CN116074841B - Edge computing trusted access method, device, equipment and computer storage medium - Google Patents

Edge computing trusted access method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN116074841B
CN116074841B CN202310209062.2A CN202310209062A CN116074841B CN 116074841 B CN116074841 B CN 116074841B CN 202310209062 A CN202310209062 A CN 202310209062A CN 116074841 B CN116074841 B CN 116074841B
Authority
CN
China
Prior art keywords
edge
domain
trust
trusted access
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310209062.2A
Other languages
Chinese (zh)
Other versions
CN116074841A (en
Inventor
钟晓雄
吕建辉
刘室求
张宇
张伟哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peng Cheng Laboratory
Original Assignee
Peng Cheng Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peng Cheng Laboratory filed Critical Peng Cheng Laboratory
Priority to CN202310209062.2A priority Critical patent/CN116074841B/en
Publication of CN116074841A publication Critical patent/CN116074841A/en
Application granted granted Critical
Publication of CN116074841B publication Critical patent/CN116074841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/66Trust-dependent, e.g. using trust scores or trust relationships

Abstract

The present invention relates to the field of mobile edge computing technologies, and in particular, to an edge computing trusted access method, device, equipment, and computer storage medium, where the method includes: acquiring user interest degree uploaded by the edge equipment through the edge server; performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server; and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment. The invention improves the performance of the access mechanism in an edge computing environment.

Description

Edge computing trusted access method, device, equipment and computer storage medium
Technical Field
The present invention relates to the field of mobile edge computing technologies, and in particular, to an edge computing trusted access method, device, equipment, and computer storage medium.
Background
While mobile edge computing brings great potential benefits to 5G, cloud computing, internet of things, applying mobile edge computing to practice still faces many challenges, for example, access mechanism is one of the current key bottlenecks. The function of the access mechanism is to prevent the network external node from unauthorized access to all network resources such as computer resources, communication resources or information resources in the network by adopting the access control mechanism, and control the external access point to connect or use the network resources, thereby ensuring the characteristics of stability, safety and the like of the network resources.
Currently, existing access mechanisms cannot be directly applied to edge computing because it ignores the computing power, storage power, and the impact of the edge computing hierarchy on the access mechanism policies of the resource-constrained edge devices. In other words, since the conventional access mechanism is specific to the wireless network and the distributed system, the factors such as delay sensitivity, processing and computing power of the terminal node are ignored, which will greatly reduce the performance of the conventional access mechanism in the edge computing environment.
In summary, how to improve the performance of an access mechanism in an edge computing environment is a technical problem that needs to be solved.
Disclosure of Invention
The invention mainly aims to provide an edge computing trusted access method, an edge computing trusted access device, edge computing trusted access equipment and a computer storage medium, and aims to improve performance of an access mechanism in an edge computing environment.
In order to achieve the above object, the present invention provides an edge computing trusted access method, which is applied to a cloud server in an edge computing trusted access system, the edge computing trusted access system further includes: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively;
the edge computing trusted access method comprises the following steps:
acquiring user interest degree uploaded by the edge equipment through the edge server;
performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
Optionally, the domain trust relationship comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model comprises the following steps:
acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
Figure SMS_1
wherein ,
Figure SMS_2
refers to the indirect trust,/->
Figure SMS_3
Meaning the overall satisfaction, +.>
Figure SMS_4
Means that the edge server has trust value for the target domain at the target moment,/>
Figure SMS_5
Means the edge device->
Figure SMS_6
Refers to the edge server, +.>
Figure SMS_7
Refers to the number of edge servers;
and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
Optionally, the domain trust relationship further comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model comprises the following steps:
In the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
Figure SMS_8
wherein ,
Figure SMS_9
refers to a domainBOpposite domainADirect trust between->
Figure SMS_10
Refers to the time domain at the targetAOpposite domainBMiddle edge server->
Figure SMS_11
Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->
Figure SMS_12
Is the number of (3);
and obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
Optionally, the step of obtaining inter-domain indirect trust between the domains includes:
the inter-domain indirect trust is obtained through calculation according to a preset third formula, wherein the third formula is as follows:
Figure SMS_13
wherein ,
Figure SMS_14
refers to the domainBFor the domainAInter-domain indirect trust between->
Figure SMS_15
Means that at the target time the domainBEdge server->
Figure SMS_16
For the domainAIs satisfied by the second objective of->
Figure SMS_17
Means that at the target time the domainBMiddle edge server->
Figure SMS_18
For the domainATarget indirect trust of (c).
