CN116074841B - Edge computing trusted access method, device, equipment and computer storage medium - Google Patents
Edge computing trusted access method, device, equipment and computer storage medium Download PDFInfo
- Publication number
- CN116074841B CN116074841B CN202310209062.2A CN202310209062A CN116074841B CN 116074841 B CN116074841 B CN 116074841B CN 202310209062 A CN202310209062 A CN 202310209062A CN 116074841 B CN116074841 B CN 116074841B
- Authority
- CN
- China
- Prior art keywords
- edge
- domain
- trust
- trusted access
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000008901 benefit Effects 0.000 claims description 18
- 239000011159 matrix material Substances 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 16
- 238000004364 calculation method Methods 0.000 claims description 13
- 230000003993 interaction Effects 0.000 claims description 7
- 238000010276 construction Methods 0.000 claims description 4
- 230000007246 mechanism Effects 0.000 abstract description 15
- 238000005516 engineering process Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/66—Trust-dependent, e.g. using trust scores or trust relationships
Abstract
The present invention relates to the field of mobile edge computing technologies, and in particular, to an edge computing trusted access method, device, equipment, and computer storage medium, where the method includes: acquiring user interest degree uploaded by the edge equipment through the edge server; performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server; and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment. The invention improves the performance of the access mechanism in an edge computing environment.
Description
Technical Field
The present invention relates to the field of mobile edge computing technologies, and in particular, to an edge computing trusted access method, device, equipment, and computer storage medium.
Background
While mobile edge computing brings great potential benefits to 5G, cloud computing, internet of things, applying mobile edge computing to practice still faces many challenges, for example, access mechanism is one of the current key bottlenecks. The function of the access mechanism is to prevent the network external node from unauthorized access to all network resources such as computer resources, communication resources or information resources in the network by adopting the access control mechanism, and control the external access point to connect or use the network resources, thereby ensuring the characteristics of stability, safety and the like of the network resources.
Currently, existing access mechanisms cannot be directly applied to edge computing because it ignores the computing power, storage power, and the impact of the edge computing hierarchy on the access mechanism policies of the resource-constrained edge devices. In other words, since the conventional access mechanism is specific to the wireless network and the distributed system, the factors such as delay sensitivity, processing and computing power of the terminal node are ignored, which will greatly reduce the performance of the conventional access mechanism in the edge computing environment.
In summary, how to improve the performance of an access mechanism in an edge computing environment is a technical problem that needs to be solved.
Disclosure of Invention
The invention mainly aims to provide an edge computing trusted access method, an edge computing trusted access device, edge computing trusted access equipment and a computer storage medium, and aims to improve performance of an access mechanism in an edge computing environment.
In order to achieve the above object, the present invention provides an edge computing trusted access method, which is applied to a cloud server in an edge computing trusted access system, the edge computing trusted access system further includes: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively;
the edge computing trusted access method comprises the following steps:
acquiring user interest degree uploaded by the edge equipment through the edge server;
performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
Optionally, the domain trust relationship comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model comprises the following steps:
acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
wherein ,refers to the indirect trust,/->Meaning the overall satisfaction, +.>Means that the edge server has trust value for the target domain at the target moment,/>Means the edge device->Refers to the edge server, +.>Refers to the number of edge servers;
and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
Optionally, the domain trust relationship further comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model comprises the following steps:
In the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
wherein ,refers to a domainBOpposite domainADirect trust between->Refers to the time domain at the targetAOpposite domainBMiddle edge server->Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->Is the number of (3);
and obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
Optionally, the step of obtaining inter-domain indirect trust between the domains includes:
the inter-domain indirect trust is obtained through calculation according to a preset third formula, wherein the third formula is as follows:
wherein ,refers to the domainBFor the domainAInter-domain indirect trust between->Means that at the target time the domainBEdge server->For the domainAIs satisfied by the second objective of->Means that at the target time the domainBMiddle edge server->For the domainATarget indirect trust of (c).
Optionally, the edge computing trusted access method further includes:
constructing a first game trusted access model between the edge equipment and the edge server;
And calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
wherein ,means the profit maximum,/->Refers to the trust value of the edge device,is the satisfaction of the edge device, +.>Refers to the price of the edge device for the edge server bandwidth, +.>Means the requested bandwidth of said edge device, < > and->Refers to the uplink maximum bandwidth of the edge device.
