You are on page 1of 9

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 1

Intelligent Offloading for Collaborative Smart City


Services in Edge Computing
Xiaolong Xu, Member, IEEE, Qihe Huang, Xiaochun Yin, Mahdi Abbasi,
Mohammad Reza Khosravi, and Lianyong Qi∗ , Member, IEEE,

Abstract—Smart city is a fast-developing system enabled by and etc.) spring out, which hastens a new conception “smart
Internet of things (IoT) with massive collaborative services (e.g., city” [2][3]. Based on the collaborative services, it is promising
intelligent transportation and collaborative diagnosis). Generally, for the city to facilitate the life of residents and improve the
the terminals in the smart city are provided with limited comput-
ing ability, thus incapable of processing the diversified and cross- QoE (quality of experience) of visitors with the premise of de-
application services. Faced with the insufficient resource provi- creasing squandering city resources. Additionally, smart cities
sioning for the collaborative smart city services, edge computing are equipped with powerful capability to monitor, understand
is emerged as a novel paradigm to provide city terminals with and make adjustments to their citizens [4][5]. However, due
more processing capacity. Nevertheless, as there is a tremendous to the exponentially growing data and the limited computing
threat of disclosing private information in the offloading of
collaborative services, it is imperative to improve privacy security resources of terminals, relying solely on the IoT devices in
in the edge computing. With the intention of addressing the smart city is hard to fully achieve collaborative services which
privacy disclosure, an intelligent offloading method (IOM) for are often real-time and delay-sensitive. To improve the QoS
smart city, realizing privacy preservation, improving offloading (quality of service) in smart cities, drawing support from
efficiency and promoting edge utility, is proposed. Technically, external resources with more computing ability is imperative
information entropy mechanism is employed to be integrated
with edge computing to obtain the balance between privacy [6][7].
preservation and collaborative service performance. Eventually, Edge computing, which fully utilizes computing resources
the simulation analysis is implemented to verify the effectiveness in the edge and can cater for the real-time requirements,
of IOM. has been promoted as an efficient solution to alleviate the
Keywords-IoT, smart cities, collaborative service, intelligent problems of insufficient computing resources in cities [8][9].
offloading, edge computing Technically, edge computing could provide a collaborative
service environment and enough computing capability for the
smart cities [10][11]. Concretely, it deploys abundant edge
I. I NTRODUCTION
nodes (EN) on the side of roads or next to buildings, equipping
Benefiting from the rapid development of Internet of things the city terminals with extra computing resources [12][13].
(IoT), cities are endowed with abundant connected devices and Benefiting from the relatively richer computing resources
sensors that are applied to collecting and handling information and low end-to-end communication latency, edge computing
[1]. By appropriately processing and utilizing the massive reduces the response time of the collaborative city services
data produced from IoT, diverse collaborative services (i.e., to a great extent. Infrequently, if an EN is overloaded, the
intelligent medical diagnosis, smart campus, elderly assistance computing requests from city terminals would be rejected and
the service holds up in the EN until the essential resources
X. Xu and Q. Huang are with the School of Computer and Software, are available again [14][15]. Thus, the queuing services could
Nanjing University of Information Science and Technology, Nanjing 210044,
China. be passed to another EN, which avoids plenty of waiting time
X. Xu is also with the Facility Horticulture Laboratory of Universities [16][17]. In view of this situation, the queuing time would be
in Shandong, WeiFang University of Science & Technology, ShouGuang, taken into account in service offloading to achieve the balance
China, the Jiangsu Collaborative Innovation Center of Atmospheric Environ-
ment and Equipment Technology (CICAEET), Nanjing University of Infor- between the queuing and offloading [18].
mation Science & Technology, Nanjing 210044, China and the Engineering Nevertheless, there is a real threat of disclosing private
Research Center of Digital Forensics, Ministry of Education, Nanjing 210044, information, especially in the offloading of collaborative ser-
China.
Email: njuxlxu@gmail.com;qhuang@nuist.edu.cn vices [19]. In the smart city, the terminals are required to
X. Yin is with the Facility Horticulture Laboratory of Universities in propagate the sensitive information to the ENs, and then the
Shandong, WeiFang University of Science & Technology, ShouGuang , China. processing results of service could be returned [20]. During
E-mail: xiaochunyin@wfust.edu.cn
M. Abbasi is with the School of Computer Engineering, Engineering the service offloading, unexpected leakage of sensitive data
Faculty, Bu-Ali Sina University, Hamedan, Iran. (i.e., individual location, phone number and etc.) is a terri-
E-mail: abbasi@basu.ac.ir ble occurrence [21][22]. Considering most devices lack the
R. Khosravi is with the Computer Engineering Department, Persian Gulf
University, Bushehr, Iran, and Department of Electrical and Electronic Engi- privacy protection, the information security of the individuals
neering, Shiraz University of Technology, Shiraz, Iran. could not be guaranteed [23]. As the collaborative services
E-mail: m.khosravi@sutech.ac.ir usually carry sensitive information of individuals, avoiding
L. Qi is with the School of Information Science and Engineering, Qufu
Normal University, Qufu 273165, China. privacy leakage during offloading among ENs is necessary.
E-mail: lianyongqi@gmail.com On the other hand, given that the ENs are distributed every-