Optionally, the edge computing trusted access method further includes:
constructing a first game trusted access model between the edge equipment and the edge server;
And calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
Figure SMS_19
wherein ,
Figure SMS_20
means the profit maximum,/->
Figure SMS_21
Refers to the trust value of the edge device,
Figure SMS_22
is the satisfaction of the edge device, +.>
Figure SMS_23
Refers to the price of the edge device for the edge server bandwidth, +.>
Figure SMS_24
Means the requested bandwidth of said edge device, < > and->
Figure SMS_25
Refers to the uplink maximum bandwidth of the edge device.
Optionally, the edge computing trusted access method further includes:
constructing a second game trusted access model between the edge server and the cloud server;
and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
Optionally, after the step of obtaining the revenue matrix between the edge server and the cloud server, the method further comprises:
acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
Obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
In addition, in order to achieve the above object, the present invention further provides an edge computing trusted access device, which includes:
the acquisition module is used for acquiring the user interest degree uploaded by the edge equipment through the edge server;
the division module is used for carrying out domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
the construction module is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
The respective functional modules of the edge computing trusted access device of the present invention implement the steps of the edge computing trusted access method of the present invention as described above at run-time.
In addition, to achieve the above object, the present invention also provides a terminal device, where the terminal device includes a memory, a processor, and an edge calculation trusted access program stored in the memory and executable on the processor, and the edge calculation trusted access program implements the steps of the above edge calculation trusted access method when executed by the processor.
In addition, in order to achieve the above object, the present invention further provides a computer storage medium, on which an edge calculation trusted access program is stored, which when executed by a processor, implements the steps of the above edge calculation trusted access method.
In the present invention, an edge computing trusted access system includes: a cloud Server (CDC, cloud Data Center) and a plurality of Edge servers (Edge servers), wherein the cloud Server establishes communication connection with the plurality of Edge servers respectively, and each Edge Server establishes communication connection with a corresponding Edge device (Edge device) respectively; the cloud server acquires user interest degree uploaded by the edge devices through the edge servers, and then carries out domain division processing on the edge computing trusted access system according to the user interest degree to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in a domain corresponding to the edge servers; after finishing the domain division processing operation, a layered trust model is constructed according to the first domain layer and the second domain layer, and inter-domain comprehensive trust among domains is obtained according to the layered trust model.
Different from the traditional access mechanism, the cloud server firstly carries out domain division processing on the edge computing trusted access system according to the received user interest level, and then quickly and efficiently builds a layered trust model through the first domain layer and the second domain layer, and then accurately obtains the domain trust relationship of the edge computing trusted access system through the layered trust model, so that the robustness and convergence speed of the edge computing trusted access system are effectively improved, namely the performance of the access mechanism in an edge computing environment is improved.
Drawings
FIG. 1 is a flow chart of a first embodiment of an edge computing trusted access method of the present invention;
FIG. 2 is a block diagram of a hierarchical trust model involved in an edge computing trusted access method of the present invention;
FIG. 3 is a block diagram of a game trusted access model involved in the edge computing trusted access method of the present invention;
FIG. 4 is a schematic diagram of an edge computing trusted access device according to the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The embodiment of the invention provides an edge computing trusted access method, and referring to fig. 1, fig. 1 is a flow diagram of a first embodiment of the edge computing trusted access method of the invention.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application.
In this embodiment, the edge computing trusted access method of the present invention is applied to a cloud server in an edge computing trusted access system, where the edge computing trusted access system includes: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively.
It should be noted that, the cloud server may be understood as a data processing center; an edge server may be understood as a device that provides services to edge devices, such as IoT gateways, routers, and mobile network base stations, among others; the edge device is a user terminal device which requests service from an edge server, such as a mobile phone, a computer, a tablet, an automobile control center and the like.
The edge computing trusted access method comprises the following steps:
step S10: acquiring user interest degree uploaded by the edge equipment through the edge server;
In this embodiment, the cloud server obtains the user interest degree uploaded by the edge device through the edge server.
It should be noted that, the user interest degree may be understood as the access duration and access frequency of the user on each web page, where each user corresponds to one edge device.
Step S20: performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
in this embodiment, the cloud server performs domain division processing on the entire edge computing trusted access system according to the user interest level uploaded by the edge device, so as to obtain a first domain layer and a second domain layer.