Optionally, the edge computing trusted access method further includes:
constructing a second game trusted access model between the edge server and the cloud server;
and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
Optionally, after the step of obtaining the revenue matrix between the edge server and the cloud server, the method further comprises:
acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
Obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
In addition, in order to achieve the above object, the present invention further provides an edge computing trusted access device, which includes:
the acquisition module is used for acquiring the user interest degree uploaded by the edge equipment through the edge server;
the division module is used for carrying out domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
the construction module is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
The respective functional modules of the edge computing trusted access device of the present invention implement the steps of the edge computing trusted access method of the present invention as described above at run-time.
In addition, to achieve the above object, the present invention also provides a terminal device, where the terminal device includes a memory, a processor, and an edge calculation trusted access program stored in the memory and executable on the processor, and the edge calculation trusted access program implements the steps of the above edge calculation trusted access method when executed by the processor.
In addition, in order to achieve the above object, the present invention further provides a computer storage medium, on which an edge calculation trusted access program is stored, which when executed by a processor, implements the steps of the above edge calculation trusted access method.
In the present invention, an edge computing trusted access system includes: a cloud Server (CDC, cloud Data Center) and a plurality of Edge servers (Edge servers), wherein the cloud Server establishes communication connection with the plurality of Edge servers respectively, and each Edge Server establishes communication connection with a corresponding Edge device (Edge device) respectively; the cloud server acquires user interest degree uploaded by the edge devices through the edge servers, and then carries out domain division processing on the edge computing trusted access system according to the user interest degree to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in a domain corresponding to the edge servers; after finishing the domain division processing operation, a layered trust model is constructed according to the first domain layer and the second domain layer, and inter-domain comprehensive trust among domains is obtained according to the layered trust model.
Different from the traditional access mechanism, the cloud server firstly carries out domain division processing on the edge computing trusted access system according to the received user interest level, and then quickly and efficiently builds a layered trust model through the first domain layer and the second domain layer, and then accurately obtains the domain trust relationship of the edge computing trusted access system through the layered trust model, so that the robustness and convergence speed of the edge computing trusted access system are effectively improved, namely the performance of the access mechanism in an edge computing environment is improved.
Drawings
FIG. 1 is a flow chart of a first embodiment of an edge computing trusted access method of the present invention;
FIG. 2 is a block diagram of a hierarchical trust model involved in an edge computing trusted access method of the present invention;
FIG. 3 is a block diagram of a game trusted access model involved in the edge computing trusted access method of the present invention;
FIG. 4 is a schematic diagram of an edge computing trusted access device according to the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The embodiment of the invention provides an edge computing trusted access method, and referring to fig. 1, fig. 1 is a flow diagram of a first embodiment of the edge computing trusted access method of the invention.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application.
In this embodiment, the edge computing trusted access method of the present invention is applied to a cloud server in an edge computing trusted access system, where the edge computing trusted access system includes: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively.
It should be noted that, the cloud server may be understood as a data processing center; an edge server may be understood as a device that provides services to edge devices, such as IoT gateways, routers, and mobile network base stations, among others; the edge device is a user terminal device which requests service from an edge server, such as a mobile phone, a computer, a tablet, an automobile control center and the like.
The edge computing trusted access method comprises the following steps:
step S10: acquiring user interest degree uploaded by the edge equipment through the edge server;
In this embodiment, the cloud server obtains the user interest degree uploaded by the edge device through the edge server.
It should be noted that, the user interest degree may be understood as the access duration and access frequency of the user on each web page, where each user corresponds to one edge device.
Step S20: performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
in this embodiment, the cloud server performs domain division processing on the entire edge computing trusted access system according to the user interest level uploaded by the edge device, so as to obtain a first domain layer and a second domain layer.
It should be noted that, the first domain layer refers to a domain corresponding to each edge server, that is, one edge server corresponds to one domain; the second domain layer refers to a plurality of edge devices included in a domain corresponding to the edge server; an edge server in the same target domain may establish communication connection with a plurality of edge devices of the target domain, in other words, in the same target domain, the edge servers correspond to the plurality of edge devices, and the kinds of the edge servers corresponding to the plurality of edge devices are also the same.
