ABSTRACT
With the developments of the Internet of Things, the demands of low latency, high bandwidth and high-performance computing has increased higher. Therefore, the distributed computing named Fog Computing has proposed to solve the problem above. Fog computing can provide lower transmission latency, faster response time and less network congestion. However, the fog devices are unable to guarantee the security and privacy of data transmission, due to they are vulnerable to attack. Blockchain technology works as a decentralized public ledger to store and share transactions. Blockchain can improve security and protect data privacy of Fog Computing. Moreover, there are still issues in the blockchain-enabled Fog Computing, the two main issues are the energy consumption and computing efficiency. Thus, in this paper, we propose an optimization framework for blockchain-enabled Fog Computing systems to optimize resource allocation. Besides, we adopt the dueling deep reinforcement learning to obtain the optimal resource allocation strategy, with dynamically selecting the fog server, offloading decision, block size. Simulation results show that the proposed framework can reduce the energy consumption and computation overhead of the system, as well as can improve the computing efficiency.
- Uprety, Aashma and Rawat, Danda B. 2021.Reinforcement Learning for IoT Security: A Comprehensive Survey. IEEE Internet of Things Journal. 8, 11, 8693-8706, pages. https://doi.org/10.1109/JIOT.2020.3040957.Google ScholarCross Ref
- Xuemei. Li and Li D. Xu. A Review of Internet of Things—Resource Allocation. 2021. IEEE Internet of Things Journal. 8, 11, 8657-8666 pages. https://doi.org/10.1109/JIOT.2020.3035542.Google ScholarCross Ref
- Wu, Di and Ansari, Nirwan. 2020. A Cooperative Computing Strategy for Blockchain-Secured Fog Computing. IEEE Internet of Things Journal, 7, 7, 6603-6609 pages. https://doi.org/10.1109/JIOT.2020.2974231.Google ScholarCross Ref
- Fang. Fang and Xiaolun. Wu. 2021. A Win–Win Mode: The Complementary and Coexistence of 5G Networks and Edge Computing. IEEE Internet of Things Journal. 8, 6, 3983-4003 pages. https://doi.org/10.1109/JIOT.2020.3009821.Google ScholarCross Ref
- Abdali. T-A Naser, Hassan. Rosilah, Aman, A. H. Mohd and Nguyen. Q. Ngoc. 2021. Fog Computing Advancement: Concept, Architecture, Applications, Advantages, and Open Issues. IEEE Access, 9, 75961-75980, https://doi.org/10.1109/ACCESS.2021.3081770.Google ScholarCross Ref
- Di. Wu and Nirwan. Ansari. 2020. A Cooperative Computing Strategy for Blockchain-Secured Fog Computing. IEEE Internet of Things Journal, 7, 7, 6603-6609 pages. https://doi.org/10.1109/JIOT.2020.2974231.Google ScholarCross Ref
- Chao. Qiu, Haipeng. Yao, F. R. Yu, Chunxiao. Jiang and Song. Guo. 2020. A Service-Oriented Permissioned Blockchain for the Internet of Things. IEEE Transactions on Services Computing, 13, 2, 203-215 pages. https://doi.org/10.1109/TSC.2019.2948870.Google ScholarCross Ref
- Kai. Lei, Maoyu. Du, Jiyue. Huang and Tong. Jin. 2020. Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing. IEEE Transactions on Services Computing. 13, 2, 252-262 pages. https://doi.org/10.1109/TSC.2019.2949801.Google ScholarCross Ref
- Renchao Xie, Qinqin Tang, Chenghao Liang, Fei R. Yu and Tao Huang. 2021. Dynamic Computation Offloading in IoT Fog Systems With Imperfect Channel-State Information: A POMDP Approach. IEEE Internet of Things Journal, 8, 1, 345-356 https://doi.org/10.1109/JIOT.2020.3004223.Google ScholarCross Ref
- Haijun Liao, Yansong Mu, Zhenyu Zhou, Meng Sun, Zhao Wang and Chao Pan. 2021. Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing. IEEE Transactions on Intelligent Transportation Systems, 22, 4051-4063 pages.Google ScholarDigital Library
- Xuemei. Li and Li D. Xu. A Review of Internet of Things—Resource Allocation. 2021. IEEE Internet of Things Journal. 8, 11, 8657-8666 pages. https://doi.org/10.1109/JIOT.2020.3035542.Google ScholarCross Ref
- Jianbin. Gao 2020. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet of Things Journal, 7, 5, 4278-4291. https://doi.org/10.1109/JIOT.2019.2956241Google ScholarCross Ref
- Hongzhi Li, Dezhi Han and Mingdong Tang. 2021. A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing. IEEE Systems Journal, 15, 3, 3189-3200 pages. https://doi.org/10.1109/JSYST.2020.3009447.Google ScholarCross Ref
- Saurabh. Singh, A. S. M. S. Hosen and Byungun. Yoon. 2021. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network. IEEE Access. 9, 13938-13959 pages. https://doi.org/10.1109/ACCESS.2021.3051602.Google ScholarCross Ref