It should be noted that, the first domain layer refers to a domain corresponding to each edge server, that is, one edge server corresponds to one domain; the second domain layer refers to a plurality of edge devices included in a domain corresponding to the edge server; an edge server in the same target domain may establish communication connection with a plurality of edge devices of the target domain, in other words, in the same target domain, the edge servers correspond to the plurality of edge devices, and the kinds of the edge servers corresponding to the plurality of edge devices are also the same.
For example, the types of the edge servers in the first target domain corresponding to the plurality of edge devices are vehicle control centers of the vehicles, the types of the edge servers in the second target domain corresponding to the plurality of edge devices are mobile phones, the types of the edge servers in the third target domain corresponding to the plurality of edge devices are computers, and the types of the edge servers in the fourth target domain corresponding to the plurality of edge devices are flat plates.
Step S30: and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
In this embodiment, referring to fig. 2, fig. 2 is a block diagram of a hierarchical trust model related to an edge computing trusted access method of the present invention. The cloud server builds a layered trust model according to the first domain layer and the second domain layer, specifically, the cloud server places edge servers corresponding to different domains in the first domain layer, determines the types of edge devices corresponding to the edge servers, sorts the edge devices according to the types of the edge devices, places the edge devices corresponding to the different edge servers in the second domain layer, and further completes the construction operation of the layered trust model; and finally, the cloud server obtains inter-domain comprehensive trust among the domains according to the layered trust model.
In yet another embodiment, the cloud server may further perform obtaining the domain trust relationship of the edge computing trusted access system after correcting the layered trust model according to the updated time prediction algorithm of the bayesian model or the indirect trust value of the bayesian decision, so as to effectively improve the accuracy of the domain trust relationship of the edge computing trusted access system.
In summary, in the present invention, an edge computing trusted access system includes: a cloud Server (CDC, cloud Data Center) and a plurality of Edge servers (Edge servers), wherein the cloud Server establishes communication connection with the plurality of Edge servers respectively, and each Edge Server establishes communication connection with a corresponding Edge device (Edge device) respectively; the cloud server acquires user interest degree uploaded by the edge devices through the edge servers, and then carries out domain division processing on the edge computing trusted access system according to the user interest degree to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in a domain corresponding to the edge servers; after finishing the domain division processing operation, a layered trust model is constructed according to the first domain layer and the second domain layer, and inter-domain comprehensive trust among domains is obtained according to the layered trust model.
Different from the traditional access mechanism, the cloud server firstly carries out domain division processing on the edge computing trusted access system according to the received user interest level, and then quickly and efficiently builds a layered trust model through the first domain layer and the second domain layer, and then accurately obtains the domain trust relationship of the edge computing trusted access system through the layered trust model, so that the robustness and convergence speed of the edge computing trusted access system are effectively improved, namely the performance of the access mechanism in an edge computing environment is improved.
Further, based on the first embodiment of the edge computing trusted access of the present invention, a second embodiment of the edge computing trusted access of the present invention is provided.
Further, in some possible embodiments, the domain trust relationship comprises: the edge device trusts in the domain in the target domain, step S30 above: obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model may further include:
step S301: acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
in this embodiment, the cloud server obtains, through the hierarchical trust model, the frequency of interaction between the edge server and the edge device in the same target domain.
Step S302: determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
in this embodiment, the cloud server calculates the overall satisfaction of the edge server to the edge device (i.e., in the same target domain, the edge server directly trusts the edge device) by using the following satisfaction calculation formula:
Figure SMS_26
(1)
wherein ,
Figure SMS_28
refers to the overall satisfaction of the edge server with the edge device,/>
Figure SMS_31
Representing computing power, +.>
Figure SMS_34
For energy factor, +.>
Figure SMS_29
For social attributes->
Figure SMS_30
A value related to satisfaction, +.>
Figure SMS_32
Negative values indicate dissatisfaction and positive values indicate satisfaction. Meanwhile, the weight parameters are as follows
Figure SMS_33
+/>
Figure SMS_27
Figure SMS_35
It should be noted that the number of the substrates,
Figure SMS_36
it is understood that the edge server responds to the edge server by sending a request for feedback a proportional number of times to the number of connections requested by the edge server by the upper edge device.
Negative values correspond to the ratio values being less than a predetermined satisfaction threshold relationship, and positive values correspond to the ratio values being greater than or equal to the predetermined satisfaction threshold relationship. In other words, the cloud server judges whether the proportion value is smaller than a preset satisfaction threshold value, and if the proportion value is smaller than the preset satisfaction threshold value, the cloud server acquires the information that the proportion value is negative; and if the proportion value is larger than or equal to a preset satisfaction threshold value, acquiring information that the proportion value is a positive value.