For example, the types of the edge servers in the first target domain corresponding to the plurality of edge devices are vehicle control centers of the vehicles, the types of the edge servers in the second target domain corresponding to the plurality of edge devices are mobile phones, the types of the edge servers in the third target domain corresponding to the plurality of edge devices are computers, and the types of the edge servers in the fourth target domain corresponding to the plurality of edge devices are flat plates.
Step S30: and constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
In this embodiment, referring to fig. 2, fig. 2 is a block diagram of a hierarchical trust model related to an edge computing trusted access method of the present invention. The cloud server builds a layered trust model according to the first domain layer and the second domain layer, specifically, the cloud server places edge servers corresponding to different domains in the first domain layer, determines the types of edge devices corresponding to the edge servers, sorts the edge devices according to the types of the edge devices, places the edge devices corresponding to the different edge servers in the second domain layer, and further completes the construction operation of the layered trust model; and finally, the cloud server obtains inter-domain comprehensive trust among the domains according to the layered trust model.
In yet another embodiment, the cloud server may further perform obtaining the domain trust relationship of the edge computing trusted access system after correcting the layered trust model according to the updated time prediction algorithm of the bayesian model or the indirect trust value of the bayesian decision, so as to effectively improve the accuracy of the domain trust relationship of the edge computing trusted access system.
In summary, in the present invention, an edge computing trusted access system includes: a cloud Server (CDC, cloud Data Center) and a plurality of Edge servers (Edge servers), wherein the cloud Server establishes communication connection with the plurality of Edge servers respectively, and each Edge Server establishes communication connection with a corresponding Edge device (Edge device) respectively; the cloud server acquires user interest degree uploaded by the edge devices through the edge servers, and then carries out domain division processing on the edge computing trusted access system according to the user interest degree to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in a domain corresponding to the edge servers; after finishing the domain division processing operation, a layered trust model is constructed according to the first domain layer and the second domain layer, and inter-domain comprehensive trust among domains is obtained according to the layered trust model.
Different from the traditional access mechanism, the cloud server firstly carries out domain division processing on the edge computing trusted access system according to the received user interest level, and then quickly and efficiently builds a layered trust model through the first domain layer and the second domain layer, and then accurately obtains the domain trust relationship of the edge computing trusted access system through the layered trust model, so that the robustness and convergence speed of the edge computing trusted access system are effectively improved, namely the performance of the access mechanism in an edge computing environment is improved.
Further, based on the first embodiment of the edge computing trusted access of the present invention, a second embodiment of the edge computing trusted access of the present invention is provided.
Further, in some possible embodiments, the domain trust relationship comprises: the edge device trusts in the domain in the target domain, step S30 above: obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model may further include:
step S301: acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
in this embodiment, the cloud server obtains, through the hierarchical trust model, the frequency of interaction between the edge server and the edge device in the same target domain.
Step S302: determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
in this embodiment, the cloud server calculates the overall satisfaction of the edge server to the edge device (i.e., in the same target domain, the edge server directly trusts the edge device) by using the following satisfaction calculation formula:
wherein ,refers to the overall satisfaction of the edge server with the edge device,/>Representing computing power, +.>For energy factor, +.>For social attributes->A value related to satisfaction, +.>Negative values indicate dissatisfaction and positive values indicate satisfaction. Meanwhile, the weight parameters are as follows+/>,
It should be noted that the number of the substrates,it is understood that the edge server responds to the edge server by sending a request for feedback a proportional number of times to the number of connections requested by the edge server by the upper edge device.
Negative values correspond to the ratio values being less than a predetermined satisfaction threshold relationship, and positive values correspond to the ratio values being greater than or equal to the predetermined satisfaction threshold relationship. In other words, the cloud server judges whether the proportion value is smaller than a preset satisfaction threshold value, and if the proportion value is smaller than the preset satisfaction threshold value, the cloud server acquires the information that the proportion value is negative; and if the proportion value is larger than or equal to a preset satisfaction threshold value, acquiring information that the proportion value is a positive value.
Step S303: obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
wherein ,refers to the indirect trust,/->Meaning the overall satisfaction, +.>Means that the edge server has trust value for the target domain at the target moment,/>Means the edge device->Refers to the edge server, +.>Refers to the number of edge servers;
in this embodiment, the cloud server obtains indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, where the preset first formula is:
wherein ,refers to the indirect trust,/->Meaning the overall satisfaction, +.>Means that the edge server has trust value for the target domain at the target moment,/>Means the edge device->Refers to the edge server, +.>Refers to the number of the edge servers
Step S304: and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
In this embodiment, the cloud server obtains the domain trust of the edge device in the target domain according to the overall satisfaction and the indirect trust.
