Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing
In edge computing, the workflow is used to simulate and manage computing tasks as well as information exchange for compute-intensive and data-intensive application, which is convenient for the various complex process to work orderly. However, the resource conflict among cooperative works of multiple mobile edge computing (MEC) nodes by workflow, together with the service failure and the performance degradation, bring about additional uncertainties of scheduling strategies. Consequently, such uncertainties delay the completion of tasks and spoil the user experience. To deal with that issue, we propose a blockchain-powered resource provisioning (BPRP) method to design policies for workflows in the edge computing environment. Technically, we use the directed acyclic graph to indicate workflows of each edge node and regard its scheduling strategy as an individual gene to adapt to the following algorithm. Then, we use the non-dominated sorting genetic algorithm-III (NSGA-III) to optimize the workflow scheduling strategies on the basis of tasks’ timely completion with good quality. A large number of experiments were carried out to verify the effectiveness of our method.
KeywordsBlockchain Uncertainty-aware Edge computing Workflow NSGA-III
This research is supported by the National Science Foundation of China under grant no. 61702277.
- 2.Chen, H., Zhu, X., Liu, G., Pedrycz, W.: Uncertainty-aware online scheduling for real-time workflow in cloud service environment. IEEE Trans. Serv. Comput. 1 (2018) Google Scholar
- 3.Meng, S., et al.: An uncertainty-aware evolutionary scheduling method for cloud service provisioning. In: 2016 IEEE International Conference on Web Service (ICWS), pp. 506–513 (2016)Google Scholar
- 4.Fakhri, D., Mutijarsa, K.: Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pp. 1–6 (2018)Google Scholar
- 5.Singh, M., Singh, A., Kim, S.: Blockchain: a game changer for securing IoT data. In: 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), pp. 51–55 (2018)Google Scholar
- 8.Chen, W., Liang, X., Li, J., Qin, H., Mu, Y., Wang, J.: Blockchain based provenance sharing of scientific workflows. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 3814–3820 (2018)Google Scholar
- 10.Yang, J., Xu, X., Tang, W., et al.: A task scheduling method for energy-performance trade-off in clouds. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, pp. 1029–1036 (2016)Google Scholar
- 13.Wen, Y., Liu, J., Dou, W., et al.: Scheduling workflows with privacy protection constraints for big data applications on cloud. Future Gener. Comput. Syst. (2018) Google Scholar
- 14.Qi, L., He, Q., Chen, F., et al.: finding all you need: web APIs recommendation in web of things through keywords search. IEEE Trans. Comput. Soc. Syst. (2019)Google Scholar
- 15.Xu, X., Liu, Q., Zhang, X., et al.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. (2019)Google Scholar