skip to main content
10.1145/3586102.3586134acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article

Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning

Authors Info & Claims
Published:24 July 2023Publication History

ABSTRACT

With the developments of the Internet of Things, the demands of low latency, high bandwidth and high-performance computing has increased higher. Therefore, the distributed computing named Fog Computing has proposed to solve the problem above. Fog computing can provide lower transmission latency, faster response time and less network congestion. However, the fog devices are unable to guarantee the security and privacy of data transmission, due to they are vulnerable to attack. Blockchain technology works as a decentralized public ledger to store and share transactions. Blockchain can improve security and protect data privacy of Fog Computing. Moreover, there are still issues in the blockchain-enabled Fog Computing, the two main issues are the energy consumption and computing efficiency. Thus, in this paper, we propose an optimization framework for blockchain-enabled Fog Computing systems to optimize resource allocation. Besides, we adopt the dueling deep reinforcement learning to obtain the optimal resource allocation strategy, with dynamically selecting the fog server, offloading decision, block size. Simulation results show that the proposed framework can reduce the energy consumption and computation overhead of the system, as well as can improve the computing efficiency.

References

  1. Uprety, Aashma and Rawat, Danda B. 2021.Reinforcement Learning for IoT Security: A Comprehensive Survey. IEEE Internet of Things Journal. 8, 11, 8693-8706, pages. https://doi.org/10.1109/JIOT.2020.3040957.Google ScholarGoogle ScholarCross RefCross Ref
  2. Xuemei. Li and Li D. Xu. A Review of Internet of Things—Resource Allocation. 2021. IEEE Internet of Things Journal. 8, 11, 8657-8666 pages. https://doi.org/10.1109/JIOT.2020.3035542.Google ScholarGoogle ScholarCross RefCross Ref
  3. Wu, Di and Ansari, Nirwan. 2020. A Cooperative Computing Strategy for Blockchain-Secured Fog Computing. IEEE Internet of Things Journal, 7, 7, 6603-6609 pages. https://doi.org/10.1109/JIOT.2020.2974231.Google ScholarGoogle ScholarCross RefCross Ref
  4. Fang. Fang and Xiaolun. Wu. 2021. A Win–Win Mode: The Complementary and Coexistence of 5G Networks and Edge Computing. IEEE Internet of Things Journal. 8, 6, 3983-4003 pages. https://doi.org/10.1109/JIOT.2020.3009821.Google ScholarGoogle ScholarCross RefCross Ref
  5. Abdali. T-A Naser, Hassan. Rosilah, Aman, A. H. Mohd and Nguyen. Q. Ngoc. 2021. Fog Computing Advancement: Concept, Architecture, Applications, Advantages, and Open Issues. IEEE Access, 9, 75961-75980, https://doi.org/10.1109/ACCESS.2021.3081770.Google ScholarGoogle ScholarCross RefCross Ref
  6. Di. Wu and Nirwan. Ansari. 2020. A Cooperative Computing Strategy for Blockchain-Secured Fog Computing. IEEE Internet of Things Journal, 7, 7, 6603-6609 pages. https://doi.org/10.1109/JIOT.2020.2974231.Google ScholarGoogle ScholarCross RefCross Ref
  7. Chao. Qiu, Haipeng. Yao, F. R. Yu, Chunxiao. Jiang and Song. Guo. 2020. A Service-Oriented Permissioned Blockchain for the Internet of Things. IEEE Transactions on Services Computing, 13, 2, 203-215 pages. https://doi.org/10.1109/TSC.2019.2948870.Google ScholarGoogle ScholarCross RefCross Ref
  8. Kai. Lei, Maoyu. Du, Jiyue. Huang and Tong. Jin. 2020. Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing. IEEE Transactions on Services Computing. 13, 2, 252-262 pages. https://doi.org/10.1109/TSC.2019.2949801.Google ScholarGoogle ScholarCross RefCross Ref
  9. Renchao Xie, Qinqin Tang, Chenghao Liang, Fei R. Yu and Tao Huang. 2021. Dynamic Computation Offloading in IoT Fog Systems With Imperfect Channel-State Information: A POMDP Approach. IEEE Internet of Things Journal, 8, 1, 345-356 https://doi.org/10.1109/JIOT.2020.3004223.Google ScholarGoogle ScholarCross RefCross Ref
  10. Haijun Liao, Yansong Mu, Zhenyu Zhou, Meng Sun, Zhao Wang and Chao Pan. 2021. Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing. IEEE Transactions on Intelligent Transportation Systems, 22, 4051-4063 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Xuemei. Li and Li D. Xu. A Review of Internet of Things—Resource Allocation. 2021. IEEE Internet of Things Journal. 8, 11, 8657-8666 pages. https://doi.org/10.1109/JIOT.2020.3035542.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jianbin. Gao 2020. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet of Things Journal, 7, 5, 4278-4291. https://doi.org/10.1109/JIOT.2019.2956241Google ScholarGoogle ScholarCross RefCross Ref