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 2

where in the smart city, the load balance must be ensured to the edge computing. With blockchain technique, they ensured
improve resources efficiency and avoid the waste of resources. trusted authentication and achieved active track of terminals
Furthermore, the energy consumption of ENs is obligated to while provided secure connection for edge nodes. Thai et al.
be optimized to obtain the sustainable development of smart [13] focused on the optimization in the edge computing and
cities. In addition to the edge utility, i.e., load balance and they developed an approximation algorithm to optimize the
energy consumption, the offloading efficiency should also be workload and capacity during offloading. Bonadio et al. [29]
considered for the less service response time brings about analyzed the performance of edge computing, giving a Markov
the better quality of service. However, it is a challenge to system model with server queuing and reneging requests to
achieve trade-offs among minimizing service response time, obtain the performance evaluation of the edge computing. Lei
optimizing energy consumption and maintaining load balance et al. [30] depended on the service response time and energy
while guaranteeing the data security. In view of this challenge, consumption to introduce a task allocation scheme, achieving
an intelligent offloading method for collaborative smart city the proper allocation of tasks in edge computing.
services in edge computing, named IOM, is devised. To offload the collaborative smart city services, designing
The main contributions of our paper are as follows: an appreciate offloading strategy is imperative. Additionally,
• The M/M/Z/∞/∞ queuing model is established for the the offloading strategy is obligated to ensure privacy security
offloaded services to reckon the average waiting time in which could avoid the disclosure of personal information.
the EN. Xiong et al. [31] studied the interactions among service
• The offloading efficiency, the edge utility and the privacy providers in the edge computing and promoted privacy preser-
analysis are modeled for the collaborative smart city vation using blockchain to support proof-of-work in the of-
services. floading services, which guaranteed the profits of providers.
• An intelligent offloading method is devised to obtain the Li et al. [32] aimed to improve the revenues with the premise
goal of minimizing energy consumption, reducing load of satisfying variable reliability requirements and they placed
balance and optimizing service response time. primary network functions to cloudlets in order to meet users’
• Conduct comparative experiments to verify the effective- requirements.
ness and efficiency of IOM. However, few researchers took the service response time,
The remainder of this paper is organized as follows. Section energy consumption, load balance and data security into
II presents the relevant studies of this work. Section III models account to optimize the offloading strategy. And it is still
the offloading efficiency and the edge utility. The privacy challenging to design an offloading strategy which achieves
analysis and the details of IOM are expounded in Section IV. the four objectives mentioned above, especially protecting the
The experiment results are presented in Section V. In Section privacy of citizens. Thus, an intelligent offloading method for
VI, the summary of this paper is given. collaborative smart city services, named IOM, is devised.

II. R ELATED W ORK


III. S YSTEM M ODEL AND P ROBLEM F ORMULATION
Smart cities have gained rapid development, providing
tremendous collaborative service for residents inhabiting cities In this section, the system model of the edge computing for
[24]. Smart cities are based on a mass of devices and terminals smart city is designed. To optimize service offloading, three
embedded in the citied to collect and process information. But models, i.e., the service response time, the energy consumption
for the limited computing ability provided with terminals in and the load balance are proposed. Key terms in this model
city, it is challenging to achieve high quality of collaborative are described in Table 1.
service for smart cities [4][25].
In [26], authors utilized the edge computing as a novel
paradigm to process the IoT service placement in smart
cities. They took the load balance, energy consumption and
resource utilization into consideration to optimize the quality
of IoT services in smart city. Additionally, the privacy is also
considered to ensure the privacy of citizens in their framework.
Hossain et al. [27] introduced intelligent health-care detection
paradigm which could process enormous health data related to
health-care and give prompt analysis in smart cities. Fadi et
al. [28] gave an overview of privacy preservation in the smart
city and they reviewed some current solutions with regard to
privacy protection of communication in IoT devices.
Currently, edge computing is leveraged to be integrated with
smart cities to accommodate for offloaded services, greatly
improving the QoS and expanding the scope of services. The
applicability of edge computing in computation offloading Fig. 1. A collaborative smart city service offloading framework in edge
has been verified by many researchers. Guo et al. [12] con- computing
tributed to constructing a distributed and trusted system in

