; pp. 13–15. [Google Scholar]
- Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
- Song, F.; Ai, Z.; Zhou, Y.; You, I.; Choo, R.; Zhang, H. Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks. IEEE Trans. Ind. Inform. 2019. [Google Scholar] [CrossRef]
- Vaquero, L.M.; Rodero-Merino, L. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 2014, 44, 27–32. [Google Scholar] [CrossRef]
- Lin, F.; Zhou, Y.; You, I.; Lin, J.; An, X.; Lv, X. Content recommendation algorithm for intelligent navigator in fog computing based iot environment. IEEE Access 2019, 7, 53677–53686. [Google Scholar] [CrossRef]
- Lin, F.; Zhou, Y.; Pau, G.; Collotta, M. Optimization-oriented resource allocation management for vehicular fog computing. IEEE Access 2018, 6, 69294–69303. [Google Scholar] [CrossRef]
- Ai, Z.; Liu, Y.; Chang, L.; Lin, F.; Song, F. A Smart Collaborative Authentication Framework for Multi-dimensional Fine-grained Control. IEEE Access. in press.
- Aazam, M.; Huh, E.N. Fog computing and smart gateway based communication for cloud of things. In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 27–29 August 2014; pp. 464–470. [Google Scholar]
- Datta, S.K.; Bonnet, C.; Haerri, J. Fog computing architecture to enable consumer centric internet of things services. In Proceedings of the 2015 International Symposium on Consumer Electronics (ISCE), Madrid, Spain, 24–26 June 2015; pp. 1–2. [Google Scholar]
- Hui, H.; Zhou, C.; An, X.; Lin, F. A new resource allocation mechanism for security of mobile edge computing system. IEEE Access 2019, 7, 116886–116899. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 24 September 2019).
- Yuan, Y.; Wang, F. Blockchain: The state of the art and future trends. Acta Autom. Sin. 2016, 42, 481–494. [Google Scholar]
- Idelberger, F.; Governatori, G.; Riveret, R.; Sartor, G. Evaluation of logic-based smart contracts for blockchain systems. In International Symposium on Rules and Rule Markup Languages for the Semantic Web; Springer: Cham, Switzerland, 2016; pp. 167–183. [Google Scholar]
- Jakobsson, M.; Juels, A. Proofs of Work and Bread Pudding Protocols (Extended Abstract). In Secure Information Networks; Springer: Boston, MA, USA, 1999. [Google Scholar]
- Proof of Stack. Available online: https://en.bitcoin.it/wiki/Proof_of_Stake (accessed on 24 September 2019).
- Delegated Proof of Stake. Available online: http://docs.bitshares.org/bitshares/dpos.html (accessed on 24 September 2019).
- Song, F.; Zhou, Y.; Wang, Y.; Zhao, T.; You, I.; Zhang, H. Smart collaborative distribution for privacy enhancement in moving target defense. Inf. Sci. 2019, 479, 593–606. [Google Scholar] [CrossRef]
- Zhang, H.; Zhang, Y.; Gu, Y.; Niyato, D.; Han, Z. A hierarchical game framework for resource management in fog computing. IEEE Commun. Mag. 2017, 55, 52–57. [Google Scholar] [CrossRef]
- Zhao, Y.; Huang, Z.; Zhang, X.; Liu, W.; Zhang, Q.; Zhu, Z. A coalitional game based mechanism for resource sharing in geo-distributed mobile cloud computing. In Proceedings of the 2017 29th Chinese Control and Decision Conference (CCDC), Chongqing, China, 28–30 May 2017; pp. 3758–3763. [Google Scholar]
- Nishio, T.; Shinkuma, R.; Takahashi, T.; Mandayam, N. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In Proceedings of the first international workshop on Mobile cloud computing & networking, Bangalore, India, 29 July 2013; pp. 19–26. [Google Scholar]