Figure SMS_37
、/>
Figure SMS_38
and />
Figure SMS_39
It is understood as the attribute to which the edge device corresponds.
Step S303: obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
Figure SMS_40
wherein ,
Figure SMS_41
refers to the indirect trust,/->
Figure SMS_42
Meaning the overall satisfaction, +.>
Figure SMS_43
Means that the edge server has trust value for the target domain at the target moment,/>
Figure SMS_44
Means the edge device->
Figure SMS_45
Refers to the edge server, +.>
Figure SMS_46
Refers to the number of edge servers;
in this embodiment, the cloud server obtains indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, where the preset first formula is:
Figure SMS_47
(2)
wherein ,
Figure SMS_48
refers to the indirect trust,/->
Figure SMS_49
Meaning the overall satisfaction, +.>
Figure SMS_50
Means that the edge server has trust value for the target domain at the target moment,/>
Figure SMS_51
Means the edge device->
Figure SMS_52
Refers to the edge server, +.>
Figure SMS_53
Refers to the number of the edge servers
Step S304: and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
In this embodiment, the cloud server obtains the domain trust of the edge device in the target domain according to the overall satisfaction and the indirect trust.
Note that the domain trust of an edge device in a target domain can be expressed as:
Figure SMS_54
(3)
wherein the relation of the weight parameters is that
Figure SMS_55
Further, in other possible embodiments, the domain trust relationship further comprises: inter-domain comprehensive trust between the domains, step S30: obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model may further include:
step S305: in the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
Figure SMS_56
wherein ,
Figure SMS_57
refers to a domainBOpposite domainADirect trust between->
Figure SMS_58
Refers to the time domain at the targetAOpposite domainBMiddle edge server->
Figure SMS_59
Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->
Figure SMS_60
Is the number of (3);
in this embodiment, the cloud server calculates, in the hierarchical trust model, the direct trust between the domains according to a preset second formula, where the preset second formula is:
Figure SMS_61
(4)
wherein ,
Figure SMS_62
refers to a domainBOpposite domainADirect trust between->
Figure SMS_63
Refers to the time domain at the targetAOpposite domainBMiddle edge server->
Figure SMS_64
Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server- >
Figure SMS_65
Is the number of (3);
step S306: and obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
In this embodiment, the cloud server obtains inter-domain indirect trust between domains, and obtains inter-domain comprehensive trust between domains according to the direct trust and the inter-domain indirect trust.
It should be noted that the expression of the inter-domain integrated trust is as follows:
Figure SMS_66
(5)
further, in other possible embodiments, step S306 described above: acquiring inter-domain indirect trust between the domains may further include:
step S3061: the inter-domain indirect trust is obtained through calculation according to a preset third formula:
Figure SMS_67
wherein ,
Figure SMS_68
refers to the domainBFor the domainAInter-domain indirect trust between->
Figure SMS_69
Means that at the target time the domainBEdge server->
Figure SMS_70
For the domainAIs satisfied by the second objective of->
Figure SMS_71
Means that at the target time the domainBMiddle edge server->
Figure SMS_72
For the domainATarget indirect trust of (c).
In this embodiment, the cloud server calculates the inter-domain indirect trust through a preset third formula, where the preset third formula is:
Figure SMS_73
(6)
wherein ,
Figure SMS_74
Refers to the domainBFor the domainAInter-domain indirect trust between->
Figure SMS_75
Means that at the target time the domainBEdge server->
Figure SMS_76
For the domainAIs satisfied by the second objective of->
Figure SMS_77
Means that at the target time the domainBMiddle edge server->
Figure SMS_78
For the domainATarget indirect trust of (c).
The relation of the weight parameters is that
Figure SMS_79
Further, in other possible embodiments, the edge computing trusted access method may further include:
step A10: constructing a first game trusted access model between the edge equipment and the edge server;
in this embodiment, referring to fig. 3, fig. 3 is a block diagram of a game trusted access model related to an edge computing trusted access method of the present invention, and a cloud server will construct a first game trusted access model between an edge device and an edge server.