Note that the domain trust of an edge device in a target domain can be expressed as:
Further, in other possible embodiments, the domain trust relationship further comprises: inter-domain comprehensive trust between the domains, step S30: obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model may further include:
step S305: in the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
wherein ,refers to a domainBOpposite domainADirect trust between->Refers to the time domain at the targetAOpposite domainBMiddle edge server->Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->Is the number of (3);
in this embodiment, the cloud server calculates, in the hierarchical trust model, the direct trust between the domains according to a preset second formula, where the preset second formula is:
wherein ,refers to a domainBOpposite domainADirect trust between->Refers to the time domain at the targetAOpposite domainBMiddle edge server->Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server- >Is the number of (3);
step S306: and obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
In this embodiment, the cloud server obtains inter-domain indirect trust between domains, and obtains inter-domain comprehensive trust between domains according to the direct trust and the inter-domain indirect trust.
It should be noted that the expression of the inter-domain integrated trust is as follows:
further, in other possible embodiments, step S306 described above: acquiring inter-domain indirect trust between the domains may further include:
step S3061: the inter-domain indirect trust is obtained through calculation according to a preset third formula:
wherein ,refers to the domainBFor the domainAInter-domain indirect trust between->Means that at the target time the domainBEdge server->For the domainAIs satisfied by the second objective of->Means that at the target time the domainBMiddle edge server->For the domainATarget indirect trust of (c).
In this embodiment, the cloud server calculates the inter-domain indirect trust through a preset third formula, where the preset third formula is:
wherein ,Refers to the domainBFor the domainAInter-domain indirect trust between->Means that at the target time the domainBEdge server->For the domainAIs satisfied by the second objective of->Means that at the target time the domainBMiddle edge server->For the domainATarget indirect trust of (c).
Further, in other possible embodiments, the edge computing trusted access method may further include:
step A10: constructing a first game trusted access model between the edge equipment and the edge server;
in this embodiment, referring to fig. 3, fig. 3 is a block diagram of a game trusted access model related to an edge computing trusted access method of the present invention, and a cloud server will construct a first game trusted access model between an edge device and an edge server.
In a specific embodiment, the cloud server first obtains a trust value of the edge deviceT i Maximum upstream bandwidth of edge devicesMaximum downstream bandwidth of edge devicesu i Request bandwidth of edge devicesx i Downstream bandwidth of edge serveru k Edge server device collection for edge device requestsD k Then, determining the corresponding vector of the price of the edge equipment as The bandwidth request vector of the edge device is +.>Wherein the sum of bandwidths requested by the edge devices cannot exceedu k The first gaming trusted access model, in turn, may be represented as:
wherein ,price for edge device to bandwidth, and +.>Corresponding to the trust value of the edge device, +.>Requesting bandwidth for the edge device.
Step A20: and calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
wherein ,means the profit maximum,/->Refers to the trust value of the edge device,is the satisfaction of the edge device, +.>Refers to the price of the edge device for the edge server bandwidth, +.>Means the requested bandwidth of said edge device, < > and->Refers to the uplink maximum bandwidth of the edge device.
In yet another embodiment, upon determining a maximum profit to the edge device, the cloud server may in turn obtain optimal bandwidth allocation and optimal pricing for each edge server.
Further, in some possible embodiments, the edge computing trusted access method may further include:
step B10: constructing a second game trusted access model between the edge server and the cloud server;
In this embodiment, the cloud server builds a second game trusted access model between the edge server and the cloud server.
Step B20: and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
In this embodiment, the cloud server obtains a revenue matrix between the edge server and the cloud server in the second game trusted access model.
In a specific embodiment, the cloud server calculates a target satisfaction QoS corresponding relation of a trusted access system according to comprehensive trust and edges between domains to obtain a value of target satisfactiondThen according to the numerical valuedTrust value of edge deviceCost of connection between cloud server and edge servercNetwork load between cloud server and edge serverlAnd leaving rate of edge serverqDetermining a benefit matrix between an edge server and the cloud server, wherein a departure rateqAnd numerical valuedAnd the corresponding relation is shown.
For example, a indicates that the edge server accepts the connection, NA indicates that the edge server refuses the connection, P indicates that the cloud server provides the connection, and NP indicates that the cloud server does not provide the connection.nTo connect the number of edge servers of the cloud server, fRepresenting the loss experienced by the cloud server as the average edge server leaves. Cloud server selectionPIs earned by the strategy of (a)wCloud servers receive revenue by retaining running edge serversrCloud server policy selectionPWhen the edge server selects policy A, the benefit isw-cWhile the edge server selects policy NA for benefitg. When the cloud server selects the policy NP, the yield of the site selection policy A is thatz. That is, the revenue matrix between the edge server and the cloud server is shown in table 1:
TABLE 1 revenue matrix for both gaming parties
Further, in some possible embodiments, step B20 above: after obtaining the benefit matrix between the edge server and the cloud server, the edge computing trusted access method further comprises the following steps:
step C10: acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
in this embodiment, the cloud server obtains a first probability and a second probability in the second game trusted access model, where the first probability refers to a probability that the cloud server provides connection for the edge server, and the second probability refers to a probability that the edge server accepts the cloud server to provide connection.
Step C20: obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
in this embodiment, the cloud server obtains a probability joint distribution between the cloud server and the edge server according to the first probability and the second probability.
It should be noted that the probability that the data center provides a connection is thatThe probability of the server accepting a connection is +.>And the probability joint distribution is shown in table 2:
TABLE 2 two-dimensional joint distribution of connection probabilities of two game parties
Step C30: and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
In this embodiment, the cloud server may determine a maximum revenue value of the edge computing trusted access system according to the revenue matrix and the probability joint distribution.
The expression of the maximum value of benefit is as follows:
in summary, according to the characteristics of mobile edge computing and in combination with bayesian theory, the invention aims to provide a new hierarchical trust model, so that the domain trust relationship in the obtained edge computing trusted access system is more accurate, further the hierarchical trust model has better robustness and convergence rate, and in combination with the advantages of hierarchical game in terms of resource management, the invention aims to provide a trusted access control mechanism based on the hierarchical game, and constructs a game trusted access model, so that the edge computing trusted access system not only uses network resources and computing resources more efficiently and safely, but also can provide better QoS service for heterogeneous traffic flows and heterogeneous edge devices.
The invention further provides an edge calculation trusted access device. Referring to fig. 4, fig. 4 is a schematic structural diagram of an edge computing trusted access device according to the present invention.
The edge computing trusted access device of the invention comprises:
an obtaining module H01, configured to obtain, by using the edge server, a user interest level uploaded by the edge device;
the division module H02 is configured to perform domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, where the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices included in a domain corresponding to the edge server;
and the construction module H03 is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment.
Optionally, the building module H03 may further include:
the interaction unit is used for acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
A satisfaction determining unit, configured to determine, according to the frequency and the target time, an overall satisfaction of the edge server to the edge device;
the first calculating unit is configured to obtain indirect trust of the edge device on the target domain at the target moment according to the overall satisfaction and a preset first formula, where the first formula is:
wherein ,refers to the indirect trust,/->Meaning the overall satisfaction, +.>Means that the edge server has trust value for the target domain at the target moment,/>Means the edge device->Refers to the edge server, +.>Refers to the number of edge servers;
and the intra-domain trust obtaining unit is used for obtaining the intra-domain trust according to the overall satisfaction degree and the indirect trust.
Optionally, the building module H03 may further include:
the second calculation unit is configured to calculate, in the hierarchical trust model, a direct trust between the domains according to a preset second formula, where the second formula is:
wherein ,refers to a domainBOpposite domainADirect trust between->Refers to the time domain at the targetAOpposite domainBMiddle edge server- >Is selected from the group consisting of a first target satisfaction,Krefers to a domainBMiddle edge server->Is the number of (3);
and the comprehensive trust acquisition unit is used for acquiring inter-domain indirect trust between the domains and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
Optionally, the building module H03 may further include:
the third calculation unit is configured to calculate the inter-domain indirect trust according to a preset third formula, where the third formula is:
wherein ,refers to the domainBFor the domainAInter-domain indirect trust between->Means that at the target time the domainBEdge server->For the domainAIs satisfied by the second objective of->Means that at the target time the domainBMiddle edge server->For the domainATarget indirect trust of (c).
Optionally, the building module H03 may further include:
a first model building unit, configured to build a first game trusted access model between the edge device and the edge server;
a fourth calculating unit, configured to calculate, in the first game trusted access model, a profit maximum of the edge device according to a preset fourth formula, where the fourth formula is:
wherein ,means the profit maximum,/->Refers to the trust value of the edge device,is the satisfaction of the edge device, +.>Refers to the price of the edge device for the edge server bandwidth, +.>Means the requested bandwidth of said edge device, < > and->Refers to the uplink maximum bandwidth of the edge device.
Optionally, the building module H03 may further include:
a second model building unit, configured to build a second game trusted access model between the edge server and the cloud server;
and the matrix acquisition unit is used for acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
Optionally, the building module H03 may further include:
the providing unit is used for obtaining a first probability and a second probability in the second game trusted access model, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
the joint distribution unit is used for obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
And the profit maximum determining unit is used for determining the profit maximum of the edge computing trusted access system according to the profit matrix and the probability joint distribution.
The respective functional modules of the edge computing trusted access device of the present invention implement the steps of the edge computing trusted access method of the present invention as described above at run-time.
In addition, the invention also provides terminal equipment. Referring to fig. 5, fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. The terminal equipment of the embodiment of the invention can be equipment for calculating the trusted access for the local operation edge.
As shown in fig. 5, the terminal device according to the embodiment of the present invention may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005, and a sensing unit 1006. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., wi-Fi interface).
A memory 1005 is provided on the terminal apparatus main body, and a program is stored in the memory 1005, which realizes a corresponding operation when executed by the processor 1001. The memory 1005 is also used to store parameters for use by the terminal device. The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal device structure shown in fig. 5 is not limiting of the terminal device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 5, an operating system, a network communication module, a user interface module, and an edge computing trusted access program of a terminal device may be included in a memory 1005 as one type of storage medium.
In the terminal device shown in fig. 5, the processor 1001 may be configured to invoke the edge computing trusted access program of the terminal device stored in the memory 1005 to implement the steps of the edge computing trusted access method described above.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a computer storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.
Claims (9)
1. An edge computing trusted access method, wherein the edge computing trusted access method is applied to a cloud server in an edge computing trusted access system, and the edge computing trusted access system further comprises: the cloud server establishes communication connection with the edge servers respectively, and each edge server establishes communication connection with corresponding edge equipment respectively;
the edge computing trusted access method comprises the following steps:
acquiring user interest degree uploaded by the edge equipment through the edge server;
performing domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining a domain trust relationship of the edge computing trusted access system according to the layered trust model at a preset target moment;
the domain trust relationship comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the layered trust model comprises the following steps:
Acquiring the frequency of interaction between the edge server and the edge equipment based on the hierarchical trust model in the same target domain;
determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment;
obtaining indirect trust of the edge device to the target domain at the target moment according to the overall satisfaction and a preset first formula, wherein the first formula is as follows:
wherein ,refers to the indirect trust,/->Meaning the overall satisfaction, +.>Means that the edge server has trust value for the target domain at the target moment,/>Means the edge device->Refers to the edge server, +.>Refers to the number of edge servers;
and obtaining the intra-domain trust according to the overall satisfaction and the indirect trust.
2. The edge computing trusted access method of claim 1, wherein the domain trust relationship further comprises: the step of obtaining the domain trust relationship of the edge computing trusted access system according to the hierarchical trust model comprises the following steps:
in the hierarchical trust model, calculating to obtain direct trust between the domains through a preset second formula, wherein the second formula is as follows:
wherein ,refers to a domainBOpposite domainADirect trust between->Refers to the time domain at the targetAOpposite domainBMiddle edge server->Is selected from the group consisting of a first target satisfaction,krefers to a domainBMiddle edge server->Is the number of (3); />
And obtaining inter-domain indirect trust between the domains, and obtaining inter-domain comprehensive trust between the domains according to the direct trust and the inter-domain indirect trust.
3. The edge computing trusted access method of claim 2, wherein said step of obtaining inter-domain indirect trust between said domains comprises:
the inter-domain indirect trust is obtained through calculation according to a preset third formula, wherein the third formula is as follows:
wherein ,refers to the domainBFor the domainAInter-domain indirect trust between->Means that the weight parameter occupied by the edge server is +.>Means that at the target time the domainBEdge server->For the domainAIs satisfied by the second objective of->Means that at the target time the domainBMiddle edge server->For the domainATarget indirect trust of (c).