- Dong, X.; Zheng, J.; Cai, Y.; Yang, J.; Wang, Y. Share communication and energy resources for mobile cloud computing: An optimal cooperative contract approach. In Proceedings of the 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 11–13 October 2017; pp. 1–6. [Google Scholar]
- Ye, D.; Wu, M.; Tang, S.; Yu, R. Scalable fog computing with service offloading in bus networks. In Proceedings of the 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), Beijing, China, 25–27 June 2016; pp. 247–251. [Google Scholar]
- Su, J.; Lin, F.; Zhou, X.; Lv, X. Steiner tree based optimal resource caching scheme in fog computing. China Commun. 2015, 12, 161–168. [Google Scholar] [CrossRef]
- Alsaffar, A.A.; Pham, H.P.; Hong, C.S.; Huh, E.N.; Aazam, M. An architecture of IoT service delegation and resource allocation based on collaboration between fog and cloud computing. Mob. Inf. Syst. 2016, 2016, 6123234. [Google Scholar] [CrossRef] [Green Version]
- Shi, H.; Chen, N.; Deters, R. Combining mobile and fog computing: Using CoAP to link mobile device clouds with fog computing. In Proceedings of the 2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS), Sydney, Australia, 11–13 December 2015; pp. 564–571. [Google Scholar]
- Neto, E.C.P.; Callou, G.; Aires, F. An algorithm to optimise the load distribution of fog environments. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; pp. 1292–1297. [Google Scholar]
- Kochar, V.; Sarkar, A. Real time resource allocation on a dynamic two level symbiotic fog architecture. In Proceedings of the 2016 Sixth International Symposium on Embedded Computing and System Design (ISED), Patna, India, 15–17 December 2016; pp. 49–55. [Google Scholar]
- Chen, M.H.; Dong, M.; Liang, B. Resource sharing of a computing access point for multi-user mobile cloud offloading with delay constraints. IEEE Trans. Mob. Comput. 2018, 17, 2868–2881. [Google Scholar] [CrossRef] [Green Version]
- Agarwal, S.; Yadav, S.; Yadav, A.K. An architecture for elastic resource allocation in Fog computing. Int. J. Comput. Sci. Commun. 2015, 6, 201–207. [Google Scholar]
- Deng, R.; Lu, R.; Lai, C.; Luan, T.H. Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. In Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 3909–3914. [Google Scholar]
- Song, F.; Zhou, Y.; Liu, C.; Zhang, H. Modeling Space-Terrestrial Integrated Networks with Smart Collaborative Theory. IEEE Netw. 2019, 33, 51–57. [Google Scholar] [CrossRef]
- Cech, H.L.; Grobmann, M.; Krieger, U.R. A Fog Computing Architecture to Share Sensor Data by Means of Blockchain Functionality. In Proceedings of the 2019 IEEE International Conference on Fog Computing (ICFC), Prague, Czech Republic, 24–26 June 2019; pp. 31–40. [Google Scholar]
- Tang, W.; Zhao, X.; Rafique, W.; Wanchun, D. A Blockchain-Based Offloading Approach in Fog Computing Environment. In Proceedings of the 2018 IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, Australia, 11–13 December 2018; pp. 308–315. [Google Scholar]
- Pradip, K.; Sharma, P.K.; Chen, M.Y.; Park, J.H. A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 2018, 6, 115–124. [Google Scholar]
- Seitz, A.; Henze, D.; Miehle, D.; Bruegge, B.; Nickles, J.; Sauer, M. Fog Computing as Enabler for Blockchain-Based IIoT App Marketplaces—A Case Study. In Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain, 15–18 October 2018; pp. 182–188. [Google Scholar]
- Kumar, G.; Saha, R.; Rai, M.K.; Thomas, R.; Kim, T.H. Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 2019, 6, 6835–6842. [Google Scholar] [CrossRef]