In a specific embodiment, the cloud server first obtains a trust value of the edge deviceT i Maximum upstream bandwidth of edge devices
Figure SMS_80
Maximum downstream bandwidth of edge devicesu i Request bandwidth of edge devicesx i Downstream bandwidth of edge serveru k Edge server device collection for edge device requestsD k Then, determining the corresponding vector of the price of the edge equipment as
Figure SMS_81
The bandwidth request vector of the edge device is +.>
Figure SMS_82
Wherein the sum of bandwidths requested by the edge devices cannot exceedu k The first gaming trusted access model, in turn, may be represented as:
Figure SMS_83
(7)
wherein ,
Figure SMS_84
price for edge device to bandwidth, and +.>
Figure SMS_85
Corresponding to the trust value of the edge device, +.>
Figure SMS_86
Requesting bandwidth for the edge device.
Step A20: and calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
Figure SMS_87
wherein ,
Figure SMS_88
means the profit maximum,/->
Figure SMS_89
Refers to the trust value of the edge device,
Figure SMS_90
is the satisfaction of the edge device, +.>
Figure SMS_91
Refers to the price of the edge device for the edge server bandwidth, +.>
Figure SMS_92
Means the requested bandwidth of said edge device, < > and->
Figure SMS_93
Refers to the uplink maximum bandwidth of the edge device.
In yet another embodiment, upon determining a maximum profit to the edge device, the cloud server may in turn obtain optimal bandwidth allocation and optimal pricing for each edge server.
Further, in some possible embodiments, the edge computing trusted access method may further include:
step B10: constructing a second game trusted access model between the edge server and the cloud server;
In this embodiment, the cloud server builds a second game trusted access model between the edge server and the cloud server.
Step B20: and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
In this embodiment, the cloud server obtains a revenue matrix between the edge server and the cloud server in the second game trusted access model.
In a specific embodiment, the cloud server calculates a target satisfaction QoS corresponding relation of a trusted access system according to comprehensive trust and edges between domains to obtain a value of target satisfactiondThen according to the numerical valuedTrust value of edge device
Figure SMS_94
Cost of connection between cloud server and edge servercNetwork load between cloud server and edge serverlAnd leaving rate of edge serverqDetermining a benefit matrix between an edge server and the cloud server, wherein a departure rateqAnd numerical valuedAnd the corresponding relation is shown.
For example, a indicates that the edge server accepts the connection, NA indicates that the edge server refuses the connection, P indicates that the cloud server provides the connection, and NP indicates that the cloud server does not provide the connection.nTo connect the number of edge servers of the cloud server, fRepresenting the loss experienced by the cloud server as the average edge server leaves. Cloud server selectionPIs earned by the strategy of (a)wCloud servers receive revenue by retaining running edge serversrCloud server policy selectionPWhen the edge server selects policy A, the benefit isw-cWhile the edge server selects policy NA for benefitg. When the cloud server selects the policy NP, the yield of the site selection policy A is thatz. That is, the revenue matrix between the edge server and the cloud server is shown in table 1:
Figure SMS_95
TABLE 1 revenue matrix for both gaming parties
Further, in some possible embodiments, step B20 above: after obtaining the benefit matrix between the edge server and the cloud server, the edge computing trusted access method further comprises the following steps:
step C10: acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
in this embodiment, the cloud server obtains a first probability and a second probability in the second game trusted access model, where the first probability refers to a probability that the cloud server provides connection for the edge server, and the second probability refers to a probability that the edge server accepts the cloud server to provide connection.
Step C20: obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
in this embodiment, the cloud server obtains a probability joint distribution between the cloud server and the edge server according to the first probability and the second probability.
It should be noted that the probability that the data center provides a connection is that
Figure SMS_96
The probability of the server accepting a connection is +.>
Figure SMS_97
And the probability joint distribution is shown in table 2:
Figure SMS_98
TABLE 2 two-dimensional joint distribution of connection probabilities of two game parties
Step C30: and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
In this embodiment, the cloud server may determine a maximum revenue value of the edge computing trusted access system according to the revenue matrix and the probability joint distribution.
The expression of the maximum value of benefit is as follows:
Figure SMS_99
(9)
in summary, according to the characteristics of mobile edge computing and in combination with bayesian theory, the invention aims to provide a new hierarchical trust model, so that the domain trust relationship in the obtained edge computing trusted access system is more accurate, further the hierarchical trust model has better robustness and convergence rate, and in combination with the advantages of hierarchical game in terms of resource management, the invention aims to provide a trusted access control mechanism based on the hierarchical game, and constructs a game trusted access model, so that the edge computing trusted access system not only uses network resources and computing resources more efficiently and safely, but also can provide better QoS service for heterogeneous traffic flows and heterogeneous edge devices.
The invention further provides an edge calculation trusted access device. Referring to fig. 4, fig. 4 is a schematic structural diagram of an edge computing trusted access device according to the present invention.