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 3

TABLE I
K EY T ERMS AND D ESCRIPTIONS Denote Pinum as the probability there are i offloaded
services in the EN. When the number of smart city services
Terms Descriptions in the EN is idle, the probability could be calculated and it is
J The quantity of ENs given by
N The quantity of terminals 1
P0num = Z−1 . (3)
R The set of ENs, R = {r1 , r2 , · · · , rJ } P ξZ 1
+ · ξ n
E The set of terminals, E = {e1 , e2 , · · · , eN } Z!(1−ξZ ) n!
n=0
S The set of services, S = {s1 , s2 , · · · , sN }
Then the probability any number of services offloaded to the
Z The number of VMs for one EN
EN could be calculated based on P0num , and it is expressed
tqu The queuing time
as
ttr
n The transmission time of propagating the service by the en
(γ/β)i
(
tex
n,j The execution time of executing the service sn in the EN rj num i! · P0num , (1 ≤ i ≤ Z),
Pi = (γ/β)i
(4)
ttot
n,j The service response time of offloading the sn to the EN rj · P num
, (i > Z).
Z!Z (i−Z) 0
etot
n,j The energy consumption of offloading the sn to the EN rj
If there are less than Z services offloaded to the EN, which
lba The load balance
means there are sufficient resources in the EN for offloaded
services, the queue time tqu would be zero. In this case, the
city service is supposed to be executed once it is propagated
A. A Smart City Architecture with Edge Computing
to the EN. When the number of offloaded services in the EN
A collaborative smart city service offloading framework in exceeds the number of VMs, the services are considered to
edge computing is presented in Fig. 1. An EN is composed wait and queue up. The average waiting time is expressed as
of an edge server with computing capability and a road side ∞
X P0 ·ξ Z · ξZ
unit with receiving ability. In this scene, J ENs are deployed tqu = (i − Z) · Pi = 2 (i > Z). (5)
near the roadside in the smart city, and its set is represented by i=Z+1
Z!(1 − ξZ )
R = {r1 , r2 , · · · , rJ }. The terminals are distributed in the city The time consumed by transmitting the service sn to the
with random. Denote E = {e1 , e2 , · · · , eN } as the terminal EN is denoted by ttr
n , and it is calculated by
set. Besides, each terminal has a service requiring offloading,
J
and the service set is denoted as S = {s1 , s2 , · · · , sN }. X vn
ttr
n = xn,j · , (6)
The data size of the service sn is given by vn while the bwwi
j=1
computation size is given by cn . For these smart city services
are computation-intensive and need immediate feedback, the where vn is the data size of the service sn , and bwwi is the
terminal would propagate its service to the EN with sufficient bandwidth of the wireless channel.
computing resources. Denote xn,j ∈ {0, 1} as a binary The execution time of the city services is dependent on
variable to represent whether the sn is offloaded to the EN rj . the computing ability of the EN. Denote texn,j as the time of
If xn,j equals 1, the terminal en would propagate its service executing the service sn in the EN rj , and it is given by
to the EN rj . Otherwise, there is no connection between the J
X cn
terminal en and the EN rj . tex
n,j = xn,j · , (7)
j=1
kj

B. Service response time Analysis where cn and kj are the computation size of the service sn
and the computing ability of the EN rj , respectively.
In our model, the service response time consists of the
Afterwards, the response time of the service sn is expressed
waiting time, the transmission time and the execution time.
as
The number of VMs in each EN is assumed to be Z. ttot qu
+ tex tr
n,j = t n,j + tn,j . (8)
Based on the queuing theory, the collaborative smart city
services arrive the EN with the Poisson distribution [33], C. Energy consumption Analysis
and the parameter is represented by γ. Besides, the resources
supplying time of the VM is also considered to follow the The energy expenditure produced by the propagation of the
Poisson distribution, and its parameter is denoted by β. Then terminal en is calculated as
the M/M/Z/∞/∞ queuing model for collaborative smart etr tr
n = tn · ppn , (9)
city services are established to calculate the waiting time in the
where ppn is the propagation power of the terminal en .
EN. Once the mechanism of service offloading arrives stable
The energy consumption of executing the service sn in the
state, the service intensity of one VM is given by
EN rj is given by
γ
ξ= . (1) eex
β n,j = vn · epj , (10)

For each EN is equipped with Z VMs, the service intensity where epj is the executing power of the EN rj .
of one EN is expressed as Afterwards, the total energy power of offloading the service
sn to the EN rj is given by
γ
ξZ = (ξZ < 1). (2) etot tr ex
Z ·β n,j = en + en,j . (11)

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 4

D. Load Balance Analysis Thus, the relevant connection of sn,g and prn,g could be
In the offloading of collaborative services, the services represented by
are supposed to be propagated to different ENs to obtain    
execution. To realize the balanced resources allocation and sn sn,1 sn,2 ··· sn,g
= . (18)
avoid resources wasting, the load balance is introduced to P rn prn,1 prn,2 ··· prn,g
evaluate whether the offloading strategy is appropriate. Define the the entropy information value of service data as
The number of services received by ENs is obligated to be K = k(s1 ), k(s2 ), . . . , k(sn ). The privacy entropy information
balanced, and the operating VMs of each EN are an important value of sn could be given by
feature. As to an EN rj , its number of occupied VMs is given
G
by X
k (sn ) = − prn,g · log2 prn,g . (19)
 g=1
N
P
 Z, ( xn,j > Z), Then, the relevant connection of the entropy value K and


ocj = n=1 offloading strategy U is expressed as
N N (12)
P P
xn,j , (1 ≤ xn,j ≤ Z).