- Zhu, X.; Badr, Y. Fog Computing Security Architecture for the Internet of Things Using Blockchain-Based Social Networks. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1361–1366. [Google Scholar]
- Jiao, Y.; Wang, P.; Niyato, D.; Suankaewmanee, K. Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks. IEEE Trans. Parallel Distrib. Syst. 2019, 30, 1975–1989. [Google Scholar] [CrossRef] [Green Version]
- Li, M.; Zhu, L.; Lin, X. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J. 2019, 6, 4573–4584. [Google Scholar] [CrossRef]
- Almadhoun, R.; Kadaha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–8. [Google Scholar]
- Pan, J.; Wang, J.; Hester, A.; Alqerm, I.; Liu, Y.; Zhao, Y. EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts. IEEE Internet Things J. 2019, 6, 4719–4732. [Google Scholar] [CrossRef] [Green Version]
- Hui, H.; Zhou, C.; Xu, S.; Lin, F. A novel secure data transmission scheme in industrial internet of things. China Commun. 2020, 17, 73–88. [Google Scholar]
- Zhou, T.; Li, X.; Zhao, H. DLattice: A permission-less blockchain based on DPoS-BA-DAG consensus for data tokenization. IEEE Access 2019, 7, 39273–39287. [Google Scholar] [CrossRef]
- Ai, Z.; Liu, Y.; Song, F.; Zhang, H. A smart collaborative charging algorithm for mobile power distribution in 5G networks. IEEE Access 2018, 6, 28668–28679. [Google Scholar] [CrossRef]
- Xiong, Z.; Feng, S.; Wang, W.; Niyato, D.; Wang, P.; Han, Z. Cloud/Fog computing resource management and pricing for blockchain networks. IEEE Internet Things J. 2019, 6, 4585–4600. [Google Scholar] [CrossRef] [Green Version]
- Houy, N. The Bitcoin mining game. 2014. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2407834(accessed on 24 September 2019).
- Orphan Probablity Approximation. Available online: https://gist.github.com/gavinandresen/5044482 (accessed on 24 September 2019).
- Available online: https://www.fxstreet.hk/news/lu-bi-ni-qu-kuai-lian-ke-neng-shi-you-shi-yi-lai-zui-kua-zhang-de-ji-shu-neng-hao-guo-da-201803120004 (accessed on 24 September 2019).
- Available online: https://www.coindesk.com/microscope-economic-environmental-costs-bitcoin-mining (accessed on 24 September 2019).
- Song, F.; Zhu, M.; Zhou, Y.; You, I.; Zhang, H. Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE Internet Things J. in press.
- Yeung, D.W.K.; Petrosjan, L.A. Cooperative Stochastic Differential Games; Springer Science & Business Media: Berlin, Germany, 2006. [Google Scholar]
(¥/GB) | (¥/GB) | (W) | (GB−1·W−1) | (S−1) | (¥) | (¥/GB) | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
i = 1 | 0.35 | 0.2 | 12.5 | 0.4 | ||||||||
i = 2 | 0.45 | 0.3 | 60 | 25 | 0.5 | 0.25 | 1 | 0.5 | 0.05 | 100 | 0.25 | 0.1 |
i = 3 | 0.55 | 0.4 | 37.5 | 0.6 | ||||||||
i = 4 | 0.6 | 0.5 | 50 | 0.7 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, H.; Wang, L.; Zhou, Z.; Tao, X.; Pau, G.; Arena, F. Blockchain-Based Resource Allocation Model in Fog Computing. Appl. Sci. 2019, 9, 5538. https://doi.org/10.3390/app9245538
Wang H, Wang L, Zhou Z, Tao X, Pau G, Arena F. Blockchain-Based Resource Allocation Model in Fog Computing. Applied Sciences. 2019; 9(24):5538. https://doi.org/10.3390/app9245538
Chicago/Turabian StyleWang, Haoyu, Lina Wang, Zhichao Zhou, Xueqiang Tao, Giovanni Pau, and Fabio Arena. 2019. "Blockchain-Based Resource Allocation Model in Fog Computing" Applied Sciences 9, no. 24: 5538. https://doi.org/10.3390/app9245538