The edge computing trusted access device of the invention comprises:
an obtaining module H01, configured to obtain, by using the edge server, a user interest level uploaded by the edge device;
the division module H02 is configured to perform domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, where the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices included in a domain corresponding to the edge server;
and the construction module H03 is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
Optionally, the building module H03 may further include:
the interaction unit is used for acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
A satisfaction determining unit, configured to determine, according to the frequency and the target time, an overall satisfaction of the edge server to the edge device;
the first calculating unit is configured to obtain indirect trust of the edge device on the target domain at the target moment according to the overall satisfaction and a preset first formula, where the first formula is:
Figure SMS_100
wherein ,
Figure SMS_101
refers to the indirect trust,/->
Figure SMS_102
Meaning the overall satisfaction, +.>
Figure SMS_103
Means that the edge server has trust value for the target domain at the target moment,/>
Figure SMS_104
Means the edge device->
Figure SMS_105
Refers to the edge server, +.>
Figure SMS_106
Refers to the number of edge servers;
and the intra-domain trust obtaining unit is used for obtaining the intra-domain trust according to the overall satisfaction degree and the indirect trust.
Optionally, the building module H03 may further include:
the second calculation unit is configured to calculate, in the hierarchical trust model, a direct trust between the domains according to a preset second formula, where the second formula is:
Figure SMS_107
wherein ,
Figure SMS_108
refers to a domainBOpposite domainADirect trust between->
Figure SMS_109
Refers to the time domain at the targetAOpposite domainBMiddle edge server- >
Figure SMS_110
Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->
Figure SMS_111
Is the number of (3);
and the comprehensive trust acquisition unit is used for acquiring inter-domain indirect trust between the domains and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
Optionally, the building module H03 may further include:
the third calculation unit is configured to calculate the inter-domain indirect trust according to a preset third formula, where the third formula is:
Figure SMS_112
wherein ,
Figure SMS_113
refers to the domainBFor the domainAInter-domain indirect trust between->
Figure SMS_114
Means that at the target time the domainBEdge server->
Figure SMS_115
For the domainAIs satisfied by the second objective of->
Figure SMS_116
Means that at the target time the domainBMiddle edge server->
Figure SMS_117
For the domainATarget indirect trust of (c).
Optionally, the building module H03 may further include:
a first model building unit, configured to build a first game trusted access model between the edge device and the edge server;
a fourth calculating unit, configured to calculate, in the first game trusted access model, a profit maximum of the edge device according to a preset fourth formula, where the fourth formula is:
Figure SMS_118
wherein ,
Figure SMS_119
means the profit maximum,/->
Figure SMS_120
Refers to the trust value of the edge device,
Figure SMS_121
is the satisfaction of the edge device, +.>
Figure SMS_122
Refers to the price of the edge device for the edge server bandwidth, +.>
Figure SMS_123
Means the requested bandwidth of said edge device, < > and->
Figure SMS_124
Refers to the uplink maximum bandwidth of the edge device.
Optionally, the building module H03 may further include:
a second model building unit, configured to build a second game trusted access model between the edge server and the cloud server;
and the matrix acquisition unit is used for acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
Optionally, the building module H03 may further include:
the providing unit is used for obtaining a first probability and a second probability in the second game trusted access model, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
the joint distribution unit is used for obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
And the profit maximum determining unit is used for determining the profit maximum of the edge computing trusted access system according to the profit matrix and the probability joint distribution.
The respective functional modules of the edge computing trusted access device of the present invention implement the steps of the edge computing trusted access method of the present invention as described above at run-time.
In addition, the invention also provides terminal equipment. Referring to fig. 5, fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. The terminal equipment of the embodiment of the invention can be equipment for calculating the trusted access for the local operation edge.
As shown in fig. 5, the terminal device according to the embodiment of the present invention may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005, and a sensing unit 1006. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., wi-Fi interface).
A memory 1005 is provided on the terminal apparatus main body, and a program is stored in the memory 1005, which realizes a corresponding operation when executed by the processor 1001. The memory 1005 is also used to store parameters for use by the terminal device. The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal device structure shown in fig. 5 is not limiting of the terminal device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 5, an operating system, a network communication module, a user interface module, and an edge computing trusted access program of a terminal device may be included in a memory 1005 as one type of storage medium.
