Skip to main content

Towards Reliable Computation Offloading in Mobile Ad-Hoc Clouds Using Blockchain

  • Conference paper
  • First Online:
  • 726 Accesses

Abstract

Mobile Ad-hoc Cloud (MAC) refers to the computation offloading of a mobile device among the multiple co-located mobile devices. However, it is difficult to convince the randomly participating mobile devices to offer their resources for performing the computation offloading of other mobile devices. These devices can be convinced for resource sharing by limiting the compute shedding of a device nearly equal to the computation that same device has already performed for other mobile devices. However, this cannot be achieved without establishing the trust among the randomly co-located mobile devices.

Blockchain has been already proven for the trust-establishment between multiple independent stakeholders. However, to the best of our knowledge, no one has used blockchain for reliable computation offloading among the independently operating co-located mobile devices of MAC. In this position paper, we proposed the mapping of blockchain concepts for the realization of reliable computation offloading in MAC. We have also identified the future research directions that can be focused for improving the proposed integration of blockchain and MAC.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://iota.org/.

  2. 2.

    https://iotchain.io/.

  3. 3.

    https://iotex.io/.

  4. 4.

    https://streamr.com/.

  5. 5.

    https://oceanprotocol.com/.

  6. 6.

    https://singularitynet.io/.

  7. 7.

    https://fysical.org/.

  8. 8.

    https://gems.org/.

  9. 9.

    https://dbrain.io/.

  10. 10.

    https://ravenprotocol.com/.

References

  1. Afonso, J.: Edge computing: learn to delegate—octo talks! January 2018. https://blog.octo.com/en/edge-computing-learn-to-delegate/). Accessed 8 Apr 2018

  2. Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72 (2003)

    Google Scholar 

  3. Dasu, T., Kanza, Y., Srivastava, D.: Unchain your blockchain. In: Proceedings of Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018)

    Google Scholar 

  4. Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)

    Article  Google Scholar 

  5. Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84–106 (2013)

    Article  Google Scholar 

  6. Gai, F., Wang, B., Deng, W., Peng, W.: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds.) DASFAA 2018, Part II. LNCS, vol. 10828, pp. 666–681. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91458-9_41

    Chapter  Google Scholar 

  7. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)

    Google Scholar 

  8. Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin (2015). arXiv preprint: arXiv:1502.04015

  9. Kang, X., Wu, Y.: Incentive mechanism design for heterogeneous peer-to-peer networks: a stackelberg game approach. IEEE Trans. Mob. Comput. 14(5), 1018–1030 (2015)

    Article  Google Scholar 

  10. Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017, Part I. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63688-7_12

    Chapter  Google Scholar 

  11. Miller, H.G., Mork, P.: From data to decisions: a value chain for big data. IT Prof. 15(1), 57–59 (2013)

    Article  Google Scholar 

  12. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  13. Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 14. ACM (2017)

    Google Scholar 

  14. Pilkington, M.: 11 blockchain technology: principles and applications. In: Research Handbook on Digital Transformations, p. 225 (2016)

    Google Scholar 

  15. Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for internet of things realization (2018). arXiv preprint: arXiv:1805.06695

  16. Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE (2017)

    Google Scholar 

  17. Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Factom business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, November 2014

    Google Scholar 

  18. Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15–17 (2016)

    Article  Google Scholar 

  19. Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325–329. IEEE (2014)

    Google Scholar 

  20. Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mob. Comput. 16(16), 2572–2589 (2016)

    Article  Google Scholar 

  21. Yousefpour, A., Ishigaki, G., Gour, R., Jue, J.P.: On reducing IoT service delay via fog offloading. IEEE Internet of Things J. (2018)

    Google Scholar 

  22. Zhang, Y., van der Schaar, M.: Reputation-based incentive protocols in crowdsourcing applications. In: 2012 Proceedings IEEE INFOCOM, pp. 2140–2148. IEEE (2012)

    Google Scholar 

  23. Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017)

    Google Scholar 

  24. Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1987–1997. IEEE (2003)

    Google Scholar 

  25. Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 535–544. IEEE (2018)

    Google Scholar 

Download references

Acknowledgment

The present work was undertaken in the context of the “Self-OrganizatioN towards reduced cost and eNergy per bit for future Emerging radio Technologies” with contract number 734545. The project has received research funding from the H2020-MSCA-RISE-2016 European Framework Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saqib Rasool .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rasool, S., Iqbal, M., Dagiuklas, T., ul Qayyum, Z., Mian, A.N. (2019). Towards Reliable Computation Offloading in Mobile Ad-Hoc Clouds Using Blockchain. In: Sucasas, V., Mantas, G., Althunibat, S. (eds) Broadband Communications, Networks, and Systems. BROADNETS 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 263. Springer, Cham. https://doi.org/10.1007/978-3-030-05195-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05195-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05194-5

  • Online ISBN: 978-3-030-05195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics