Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing

  • Xiaolong Xu
  • Qingfan Geng
  • Hao Cao
  • Ruichao Mo
  • Shaohua Wan
  • Lianyong QiEmail author
  • Hao Wang
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1123)


In edge computing, the workflow is used to simulate and manage computing tasks as well as information exchange for compute-intensive and data-intensive application, which is convenient for the various complex process to work orderly. However, the resource conflict among cooperative works of multiple mobile edge computing (MEC) nodes by workflow, together with the service failure and the performance degradation, bring about additional uncertainties of scheduling strategies. Consequently, such uncertainties delay the completion of tasks and spoil the user experience. To deal with that issue, we propose a blockchain-powered resource provisioning (BPRP) method to design policies for workflows in the edge computing environment. Technically, we use the directed acyclic graph to indicate workflows of each edge node and regard its scheduling strategy as an individual gene to adapt to the following algorithm. Then, we use the non-dominated sorting genetic algorithm-III (NSGA-III) to optimize the workflow scheduling strategies on the basis of tasks’ timely completion with good quality. A large number of experiments were carried out to verify the effectiveness of our method.


Blockchain Uncertainty-aware Edge computing Workflow NSGA-III 



This research is supported by the National Science Foundation of China under grant no. 61702277.


  1. 1.
    Chen, X., Li, W., Sanglu, L., Zhou, Z., Xiaoming, F.: Efficient resource allocation for on-demand mobile-edge cloud computing. IEEE Trans. Veh. Technol. 67(9), 8769–8780 (2018)CrossRefGoogle Scholar
  2. 2.
    Chen, H., Zhu, X., Liu, G., Pedrycz, W.: Uncertainty-aware online scheduling for real-time workflow in cloud service environment. IEEE Trans. Serv. Comput. 1 (2018) Google Scholar
  3. 3.
    Meng, S., et al.: An uncertainty-aware evolutionary scheduling method for cloud service provisioning. In: 2016 IEEE International Conference on Web Service (ICWS), pp. 506–513 (2016)Google Scholar
  4. 4.
    Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–6 (2018)Google Scholar
  5. 5.
    Singh, M., Singh, A., Kim, S.: Blockchain: a game changer for securing IoT data. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 51–55 (2018)Google Scholar
  6. 6.
    Xiong, Z., Zhang, Y., Niyato, D., Wang, P., Han, Z.: When mobile blockchain meets edge computing. IEEE Commun. Mag. 56(8), 33–39 (2018)CrossRefGoogle Scholar
  7. 7.
    Tan, W., Sun, Y., Li, L.X., Lu, G., Wang, T.: A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst. J. 8(3), 868–878 (2014)CrossRefGoogle Scholar
  8. 8.
    Chen, W., Liang, X., Li, J., Qin, H., Mu, Y., Wang, J.: Blockchain based provenance sharing of scientific workflows. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 3814–3820 (2018)Google Scholar
  9. 9.
    Cziva, R., Jouët, S., Stapleton, D., Tso, F.P., Pezaros, D.P.: SDN-based virtual machine management for cloud data centers. IEEE Trans. Netw. Serv. Manage. 13(2), 212–225 (2016)CrossRefGoogle Scholar
  10. 10.
    Yang, J., Xu, X., Tang, W., et al.: A task scheduling method for energy-performance trade-off in clouds. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, pp. 1029–1036 (2016)Google Scholar
  11. 11.
    Xu, X., Dou, W., Zhang, X., et al.: EnReal: an energy-aware resource allocation method for scientific workflow executions in cloud environment. IEEE Trans. Cloud Comput. 4(2), 166–179 (2015)CrossRefGoogle Scholar
  12. 12.
    Qi, L., Meng, S., Zhang, X., et al.: An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7), 2037 (2018)CrossRefGoogle Scholar
  13. 13.
    Wen, Y., Liu, J., Dou, W., et al.: Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Gener. Comput. Syst. (2018) Google Scholar
  14. 14.
    Qi, L., He, Q., Chen, F., et al.: finding all you need: web APIs recommendation in web of things through keywords search. IEEE Trans. Comput. Soc. Syst. (2019)Google Scholar
  15. 15.
    Xu, X., Liu, Q., Zhang, X., et al.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. (2019)Google Scholar
  16. 16.
    Lee, H., Ma, M.: Blockchain-based mobility management for LTE and beyond. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 36–49. Springer, Cham (2019). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Xiaolong Xu
    • 1
  • Qingfan Geng
    • 1
  • Hao Cao
    • 1
  • Ruichao Mo
    • 1
  • Shaohua Wan
    • 2
  • Lianyong Qi
    • 3
    Email author
  • Hao Wang
    • 4
  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.School of Information and Safety EngineeringZhongnan University of Economics and LawWuhanChina
  3. 3.School of Information Science and EngineeringQufu Normal UniversityJiningChina
  4. 4.Department of Computer ScienceNorwegian University of Science and TechnologyGjøvikNorway

Personalised recommendations