In the terminal device shown in fig. 5, the processor 1001 may be configured to invoke the edge computing trusted access program of the terminal device stored in the memory 1005 to implement the steps of the edge computing trusted access method described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a computer storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (9)

1. An edge computing trusted access method, wherein the edge computing trusted access method is applied to a cloud server in an edge computing trusted access system, and the edge computing trusted access system further comprises: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively;
the edge computing trusted access method comprises the following steps:
acquiring user interest degree uploaded by the edge equipment through the edge server;
performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining a domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment;
the domain trust relationship comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model comprises the following steps:
Acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
Figure QLYQS_1
wherein ,
Figure QLYQS_2
refers to the indirect trust,/->
Figure QLYQS_3
Meaning the overall satisfaction, +.>
Figure QLYQS_4
Means that the edge server has trust value for the target domain at the target moment,/>
Figure QLYQS_5
Means the edge device->
Figure QLYQS_6
Refers to the edge server, +.>
Figure QLYQS_7
Refers to the number of edge servers;
and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
2. The edge computing trusted access method of claim 1, wherein the domain trust relationship further comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model comprises the following steps:
in the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
Figure QLYQS_8
wherein ,
Figure QLYQS_9
refers to a domainBOpposite domainADirect trust between->
Figure QLYQS_10
Refers to the time domain at the targetAOpposite domainBMiddle edge server->
Figure QLYQS_11
Is selected from the group consisting of a first target satisfaction,krefers to a domainBMiddle edge server->
Figure QLYQS_12
Is the number of (3); />
And obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
3. The edge computing trusted access method of claim 2, wherein said step of obtaining inter-domain indirect trust between said domains comprises:
the inter-domain indirect trust is obtained through calculation according to a preset third formula, wherein the third formula is as follows:
Figure QLYQS_13
wherein ,
Figure QLYQS_14
refers to the domainBFor the domainAInter-domain indirect trust between->
Figure QLYQS_15
Means that the weight parameter occupied by the edge server is +.>
Figure QLYQS_16
Means that at the target time the domainBEdge server->
Figure QLYQS_17
For the domainAIs satisfied by the second objective of->
Figure QLYQS_18
Means that at the target time the domainBMiddle edge server->
Figure QLYQS_19
For the domainATarget indirect trust of (c).
4. An edge computing trusted access method as claimed in any one of claims 1 to 3, wherein said edge computing trusted access method further comprises:
Constructing a first game trusted access model between the edge equipment and the edge server;
and calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
Figure QLYQS_20
wherein ,
Figure QLYQS_21
means the profit maximum,/->
Figure QLYQS_22
Refers to the trust value of the edge device, < >>
Figure QLYQS_23
Is the satisfaction of the edge device, +.>
Figure QLYQS_24
Refers to the price of the edge device for the edge server bandwidth, +.>
Figure QLYQS_25
Means the requested bandwidth of said edge device, < > and->
Figure QLYQS_26
Refers to the uplink maximum bandwidth of the edge device.
5. An edge computing trusted access method as claimed in any one of claims 1 to 3, wherein said edge computing trusted access method further comprises:
constructing a second game trusted access model between the edge server and the cloud server;
and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
6. The edge computing trusted access method of claim 5, wherein after the step of obtaining a revenue matrix between said edge server and said cloud server, said method further comprises:
Acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
7. An edge computing trusted access device, the edge computing trusted access device comprising:
the acquisition module is used for acquiring the user interest degree uploaded by the edge equipment through the edge server;
the division module is used for carrying out domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
the construction module is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining a domain trust relationship of the edge calculation trusted access system according to the layered trust model at a preset target moment;
The domain trust relationship comprises: the domain trust of the edge device in the target domain is obtained by the building module based on the hierarchical trust model, and the interaction between the edge server and the edge device is also obtained in the same target domainFrequency of each other; determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment; obtaining indirect trust of the edge equipment to the target domain at the target moment according to the overall satisfaction and a preset first formula, and obtaining the domain trust according to the overall satisfaction and the indirect trust, wherein the first formula is as follows:
Figure QLYQS_27
wherein ,
Figure QLYQS_28
refers to the indirect trust,/->
Figure QLYQS_29
Meaning the overall satisfaction, +.>
Figure QLYQS_30
Means that the edge server has trust value for the target domain at the target moment,/>
Figure QLYQS_31
Means the edge device->
Figure QLYQS_32
Refers to the edge server, +.>
Figure QLYQS_33
Refers to the number of edge servers.
8. A terminal device comprising a memory, a processor and an edge computing trusted access program stored on the memory and executable on the processor, the processor implementing the steps of the edge computing trusted access method of any one of claims 1 to 6 when the processor executes the edge computing trusted access program.