- Soumyashree S. Panda, Debasish Jena, Bhabendu. K. Mohanta, Somula Ramasubbareddy, Mahmoud Daneshmand. 2021. Authentication and Key Management in Distributed IoT Using Blockchain Technology. IEEE Internet of Things Journal, 8, 16, 12947-12954 https://doi.org/10.1109/JIOT.2021.3063806.Google ScholarCross Ref
- Sudarshan. S. Seshadri 2021. IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems. IEEE Internet of Things Journal, 8, 5, 3346-3359 pages. https://doi.org/10.1109/JIOT.2020.3022033.Google ScholarCross Ref
- Han Liu, Dezhi Han, Dun Li. 2020. Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access, 8, 18207-18218 https://doi.org/10.1109/ACCESS.2020.2968492.Google ScholarCross Ref
- Hamza Baniata and Attila Kertesz. 2020. A Survey on Blockchain-Fog Integration Approaches. IEEE Access, 8, 102657-102668 pages. https://doi.org/10.1109/ACCESS.2020.2999213.Google ScholarCross Ref
- Abdullah Lakhan, Muneer Ahmad, Muhammad Bilal, Alireza Jolfaei and Raja M. Mehmood. 2021. Mobility Aware Blockchain Enabled Offloading and Scheduling in Vehicular Fog Cloud Computing. IEEE Transactions on Intelligent Transportation Systems, 22, 7, 4212-4223 pages. https://doi.org/10.1109/TITS.2021.3056461.Google ScholarDigital Library
- Ying He, Yuhang Wang, Chao Qiu, Qiuzhen Lin, Jianqiang Li and Zhong Ming. 2021. Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach. IEEE Internet of Things Journal, 8, 4, 2226-2237 pages. https://doi.org/10.1109/JIOT.2020.3035437.Google ScholarCross Ref
- Liang Xiao, Yuzhen Ding, Donghua Jiang, Jinhao Huang, Dongming Wang, Jie Li, H. Vincent Poor. 2020. A Reinforcement Learning and Blockchain-Based Trust Mechanism for Edge Networks. IEEE Transactions on Communications, 68, 9, 5460-5470 pages. https://doi.org/10.1109/TCOMM.2020.2995371.Google ScholarCross Ref
- Mengting Liu, F. Richard Yu, Yinglei Teng, Victor C. M. Leung and Mei Song. 2019. Performance Optimization for Blockchain-Enabled Industrial Internet of Things (IIoT) Systems: A Deep Reinforcement Learning Approach. IEEE Transactions on Industrial Informatics, 15, 6, 3559-3570 pages. https://doi.org/10.1109/TII.2019.2897805.Google ScholarCross Ref
- Ji Li, Hui Gao, Tiejun Lv and Yueming Lu. 2018. Deep reinforcement learning based computation offloading and resource allocation for MEC. In 2018 IEEE Wireless Communications and Networking Conference (WCNC), 1-6 pages. https://doi.org/10.1109/WCNC.2018.8377343.Google ScholarDigital Library
- Bin Yuan, Hai Jin, Deqing Zou, Laurence T. Yang, Shui Yu. 2018. A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks. IEEE Transactions on Network and Service Management, 15, 2, 825-839 pages. https://doi.org/10.1109/TNSM.2018.2822668.Google ScholarDigital Library
- Chao Qiu, F. R. Yu, Haipeng Yao, Chunxiao Jiang, Fangmin Xu and Chenglin Zhao. 2019. Blockchain-Based Software-Defined Industrial Internet of Things: A Dueling Deep Q -Learning Approach. IEEE Internet of Things Journal, 6, 3, 4627-4639 pages. https://doi.org/doi: 10.1109/JIOT.2018.2871394.Google ScholarCross Ref
- Le Yang, Meng Li, Pengbo Si, Ruizhe Yang, Enchang Sun and Yanhua Zhang. 2021. Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things With Deep Reinforcement Learning. IEEE Internet of Things Journal, 8, 4, 2318-2329 https://doi.org/10.1109/JIOT.2020.3030646.Google ScholarCross Ref
- Shanshan Tu, Muhammad Waqas, Sadaqat Ur Rehman, Talha Mir, Ghulam Abbas, Ziaul Haq Abbas and Zahid Halim. 2021. Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Transactions on Vehicular Technology, 70, 2, 1474-1479 pages. https://doi.org/10.1109/TVT.2021.3053015.Google ScholarCross Ref
Index Terms
- Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning
Recommendations
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning
ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network SecurityWith the rapid development of Internet of Things technology and cloud computing technology, Fog Computing emerges with the demand of distributed and decentralized. Blockchain is considered to be an advanced technology, which enables Fog Computing data ...
A Pattern for Fog Computing
VikingPLoP '16: Proceedings of the 10th Travelling Conference on Pattern Languages of ProgramsFog Computing is a new variety of the cloud computing paradigm that brings virtualized cloud services to the edge of the network to control the devices in the IoT. We present a pattern for fog computing which describes its architecture, including its ...
Cloud, Fog, or Mist in IoT? That Is the Question
Special Issue on Fog, Edge, and Cloud IntegrationInternet of Things (IoT) has been commercially explored as Platforms as a Services (PaaS). The standard solution for this kind of service is to combine the Cloud computing infrastructure with IoT software, services, and protocols also known as CoT (...
Comments