Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for intelligent offloading and security assurance of computing tasks in a 5G edge computing environment

A technology of edge computing and computing tasks, applied in the field of communication, can solve problems such as heavy load of base stations, private data infringement, and inability to obtain calculation results, so as to achieve effective use and avoid leakage

Active Publication Date: 2021-11-23
NANJING UNIV OF POSTS & TELECOMM +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are still many problems in the current mobile edge computing. For example, during the task offloading period, the user can choose to offload the data of the computing task to the MEC server via a wireless channel, which may cause sensitive private data to be violated; The exponential expansion of the number of users in some areas may lead to different loads of different base stations. Some base stations may be severely loaded, while some base stations may still have a large amount of computing resources remaining, and it is urgent to load base stations with different coverage areas. balance; in addition, during task offloading, user mobility may also prevent users from obtaining calculation results, resulting in waste of computing resources and energy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for intelligent offloading and security assurance of computing tasks in a 5G edge computing environment
  • A method for intelligent offloading and security assurance of computing tasks in a 5G edge computing environment
  • A method for intelligent offloading and security assurance of computing tasks in a 5G edge computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0055] like figure 1 As shown, a method for intelligent offloading of computing tasks and optimization of security assurance in a 5G edge computing environment is applied to the network scenario of multi-user and multi-MEC servers. It also considers the time delay and energy consumed, as well as the fees paid by the user to the MEC server. Q-Learning is adopted to maximize the system benefit to obtain the user's offloading solution. In addition, the load balance between the base stations is also considered. Tasks are prioritized to more effectively utilize the computing resources of the MEC server and the channel resources of the base station. Finally, considering the security of user tasks during offloading, AES encryption based on multi-dime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computing task intelligent offloading and security guarantee method in a 5G edge computing environment. The method first considers the user's mobility during the offloading process, estimates the user's stay time in the base station, and considers the user's mobility during the offloading process. , the time delay and energy consumed, and the fee paid by the user to the MEC server. With the goal of maximizing system benefits, Q-Learning is used to obtain the user's offloading solution; secondly, considering the load balancing between base stations, the user task is prioritized Level sorting, assigning the appropriate base station offload for the task, so as to more effectively use the computing resources of the MEC server and the channel resources of the base station; in addition, the security of the user task during offloading is also considered, and the data transmitted between the MEC and the user is adopted. AES encryption based on multi-dimensional biometrics.

Description

technical field [0001] The invention relates to the field of communication technologies, in particular to a method for intelligently unloading computing tasks and ensuring safety in a 5G edge computing environment. Background technique [0002] Due to the rapid development of communication technology, the methods of communication are becoming more and more diverse. A series of new communication services such as augmented reality services (AR), virtual reality services (VR), autonomous driving technology, etc., are different from traditional communication technologies. These real-time services require fast processing of a large amount of application data. However, due to the limited resources of terminal devices, some computing tasks can be written to the edge server through mobile edge computing (MEC), so that application data can be processed quickly. [0003] However, there are still many problems in the current mobile edge computing. For example, during task offloading, u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/50G06N20/00H04L9/06
CPCG06F9/5083G06N20/00H04L9/0631Y02D10/00
Inventor 赵海涛张晗张晖陈志远娄兴良倪艺洋夏文超蔡艳
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products