n=1 n=1    
U u1 u2 ··· un
Based on ocj , the average occupied VMs of each EN is = . (20)
K k (s1 ) k (s2 ) · · · k (sn )
expressed as
J In the last, the summation of privacy entropy value of all
1X the service data is given by
ar = ocj . (13)
J j=1
N
1 X
With the average occupied VMs of each EN, the load k(s) = k (sn ) . (21)
N n=1
balance is given by
Based on the privacy entropy analysis, the privacy protection
J
1X 2 obtains quantification. In IOM, the privacy entropy value is a
lba = (ocj − ar) . (14)
J j=1 meaningful standard to evaluate the ability of the protection
for the sensitive information. The higher the privacy entropy
is, the more security the offloading process provides.
E. Problem Definition
The service response time, the load balance and the edge B. IOM Design
consumption are important indicators to evaluate the perfor-
mance of the edge computing. Based on the models given ACO performs the search of the global optimal solution
above, the problem of service offloading in edge environment with relatively quick speed and guaranteed efficiency [34].
is formulated as Additionally, the elitist ant allows the algorithm to converge
faster. In the beginning of the IOM, the graph structure is well
min t, min e, min lba. (15) constructed by the ENs and services. Then, by designing suit-
able effect value function, improving ant amount and ensuring
IV. P RIVACY A NALYSIS AND IOM D ESIGN iteration times, the ACO algorithm would be perfectly applied
to the searching for the optimal offloading strategy in the edge
A. Privacy Analysis computing.
As expounded in section II, there are N devices with
collaborative smart city services. The relationship of offloading
strategy U and the collaborative smart city services S is
expressed by
   
U u1 u2 · · · un
= . (16)
S s1 s2 · · · sn
According to the theory of information entropy, the data
of service sn waiting for the offloading is divided into G
parts, which is convenient for calculating the possibility of
propagating the g-th part of the service. Define the solicit
service set as sn = {sn,1 , sn,2 , · · · , sn,G }. Denote χ as the
parameter with Poisson distribution [24]. The possibility of
delivering sn,g obeys the Poisson distribution and it is given
by
χg −χ
prn,g = e , g = 1, 2, · · · , G. (17) Fig. 2. An example of service offloading using ACO.
g!

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 5

As depicted in Fig. 2, there are 7 ENs with powerful The flow chart of IOM which explains the process of IOM
computing ability and 8 services waiting for offloading in the in detail is depicted on Fig. 3. In the beginning, the ant colony
city, and they constitute a structure of the graph. The ant who and pheromone matrix are initialized, and the number of ants
goes throughout the graph is considered to accomplish one is set as M . Then the ant is selected from colony to accomplish
offloading strategy. In particular, the nodes in this graph having the route in turn. When all the ants of colony reaching their
pheromones with different concentrations which could affect destinations, the ants will be sorted by the effect value which
the choose of the ant. In most cases, the ant will choose the is related to their respective routes. Then the route of the ant
node with high pheromones as the next destination like (1,1), with highest fitness value would be recorded. Besides, the
(3,6) and (4,2). Infrequently, the ant will choose to go to the pheromone matrix is updated based on the route of this ant
node with relatively low pheromones like (2,4), which could according to (22) and (23). After the iteration, the recorded
avoid falling into local optimal solution. elitist ants are sorted, and the route of the best ant is as the
We initialize the ant colony and then define the start node offloading strategy which is closer to the optimal solution.
with assistance of the service graph. The ants go through the
graph to find the destination from the start node and choose the Algorithm 1 Offloading services using ACO
route. For they always put some pheromone on the route, the Require: The initialized ant colony AC, S and R
next ants could choose the optimal route easily. Other ants are Ensure: The optimal offloading strategy RO∗
more likely to move on the route with the highest pheromone, 1: Construct the grapth structure based on the S and R
and the next ants also find the route where pheromone in great 2: for lrecord = 1 to l do
quantity, which makes the route with highest effect value could 3: for the ant in AC do
be found by most of ants. 4: Go through the graph by the ant
Firstly, the ENs are encoded, and the computation offloading 5: Calculate objective functions by (8), (10) and (18)
strategies are conducted by ants. One ant that accomplishes the 6: Calculate the effect value of the ant
destination represents a solution of the computing resources 7: end for
allocation problem in the edge. In this method, the effect 8: Conduct pheromone debilitating
function consists of three parts: the service response time, the 9: Sort ants by the effect value
energy consumption and the load balance, which are presented 10: Select the ant with the highest effect value
in (8), (10) and (18), respectively. The parameters used in 11: Update pheromone matrix
our method are determined, including the number of ants M , 12: Record the route of the selected ant
pheromone decay rate α and the iteration time l. Denote Ln,j 13: end for
as the n-th service’s destination EN. The route of the m- 14: Choose the route with the beset performance as RO ∗
th ant is represented by ROm = (L1,j , L2,j , . . . , Ln,j ) (j = 15: return RO ∗
1, 2, . . . , J). The pheromone releasing mechanism and the
usual debilitating operation are utilized to start the route of
next ants. The decline rate of pheromone is given by
V. E XPERIMENT
τnj ← (1 − α) · τnj , (22)
A. Experiment Setup
where α is the modified parameter ranging from 0 to 1. In the simulation, the collaborative smart city services with
The pheromone undated value in our method is expressed different data size would be propagated to the diverse ENs
as relying on the different offloading methods. The service scale