9. A computer storage medium having stored thereon an edge computing trusted access program which when executed by a processor performs the steps of the edge computing trusted access method of any of claims 1 to 6.
CN202310209062.2A 2023-03-07 2023-03-07 Edge computing trusted access method, device, equipment and computer storage medium Active CN116074841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310209062.2A CN116074841B (en) 2023-03-07 2023-03-07 Edge computing trusted access method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310209062.2A CN116074841B (en) 2023-03-07 2023-03-07 Edge computing trusted access method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN116074841A CN116074841A (en) 2023-05-05
CN116074841B true CN116074841B (en) 2023-06-13

Family

ID=86182078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310209062.2A Active CN116074841B (en) 2023-03-07 2023-03-07 Edge computing trusted access method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN116074841B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924081A (en) * 2018-05-03 2018-11-30 深圳中泰智丰物联网科技有限公司 Privacy of user is protected to resist malicious user method in Internet of Things based on edge calculations
WO2022240906A1 (en) * 2021-05-11 2022-11-17 Strong Force Vcn Portfolio 2019, Llc Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10848974B2 (en) * 2018-12-28 2020-11-24 Intel Corporation Multi-domain trust establishment in edge cloud architectures
JP7466156B2 (en) * 2019-04-05 2024-04-12 ミミック・テクノロジー・インコーポレイテッド Method and system for distributed edge cloud computing
CN110753126B (en) * 2019-10-28 2022-06-17 国网河南省电力公司信息通信公司 Service node selection method, device, system and medium
CN113992676B (en) * 2021-10-27 2022-09-06 天津大学 Incentive method and system for layered federal learning under terminal edge cloud architecture and complete information
CN115484054A (en) * 2022-08-03 2022-12-16 国网浙江省电力有限公司桐乡市供电公司 Dynamic trust evaluation method facing edge equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924081A (en) * 2018-05-03 2018-11-30 深圳中泰智丰物联网科技有限公司 Privacy of user is protected to resist malicious user method in Internet of Things based on edge calculations
WO2022240906A1 (en) * 2021-05-11 2022-11-17 Strong Force Vcn Portfolio 2019, Llc Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks

Also Published As

Publication number Publication date
CN116074841A (en) 2023-05-05

Similar Documents

Publication Publication Date Title
Wang et al. A resource allocation model based on double-sided combinational auctions for transparent computing
Dai et al. A learning-based approach for vehicle-to-vehicle computation offloading
Jin et al. Data-driven pricing for sensing effort elicitation in mobile crowd sensing systems
Ghosh et al. Mobility-aware cost-efficient job scheduling for single-class grid jobs in a generic mobile grid architecture
CN106060145A (en) Profit based request access control method in distributed multi-cloud data center
Deb et al. DEFT: Decentralized multiuser computation offloading in a fog-enabled IoV environment
Maan et al. Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network
Meneguette et al. A virtual machine migration policy based on multiple attribute decision in vehicular cloud scenario
CN115714817A (en) Dynamic feedback weighted cloud storage resource scheduling method, device and equipment
Li et al. DQN-enabled content caching and quantum ant colony-based computation offloading in MEC
CN116541106A (en) Computing task unloading method, computing device and storage medium
Nguyen et al. Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications
Zhang et al. Multi-attribute-based QoS-aware virtual network function placement and service chaining algorithms in smart cities
Kwantwi et al. Blockchain-based computing resource trading in autonomous multi-access edge network slicing: A dueling double deep q-learning approach
Aloqaily et al. An auction-driven multi-objective provisioning framework in a vehicular cloud
Durga et al. Context-aware adaptive resource provisioning for mobile clients in intra-cloud environment
CN116074841B (en) Edge computing trusted access method, device, equipment and computer storage medium
Laroui et al. Virtual mobile edge computing based on IoT devices resources in smart cities
Tiwari et al. Fedserv: Federated task service in fog-enabled internet of vehicles
Li et al. Optimal service selection and placement based on popularity and server load in multi-access edge computing
Fan et al. Knative autoscaler optimize based on double exponential smoothing
CN109040283A (en) A kind of modified load-balancing algorithm based on difference reaction type
Liu et al. Joint task offloading and dispatching for mec with rational mobile devices and edge nodes
Dai et al. Edge trusted sharing: task-driven decentralized resources collaborate in IoT
Suksomboon et al. Lawnfo: A decision framework for optimal location-aware network function outsourcing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant