Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 8098394, 13 pages
https://doi.org/10.1155/2017/8098394
Research Article

Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing

School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China

Correspondence should be addressed to Guanwen Li; nc.ude.utjb@11011161

Received 9 December 2016; Accepted 16 January 2017; Published 16 February 2017

Academic Editor: Karl Andersson

Copyright © 2017 Guanwen Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Cisco, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020, CISCO, 2016.
  2. M. Patel, B. Naughton, C. Chan et al., “Mobile-edge computing—introductory technical white paper,” Tech. Rep. 1, The European Telecommunications Standards Institute, 2014. View at Google Scholar
  3. C. E. Weng, V. Sharma, H. C. Chen, and C. H. Mao, “PEER: proximity-based energy-efficient routing algorithm for wireless sensor networks,” Journal of Internet Services and Information Security, vol. 6, no. 1, pp. 47–56, 2016. View at Google Scholar
  4. S. Aram, I. Khosa, and E. Pasero, “Conserving energy through neural prediction of sensed data,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 1, pp. 74–97, 2015. View at Google Scholar · View at Scopus
  5. G. Orsini, D. Bade, and W. Lamersdorf, “Computing at the mobile edge: designing elastic android applications for computation offloading,” in Proceedings of the 8th IFIP Wireless and Mobile Networking Conference (WMNC '15), pp. 112–119, Munich, Germany, 2015.
  6. X. Chen, L. Jiao, W. Li, and X. Fu, “Efficient multi-user computation offloading for mobile-edge cloud computing,” IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 2795–2808, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Sardellitti, G. Scutari, and S. Barbarossa, “Joint optimization of radio and computational resources for multicell mobile-edge computing,” IEEE Transactions on Signal and Information Processing over Networks, vol. 1, no. 2, pp. 89–103, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  8. M. T. Beck, S. Feld, A. Fichtner, C. Linnhoff-Popien, and T. Schimper, “ME-VoLTE: network functions for energy-efficient video transcoding at the mobile edge,” in Proceedings of the 18th International Conference on Intelligence in Next Generation Networks (ICIN '15), Paris, France, February 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. E. J. Halpern and E. C. Pignataro, “Service function chaining (sfc) architecture,” Tech. Rep. RFC 7665, Internet Engineering Task Force (IETF), 2015. View at Google Scholar
  10. B. Rashidi and C. Fung, “A survey of android security threats and defenses,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 3, pp. 3–35, 2015. View at Google Scholar · View at Scopus
  11. P. Quinn and U. Elzur, “Network service header,” IETF Internet-Draft, 2016, https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh/04/. View at Google Scholar
  12. F. Callegati, W. Cerroni, C. Contoli, and G. Santandrea, “Dynamic chaining of virtual network functions in cloud-based edge networks,” in Proceedings of the 1st IEEE Conference on Network Softwarization (NETSOFT '15), IEEE, London, UK, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Lantz, B. Heller, and N. McKeown, “A network in a laptop: rapid prototyping for software-defined networks,” in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets-IX '10), pp. 1–6, Monterey, Calif, USA, 2010.
  14. A. Gember, A. Krishnamurthy, S. S. John et al., “Stratos: a network-aware orchestration layer for virtual middleboxes in clouds,” https://arxiv.org/abs/1305.0209.
  15. S. K. Fayazbakhsh, L. Chiang, V. Sekar, M. Yu, and J. C. Mogul, “Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags,” in Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation (NSDI '14), pp. 543–546, Seattle, Wash, USA, 2014.
  16. Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, “SIMPLE-fying middlebox policy enforcement using SDN,” in Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '13), pp. 27–38, Hong Kong, China, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Yu and M.-T. Yuan, “Web service composition using graph model,” in Proceedings of the 2nd IEEE International Conference on Information Management and Engineering (ICIME '10), pp. 656–660, IEEE, Chengdu, China, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. P. J. Sun, P. C. Zhang, W. R. Li, X. J. Guo, and J. Feng, “Sky-MCSP-R: an efficient graph-based Web service composition approach,” in Proceedings of the 20th Asia-Pacific Software Engineering Conference (APSEC '13), pp. 589–594, IEEE, Bangkok, Thailand, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  19. C.-Q. Jiang, W. Du, and C.-C. Yi, “A method of web service composition based on bipartite graph optimal matching and QoS,” in Proceedings of the International Conference on Internet Technology and Applications (ITAP '10), pp. 1–5, IEEE, Wuhan, China, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. S. A. da Silva, H. Ma, and M. J. Zhang, “A graph-based Particle Swarm Optimisation approach to QoS-aware web service composition and selection,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC '14), pp. 3127–3134, Beijing, China, July 2014.
  21. N. Kashyap and K. Tyagi, “Dynamic composition of web services based on Qos parameters using fuzzy logic,” in Proceedings of the 2nd International Conference on Advances in Computer Engineering and Applications (ICACEA '15), pp. 778–782, March 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Bakhshi, F. Mardukhi, and N. Nematbakhsh, “A fuzzy-based approach for selecting the optimal composition of services according to user preferences,” in Proceedings of the 2nd International Conference on Computer and Automation Engineering (ICCAE '10), vol. 5, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. A. V. Dastjerdi and R. Buyya, “Compatibility-aware cloud service composition under fuzzy preferences of users,” IEEE Transactions on Cloud Computing, vol. 2, no. 1, pp. 1–13, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. L. A. Zadeh, “Fuzzy logic = computing with words,” IEEE Transactions on Fuzzy Systems, vol. 4, no. 2, pp. 103–111, 1996. View at Publisher · View at Google Scholar · View at Scopus
  25. E. H. Mamdani and S. Assilian, “Experiment in linguistic synthesis with a fuzzy logic controller,” International Journal of Man-Machine Studies, vol. 7, no. 1, pp. 1–13, 1975. View at Publisher · View at Google Scholar · View at Scopus
  26. H. W. Kuhn, “The Hungarian method for the assignment problem,” Naval Research Logistics Quarterly, vol. 2, pp. 83–97, 1955. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  27. B. Pfaff, J. Pettit, T. Koponen et al., “The design and implementation of open vswitch,” in Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation (NSDI '15), pp. 117–130, Oakland, Calif, USA, 2015.
  28. N. Repo and contributors, The pox controller, 2012–2014, https://github.com/noxrepo/pox.
  29. R. Nakamura, Nshkmod, 2015-2016, https://github.com/upa/nshkmod.
  30. Netfilter Core Team and Contributors, iptables, 1999–2014, http://www.netfilter.org/projects/iptables/index.html.
  31. The Ntop Team, nDPI, 2016, http://www.ntop.org/.
  32. Linux Virtual Server, 2016, http://www.linuxvirtualserver.org/.
  33. S.-J. Chen and C.-L. Hwang, Fuzzy multiple attribute decision making, vol. 375 of Lecture Notes in Economics and Mathematical Systems, Springer-Verlag, Berlin, Germany, 1992. View at Publisher · View at Google Scholar · View at MathSciNet
  34. K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182–197, 2002. View at Publisher · View at Google Scholar · View at Scopus