C, (n, j) is on the route of high effect value, is set as 1000, 1500, 2000, 2500, 3000, 4500. Besides, the
∆τnj =
0, Otherwise , service size is set with random, ranging from 1 MB to 4
(23) MB. The computing ability of ENs is considered to be from
where C is the effect value of the the route with the perfect 3 GHZ to 6 GHZ. The energy power of the ENs is set from
performance and the node (n, j) is on the route. Then the 0.4 J/GHZ to 0.8 J/GHZ. The experiments are executed in
updated pheromone concentration is expressed as τnj ← (1 − a personal computer with Intel Core i5-8500HQ 3.2GHz and
α) · τnj + ∆τnj . 16GB RAM.
After pheromone debilitating and releasing, M new dif-
ferent routes have been accomplished by the ants. Then, we
B. Comparative Algorithms
conduct the sorting of the M routes based on the effect values
composed of three parts. We search for the ant with highest The methods which are used to compare the method pro-
effect values and record the route of this elitist ant. The posed in the paper to optimize the offloading of collaborative
evaluation of the routes are presented by the corresponding smart city services are Next Fit (NF) [18], First Fit (FF) [35]
effect values. After the natural decline of the pheromone and Benchmark. The descriptions of the three comparative
concentration, the pheromone concentration of the node on methods are as follows.
the route with highest effect value would be promoted. Then, • NF: The ENs are sorted based on their computing ability.
the pheromone matrix is updated. The process of conducting Then the service would send offloading requirement to the
the offloading method using ACO is expounded in Algorithm EN in turn. If the EN has free VMs, the service would be
1. received. Otherwise, it would continue to send offloading

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 6

Fig. 4. Comparison of the occupied ENs.

Fig. 5. Comparison of the energy consumption.

C. Experiment Evaluation
In the process of service offloading, the proposed IOM
requires optimizing the service response time, energy con-
sumption and the load balance variance at a certain moment
to obtain balanced strategies. The utility values for balanced
strategies generated by ACO at different service scales are
compared.
1) Comparison of The Occupied ENs: The comparison of
occupied is depicted in Fig. 4. From Fig. 4, it shows different
Fig. 3. The programming flowchart of IOM. number of occupied edge nodes of Benchmark, FF, NF and
IOM respectively with the increasing number of collaborative
smart city services. IOM keeps a relatively high occupancy
rate of ENs, and it will occupy all the ENs when the number
requirement to the next EN. When the service is received,
of services is beyond a certain value.The occupied ENs of
the next service send the offloading requirement to the
FF and NF are with quantitative similarity and the number of
same EN.
nodes is really small, showing that they could not make the
• FF:
fully use computing resources in the edge. In Benchmark, the
The service would send offloading requirement to the EN
collaborative smart city services are offloaded with random,
that has been sorted with computing ability. Compared to
which ensures the high number of occupied ENs.
the NF, when the service is received by the EN, the next
2) Comparison of The Energy Consumption: The compari-
service conduct a new requiring circle from the first EN.
son of total energy consumption is showed in Fig. 5. From Fig.
• Benchmark: Collaborative smart city services will be
5 it can be seen that NF produces the most energy consumption
propagated to the EN with random. If all the VMs in the
because it expends a huge amount of energy on the backhauls
EN are not free, the service will be offloaded to another
during high uploading period. The energy expenditure of FF
random EN.
is in the nick of NF for it doesn’t lay stress on the energy

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 7

vious EN and is unaware of the propagation process. FF also


consumes relatively longer propagation time, since it chooses
to offload service to the EN in turn without consciousness of
transmission. Benchmark consumes relatively shorter propaga-
tion time due to its random offloading strategy, resulting small
propagation loss. For the service response time is an important
optimal objective of IOM, IOM performs in decreasing the
propagation time. Besides, its average propagation time is no
more than 0.2s with the increasing number of services, largely
shorter than other comparison experiments.

Fig. 6. Comparison of the service response time.

Fig. 9. Comparison of the executing time.

4) Comparison of The Executing Time: The comparison


of executing time among IOM, Benchmark, FF and NF is
Fig. 7. Comparison of the load balance. presented on Fig. 9. As Fig. 9 depicted, NF produces the
longest executing time during offloading and FF also produces
relatively longer time. NF is unconscious of the execution
consumption level when making offloading decisions. In line process usually transmits the service to the previous EN.
with our expectations, IOM consumes similar energy with FF, Besides, FF always chooses to offload service to the EN
maintaining relatively low energy consumption with the num- in turn without consciousness of reducing execution time.
ber of services throughout the whole simulation. Furthermore, Benchmark consumes relatively shorter executing time due
IOM produces less energy than NF with increasing services, to its random offloading strategy, resulting small executing
which implies stability of IOM could be improved with the loss. Since the service response time is the major optimization
increasing number of offloaded services. objective of IOM and the propagation time is the major part of
total time, IOM does a good job in reducing executing time.
What’s more, its average executing time is no more than 0.15s
with the increasing number of services, which occupies edge
advantages compared to other methods.
5) Comparison of The Service Response Time: When ser-
vice offloading is performed, the service response time is
quantified as a goal of evaluating the superiority of the offload
strategy. In Fig. 6, compared to other methods, IOM using the
ACO determines strategies with lower service response time.
Since the offloading strategies of NF are based on the previous
offloading strategy, NF saves some time compared to FF. The
strategies determined by IOM have shorter execution time,
which results in less completion time for the IOM. In addition,
IOM is significantly better than Benchmark by comparing the
Fig. 8. Comparison of the transmission time. difference of completion time between Benchmark and IOM.
6) Comparison of The Load Balance: The load balance
3) Comparison of The Transmission Time: The comparison variance is another optimization goal for determining the
of transmission time among IOM, Benchmark, FF and NF is strategy of service offloading. To avoid the network congestion
presented on Fig. 8. NF consumes the longest propagation time and ensure the utilization of ENs, the services are uniformly
during offloading, for it always transmits the service to the pre- offloaded to all ENs. Fig. 7 portrays the number of the

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 8

occupied ENs. IOM usually maintains a high occupancy rate R EFERENCES


of ENs, and almost all ENs are occupied when the service
size reaches a certain size. In Benchmark, the services are [1] M. Sun, Y. Wang, G. Strbac, and C. Kang. Probabilistic peak load
estimation in smart cities using smart meter data. IEEE Transactions on
randomly offloaded, so there are also many ENs that are Industrial Electronics, 66(2):1608–1618, 2019.
occupied. However, FF and NF only occupy a small number [2] M. Sato, Y. Fukuyama, T. Iizaka, and T. Matsui. Total optimization of
of nodes, and it results in a high load-balance variance in FF energy networks in a smart city by multi-swarm differential evolutionary
and NF when the service scale is small. particle swarm optimization. IEEE Transactions on Sustainable Energy,
10(4):2186–2200, 2019.
[3] S. Bouchelaghem and M. Omar. Reliable and secure distributed smart
road pricing system for smart cities. IEEE Transactions on Intelligent
Transportation Systems, 20(5):1592–1603, 2019.
[4] J. Qiu, Y. Chai, Z. Tian, X. Du, and M. Guizani. Automatic concept
extraction based on semantic graphs from big data in smart city. IEEE
Transactions on Computational Social Systems, 7(1):225–233, 2020.
[5] Q. Chen, W. Wang, F. Wu, S. De, R. Wang, B. Zhang, and X. Huang.
A survey on an emerging area: Deep learning for smart city data.
IEEE Transactions on Emerging Topics in Computational Intelligence,
3(5):392–410, 2019.
[6] E. Li, L. Zeng, Z. Zhou, and X. Chen. Edge ai: On-demand accelerating
deep neural network inference via edge computing. IEEE Transactions
on Wireless Communications, 19(1):447–457, 2020.
[7] C. Liao, T. Chen, and A. Wu. Real-time multi-user detection engine
design for iot applications via modified sparsity adaptive matching
pursuit. IEEE Transactions on Circuits and Systems I: Regular Papers,
66(8):2987–3000, 2019.
[8] Z. Tian, W. Shi, Y. Wang, C. Zhu, X. Du, S. Su, Y. Sun, and
