透過您的圖書館登入
IP:18.188.40.207
  • 學位論文

邊緣計算的動態資源管理: 資安和應用體驗質量的權衡

Edge Computing Dynamic Resource Management:Tradeoffs Between Security and Application QoE

指導教授 : 魏宏宇

摘要


由於5G和物聯網時代的發展,歐洲電信標準協會提出的行動邊緣運算,行動上網裝置透過異質性網路如智慧工廠網路和車載網路等可以低延遲的存取服務,此外,影音串流和線上遊戲的普及以及消耗網際網路半數以上的流量,因此,會有更多的邊緣運算伺服器部署在邊際網路以便卸載核心網路的流量,然而邊緣運算的伺服器因靠近接取裝置而更容易遭受攻擊,攻擊者可輕易透過多個受感染的物聯網裝置發動分散式阻斷服務攻擊,在此篇論文中,為了解決邊緣伺服器遇到的資安和資源管理的議題,我們提出邊緣計算的資源管理系統。首先,在行動運算的服務中加入安全防護、影音串流和線上遊戲的應用,透過入侵偵測和防禦系統緩解分散式阻斷服務攻擊,並設計資源分配的演算法去分配邊緣應用程式的資源,比較不同使用者情境和攻擊種類,去分析和探討在有限資源狀況下的不同模型的結果,實驗結果顯示在攻擊的狀態下,我們的系統透過邊緣運算的資源管理可以有效的改善使用者體驗。

並列摘要


With the advancement of the 5G network and Internet of Things (IoT) devices, Multiaccess Edge Computing (MEC) proposed by ETSI provides multiple devices to access with low latency through heterogeneous networks such as smart factories and vehicular networks. In addition, video streaming and online gaming have become more popular and consume more than half of the traffic on the internet. Thus, there will be more edge servers deployed on the edge of the network for offloading the core network. However, the edge server is more vulnerable because of its proximity to the user equipment (UE). Attackers can quickly launch distributed denial-of-service (DDoS) attacks with plenty of infected IoT devices. In this paper, we propose Tradeoffs Between Security and Application QoE (TBSA) system to solve the security and resource management problems on the edge server. First, we deploy network security, video streaming, and online gaming applications on the edge server. We use Intrusion Detection and Prevention Services (IDPS) to perform DDoS mitigation and design resource allocation algorithm to allocate the computing resources to the edge computing applications. Then, we compare different attack rates in the user scenarios and analyze multiple models under the resource limit condition. The experiments show that we can improve the Quality-of-Experience (QoE) of applications by edge computing resources management.

參考文獻


B. Ali, M. A. Gregory, and S. Li. Multi-Access Edge Computing Architecture,Data Security and Privacy: A Review. In IEEE Access, pages 18706–18721. IEEE, 2021.
K. Bhardwaj, J. C. Miranda, and A. Gavrilovska. Towards IoT-DDoS Prevention Using Edge Computing. In Workshop on Hot Topics in Edge Computing (HotEdge
18). USENIX, 2018.
W. Cai, R. Shea, C.-Y. Huang, K.-T. Chen, J. Liu, V. C. M. Leung, and C.-H. Hsu. A Survey on Cloud Gaming: Future of Computer Games. In IEEE Access. IEEE,2016.
K. Cao, Y. Liu, G. Meng, and Q. Sun. An Overview on Edge Computing Research. In IEEE Access, volume 8, pages 85714–85728. IEEE, 2020.

延伸閱讀