  13. Hongzhi Li, Dezhi Han and Mingdong Tang. 2021. A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing. IEEE Systems Journal, 15, 3, 3189-3200 pages. https://doi.org/10.1109/JSYST.2020.3009447.Google ScholarGoogle ScholarCross RefCross Ref
  14. Saurabh. Singh, A. S. M. S. Hosen and Byungun. Yoon. 2021. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network. IEEE Access. 9, 13938-13959 pages. https://doi.org/10.1109/ACCESS.2021.3051602.Google ScholarGoogle ScholarCross RefCross Ref
  15. Soumyashree S. Panda, Debasish Jena, Bhabendu. K. Mohanta, Somula Ramasubbareddy, Mahmoud Daneshmand. 2021. Authentication and Key Management in Distributed IoT Using Blockchain Technology. IEEE Internet of Things Journal, 8, 16, 12947-12954 https://doi.org/10.1109/JIOT.2021.3063806.Google ScholarGoogle ScholarCross RefCross Ref
  16. Sudarshan. S. Seshadri 2021. IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems. IEEE Internet of Things Journal, 8, 5, 3346-3359 pages. https://doi.org/10.1109/JIOT.2020.3022033.Google ScholarGoogle ScholarCross RefCross Ref
  17. Han Liu, Dezhi Han, Dun Li. 2020. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access, 8, 18207-18218 https://doi.org/10.1109/ACCESS.2020.2968492.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hamza Baniata and Attila Kertesz. 2020. A Survey on Blockchain-Fog Integration Approaches. IEEE Access, 8, 102657-102668 pages. https://doi.org/10.1109/ACCESS.2020.2999213.Google ScholarGoogle ScholarCross RefCross Ref
  19. Abdullah Lakhan, Muneer Ahmad, Muhammad Bilal, Alireza Jolfaei and Raja M. Mehmood. 2021. Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing. IEEE Transactions on Intelligent Transportation Systems, 22, 7, 4212-4223 pages. https://doi.org/10.1109/TITS.2021.3056461.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ying He, Yuhang Wang, Chao Qiu, Qiuzhen Lin, Jianqiang Li and Zhong Ming. 2021. Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach. IEEE Internet of Things Journal, 8, 4, 2226-2237 pages. https://doi.org/10.1109/JIOT.2020.3035437.Google ScholarGoogle ScholarCross RefCross Ref
  21. Liang Xiao, Yuzhen Ding, Donghua Jiang, Jinhao Huang, Dongming Wang, Jie Li, H. Vincent Poor. 2020. A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks. IEEE Transactions on Communications, 68, 9, 5460-5470 pages. https://doi.org/10.1109/TCOMM.2020.2995371.Google ScholarGoogle ScholarCross RefCross Ref
  22. Mengting Liu, F. Richard Yu, Yinglei Teng, Victor C. M. Leung and Mei Song. 2019. Performance Optimization for Blockchain-Enabled Industrial Internet of Things (IIoT) Systems: A Deep Reinforcement Learning Approach. IEEE Transactions on Industrial Informatics, 15, 6, 3559-3570 pages. https://doi.org/10.1109/TII.2019.2897805.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ji Li, Hui Gao, Tiejun Lv and Yueming Lu. 2018. Deep reinforcement learning based computation offloading and resource allocation for MEC. In 2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6 pages. https://doi.org/10.1109/WCNC.2018.8377343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Bin Yuan, Hai Jin, Deqing Zou, Laurence T. Yang, Shui Yu. 2018. A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Transactions on Network and Service Management, 15, 2, 825-839 pages. https://doi.org/10.1109/TNSM.2018.2822668.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Chao Qiu, F. R. Yu, Haipeng Yao, Chunxiao Jiang, Fangmin Xu and Chenglin Zhao. 2019. Blockchain-Based Software-Defined Industrial Internet of Things: A Dueling Deep Q -Learning Approach. IEEE Internet of Things Journal, 6, 3, 4627-4639 pages. https://doi.org/doi: 10.1109/JIOT.2018.2871394.Google ScholarGoogle ScholarCross RefCross Ref
  26. Le Yang, Meng Li, Pengbo Si, Ruizhe Yang, Enchang Sun and Yanhua Zhang. 2021. Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things With Deep Reinforcement Learning. IEEE Internet of Things Journal, 8, 4, 2318-2329 https://doi.org/10.1109/JIOT.2020.3030646.Google ScholarGoogle ScholarCross RefCross Ref
  27. Shanshan Tu, Muhammad Waqas, Sadaqat Ur Rehman, Talha Mir, Ghulam Abbas, Ziaul Haq Abbas and Zahid Halim. 2021. Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Transactions on Vehicular Technology, 70, 2, 1474-1479 pages. https://doi.org/10.1109/TVT.2021.3053015.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security
              December 2022
              241 pages
              ISBN:9781450397520
              DOI:10.1145/3586102

              Copyright © 2022 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 July 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited
            • Article Metrics

              • Downloads (Last 12 months)22
              • Downloads (Last 6 weeks)1

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format