
Research Article
An Auction-Based Mechanism for Task Offloading in a Secure Fog-Cloud Environment
@INPROCEEDINGS{10.1007/978-3-031-15101-9_4, author={Branka Mikavica and Aleksandra Kostić-Ljubisavljević}, title={An Auction-Based Mechanism for Task Offloading in a Secure Fog-Cloud Environment}, proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 6th EAI International Conference, FABULOUS 2022, Virtual Event, May 4, 2022, Proceedings}, proceedings_a={FABULOUS}, year={2022}, month={9}, keywords={Fog-cloud environment Auction-based offloading Security}, doi={10.1007/978-3-031-15101-9_4} }
- Branka Mikavica
Aleksandra Kostić-Ljubisavljević
Year: 2022
An Auction-Based Mechanism for Task Offloading in a Secure Fog-Cloud Environment
FABULOUS
Springer
DOI: 10.1007/978-3-031-15101-9_4
Abstract
With the rapid growth of terminal devices, fog-cloud systems become promising for solving delays and congestions in task provisioning. When the fog computing resources are insufficient, task offloading to the remote cloud can be performed to improve performances. Auctions are considered as a convenient tool to provide incentives for task offloading, and efficiently allocate resources in the fog-cloud environment. However, due to virtualization, the cloud segment in the fog-cloud system is prone to malicious attacks. Security requirements are often in contrast with performance requirements since the operation of security mechanisms consumes a part of computation capacities. Therefore, a comprehensive study is needed to address resource allocation with a security assessment. In this paper, we propose a novel simulation model for resource allocation in the hierarchical fog-cloud system with task offloading. To improve the experience and prevent performance deterioration, we introduce task differentiation into delay-sensitive and delay-tolerant tasks. Resource allocation of the fog and the cloud layer is based on the truthful double auction. A Vicrey-Clarke-Grove (VCG) driven resource allocation is established for winner determination. The proposed simulation model is used to analyze utility functions in the observed fog-cloud environment depending on the offered security level.