Fig. 10. Comparison of the privacy entropy. N. Guizani. Real-time lateral movement detection based on evidence
reasoning network for edge computing environment. IEEE Transactions
on Industrial Informatics, 15(7):4285–4294, 2019.
7) Comparison of Privacy Entropy: Fig. 10 presents the [9] B. Lin, F. Zhu, J. Zhang, J. Chen, X. Chen, N. N. Xiong, and J. Lloret
Mauri. A time-driven data placement strategy for a scientific workflow
privacy entropy compared by the IOM, Benchmark, FF and combining edge computing and cloud computing. IEEE Transactions
NF. For the privacy entropy represents the security of offload- on Industrial Informatics, 15(7):4254–4265, 2019.
ing, the higher the privacy entropy is, the more security the [10] W. Na, S. Jang, Y. Lee, L. Park, N. Dao, and S. Cho. Frequency resource
allocation and interference management in mobile edge computing for an
offloading process provides . With the increase number ser- internet of things system. IEEE Internet of Things Journal, 6(3):4910–
vices, the privacy entropy gains linear growth. Besides, IOM 4920, 2019.
keeps the highest privacy entropy among the four methods, [11] X. Li, J. Wan, H. Dai, M. Imran, M. Xia, and A. Celesti. A hybrid
meaning it performs well in the terms of privacy protection. computing solution and resource scheduling strategy for edge computing
in smart manufacturing. IEEE Transactions on Industrial Informatics,
15(7):4225–4234, 2019.
[12] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi. Blockchain meets edge
VI. C ONCLUSION computing: A distributed and trusted authentication system. IEEE
Transactions on Industrial Informatics, 16(3):1972–1983, 2020.
As for collaborative smart city services, weakness of long [13] M. Thai, Y. Lin, Y. Lai, and H. Chien. Workload and capacity opti-
service response time and low QoS needs to be improved. Cur- mization for cloud-edge computing systems with vertical and horizontal
offloading. IEEE Transactions on Network and Service Management,
rently, edge computing is integrated with smart city to promote 17(1):227–238, 2020.
the inherent shortcomings of terminals in cities. In this paper, [14] L. Wang, L. Jiao, J. Li, J. Gedeon, and M. Mühlhäuser. Moera:
we design an intelligent offloading method for collaborative Mobility-agnostic online resource allocation for edge computing. IEEE
Transactions on Mobile Computing, 18(8):1843–1856, 2019.
smart city services, named IOM. This method contributes to
[15] J. Ren, G. Yu, Y. He, and G. Y. Li. Collaborative cloud and edge
achieving the trade-offs among minimizing service response computing for latency minimization. IEEE Transactions on Vehicular
time, optimizing energy consumption and maintaining load Technology, 68(5):5031–5044, 2019.
balance while guaranteeing the privacy preservation during [16] Q. He, G. Cui, X. Zhang, F. Chen, S. Deng, H. Jin, Y. Li, and Y. Yang.
A game-theoretical approach for user allocation in edge computing
service offloading. In the experiment evaluation, the effective- environment. IEEE Transactions on Parallel and Distributed Systems,
ness and efficiency of IOM is verified. In our next work, we 31(3):515–529, 2020.
will devote to applying IOM to real life, taking more real [17] T. Wang, H. Ke, X. Zheng, K. Wang, A. K. Sangaiah, and A. Liu.
Big data cleaning based on mobile edge computing in industrial sensor-
details of smart city into account. cloud. IEEE Transactions on Industrial Informatics, 16(2):1321–1329,
2020.
[18] Xiaolong Xu, Yuan Xue, Lianyong Qi, Yuan Yuan, Xuyun Zhang, Tariq
ACKNOWLEDGMENT Umer, and Shaohua Wan. An edge computing-enabled computation
offloading method with privacy preservation for internet of connected
This research is supported by the Financial and Science vehicles. Future Generation Computer Systems, 96:89–100, 2019.
Technology Plan Project of Xinjiang Production and Con- [19] Z. Zhou, B. Wang, M. Dong, and K. Ota. Secure and efficient
vehicle-to-grid energy trading in cyber physical systems: Integration of
struction Corps under grant no. 2020DB005, and the National blockchain and edge computing. IEEE Transactions on Systems, Man,
Natural Science Foundation of China under grant no.61702277 and Cybernetics: Systems, 50(1):43–57, 2020.
and no.61872219. This research is also supported by the [20] J. Wang, L. Wu, K. R. Choo, and D. He. Blockchain-based anonymous
authentication with key management for smart grid edge computing
Priority Academic Program Development of Jiangsu Higher infrastructure. IEEE Transactions on Industrial Informatics, 16(3):1984–
Education Institutions (PAPD) fund. 1992, 2020.

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2020.3000871, IEEE Internet of
Things Journal

IEEE INTERNET OF THINGS JOURNAL 9

[21] Y. Zhou, C. Pan, P. L. Yeoh, K. Wang, M. Elkashlan, B. Vucetic, and Qihe Huang is currently working towards his B.S.
Y. Li. Secure communications for uav-enabled mobile edge computing degree in software engineering at School of Com-
systems. IEEE Transactions on Communications, 68(1):376–388, 2020. puter and Software in Nanjing University of In-
[22] Q. Xu, Z. Su, Q. Zheng, M. Luo, B. Dong, and K. Zhang. Game formation Science and Technology. His research
theoretical secure caching scheme in multihoming edge computing- interests include edge computing and IoT.
enabled heterogeneous networks. IEEE Internet of Things Journal,
6(3):4536–4546, 2019.
[23] J. Kang, R. Yu, X. Huang, and Y. Zhang. Privacy-preserved pseudonym
scheme for fog computing supported internet of vehicles. IEEE Trans-
actions on Intelligent Transportation Systems, 19(8):2627–2637, 2018.
[24] X. Xu, C. He, Z. Xu, L. Qi, S. Wan, and M. Z. A. Bhuiyan. Joint op-
timization of offloading utility and privacy for edge computing enabled
iot. IEEE Internet of Things Journal, 7(4):2622–2629, 2020.
[25] Y. Wang, H. Sun, Y. Zhao, W. Zhou, and S. Zhu. A heterogeneous graph
embedding framework for location-based social network analysis in
smart cities. IEEE Transactions on Industrial Informatics, 16(4):2747– Xiaochun Yin received the B.S. degree in educa-
2755, 2020. tion and technology from Qufu Normal University,
[26] Xiaolong Xu, Xihua Liu, Zhanyang Xu, Fei Dai, Xuyun Zhang, and Qufu, China in 2004, and received the M.S. degree
Lianyong Qi. Trust-oriented iot service placement for smart cities in in education and technology from Nanjing Normal
edge computing. IEEE Internet of Things Journal, 2019. University, Nanjing, China in 2007, and received
[27] M Shamim Hossain, Ghulam Muhammad, and Atif Alamri. Smart the Ph.D. from Dongseo University, Korea in 2015.
healthcare monitoring: A voice pathology detection paradigm for smart She is now working as an associate professor in
cities. Multimedia Systems, 25(5):565–575, 2019. Weifang University of Science &Technology China.
[28] Fadi Al-Turjman, Hadi Zahmatkesh, and Ramiz Shahroze. An overview Her research interests include network security, IoT
of security and privacy in smart cities’ iot communications. Transactions security, authentication protocol and agricultural in-
on Emerging Telecommunications Technologies, page e3677, 2019. telligence systems.
[29] A. Bonadio, F. Chiti, and R. Fantacci. Performance analysis of an
edge computing saas system for mobile users. IEEE Transactions on
Vehicular Technology, 69(2):2049–2057, 2020.
[30] Lei Lei, Huijuan Xu, Xiong Xiong, Kan Zheng, and Wei Xiang. Joint
computation offloading and multi-user scheduling using approximate Mahdi Abbasi is an Assistant Professor at the
dynamic programming in nb-iot edge computing system. IEEE Internet Department of Computer Engineering, Engineering
of Things Journal, 2019. Faculty, Bu-Ali Sina University, Hamedan, Iran. Dr.
[31] Z. Xiong, J. Kang, D. Niyato, P. Wang, and H. V. Poor. Cloud/edge Abbasi has received his BSc, MSc and PhD in the
computing service management in blockchain networks: Multi-leader field of computer engineering from Sharif Univer-
multi-follower game-based admm for pricing. IEEE Transactions on sity of Technology, Tehran, Iran, and University of
Services Computing, 13(2):356–367, 2020. Isfahan, Isfahan, Iran. His interests include computer
[32] J. Li, W. Liang, M. Huang, and X. Jia. Reliability-aware network service architecture, computer vision and image processing,
provisioning in mobile edge-cloud networks. IEEE Transactions on machine learning, internet of things and computer
Parallel and Distributed Systems, 31(7):1545–1558, 2020. networking.
[33] F. Varshosaz, M. Moazzami, B. Fani, and P. Siano. Day-ahead capacity
estimation and power management of a charging station based on queu-
ing theory. IEEE Transactions on Industrial Informatics, 15(10):5561–
5574, 2019.
[34] X. Yu, W. Chen, T. Gu, H. Yuan, H. Zhang, and J. Zhang. Aco-a*: Ant
colony optimization plus a* for 3-d traveling in environments with dense
obstacles. IEEE Transactions on Evolutionary Computation, 23(4):617– Mohammad R. Khosravi is now with the Depart-
631, 2019. ment of Computer Engineering, Persian Gulf Univer-
[35] R. Kalyana and S. N. Aruna. A hybrid energy efficient ff algorithm for sity, Bushehr, Iran, and has been with Department
wireless sensor network. In 2017 International Conference on Wireless of Electrical and Electronic Engineering, Shiraz
Communications, Signal Processing and Networking (WiSPNET), pages University of Technology, Shiraz, Iran. Mohammad
1635–1639, 2017. has studied electrical engineering with expertise in
communications and signal processing for BSc, MSc
and PhD degrees, all from Iranian universities in
2013, 2015 and 2020, respectively. His main inter-
ests include statistical signal and image processing,
Xiaolong Xu (Member, IEEE) received the Ph.D. medical bioinformatics, radar imaging and satellite
degree in computer science and technology from remote sensing, and computer communications.
Nanjing University, China, in 2016. He was a
Research Scholar with Michigan State University,
USA, from April 2017 to May 2018. He is currently
an Associate Professor with the School of Computer
and Software, Nanjing University of Information
Science and Technology. He has published more Lianyong Qi received his PhD degree in Department
than 80 peer-review articles in international journals of Computer Science and Technology from Nanjing
and conferences, including the IEEE Transactions on University, China, in 2011. Now, he is an asso-
Intelligent Transactions Systems (TITS), the IEEE ciate professor of the School of Information Science
Transactions on Industrial Informatics (TII), the IEEE Transactions on Cloud and Engineering, Chinese Academy of Education
Computing (TCC), the IEEE Transactions on Big Data (TBD), the IEEE Big Data, Qufu Normal University, China. He has
Transactions on Computational Social Systems (TCSS), the IEEE Internet already published more than 50 papers including
of Things Journal (IEEE IOT), the IEEE Transactions on Emerging Topics in JSAC, TCC, TBD, FGCS, JCSS, CCPE, ICWS and
Computational Intelligence (TETCI), the IEEE International Conference on ICSOC, etc. His research interests include services
Web Services (ICWS), and ICSOC. He received the Best Paper Award from computing, big data and IoT.
the IEEE CBD 2016, and the TOP citation award from the Computational
Intelligence journal in 2019. His research interests include edge computing,
the Internet of Things (IoT), cloud computing, and big data.

2327-4662 (c) 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on June 14,2020 at 03:21:25 UTC from IEEE Xplore. Restrictions apply.

You might also like