4. An edge computing trusted access method as claimed in any one of claims 1 to 3, wherein said edge computing trusted access method further comprises:
Constructing a first game trusted access model between the edge equipment and the edge server;
and calculating a profit maximum value of the edge equipment in the first game trusted access model through a preset fourth formula, wherein the fourth formula is as follows:
wherein ,means the profit maximum,/->Refers to the trust value of the edge device, < >>Is the satisfaction of the edge device, +.>Refers to the price of the edge device for the edge server bandwidth, +.>Means the requested bandwidth of said edge device, < > and->Refers to the uplink maximum bandwidth of the edge device.
5. An edge computing trusted access method as claimed in any one of claims 1 to 3, wherein said edge computing trusted access method further comprises:
constructing a second game trusted access model between the edge server and the cloud server;
and acquiring a benefit matrix between the edge server and the cloud server in the second game trusted access model.
6. The edge computing trusted access method of claim 5, wherein after the step of obtaining a revenue matrix between said edge server and said cloud server, said method further comprises:
Acquiring a first probability and a second probability, wherein the first probability refers to the probability that the cloud server provides connection for the edge server, and the second probability refers to the probability that the edge server accepts the connection provided by the cloud server;
obtaining probability joint distribution between the cloud server and the edge server according to the first probability and the second probability;
and determining the maximum value of the benefits of the edge computing trusted access system according to the benefit matrix and the probability joint distribution.
7. An edge computing trusted access device, the edge computing trusted access device comprising:
the acquisition module is used for acquiring the user interest degree uploaded by the edge equipment through the edge server;
the division module is used for carrying out domain division processing on the edge computing trusted access system according to the user interest level to obtain a first domain layer and a second domain layer, wherein the first domain layer refers to a domain corresponding to each edge server, and the second domain layer refers to a plurality of edge devices contained in the domain corresponding to the edge server;
the construction module is used for constructing a layered trust model according to the first domain layer and the second domain layer, and obtaining a domain trust relationship of the edge calculation trusted access system according to the layered trust model at a preset target moment;
The domain trust relationship comprises: the domain trust of the edge device in the target domain is obtained by the building module based on the hierarchical trust model, and the interaction between the edge server and the edge device is also obtained in the same target domainFrequency of each other; determining the overall satisfaction degree of the edge server to the edge equipment according to the frequency and the target moment; obtaining indirect trust of the edge equipment to the target domain at the target moment according to the overall satisfaction and a preset first formula, and obtaining the domain trust according to the overall satisfaction and the indirect trust, wherein the first formula is as follows:
8. A terminal device comprising a memory, a processor and an edge computing trusted access program stored on the memory and executable on the processor, the processor implementing the steps of the edge computing trusted access method of any one of claims 1 to 6 when the processor executes the edge computing trusted access program.
9. A computer storage medium having stored thereon an edge computing trusted access program which when executed by a processor performs the steps of the edge computing trusted access method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310209062.2A CN116074841B (en) | 2023-03-07 | 2023-03-07 | Edge computing trusted access method, device, equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310209062.2A CN116074841B (en) | 2023-03-07 | 2023-03-07 | Edge computing trusted access method, device, equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116074841A CN116074841A (en) | 2023-05-05 |
CN116074841B true CN116074841B (en) | 2023-06-13 |
Family
ID=86182078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310209062.2A Active CN116074841B (en) | 2023-03-07 | 2023-03-07 | Edge computing trusted access method, device, equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116074841B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924081A (en) * | 2018-05-03 | 2018-11-30 | 深圳中泰智丰物联网科技有限公司 | Privacy of user is protected to resist malicious user method in Internet of Things based on edge calculations |
WO2022240906A1 (en) * | 2021-05-11 | 2022-11-17 | Strong Force Vcn Portfolio 2019, Llc | Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10848974B2 (en) * | 2018-12-28 | 2020-11-24 | Intel Corporation | Multi-domain trust establishment in edge cloud architectures |
JP7466156B2 (en) * | 2019-04-05 | 2024-04-12 | ミミック・テクノロジー・インコーポレイテッド | Method and system for distributed edge cloud computing |
CN110753126B (en) * | 2019-10-28 | 2022-06-17 | 国网河南省电力公司信息通信公司 | Service node selection method, device, system and medium |
CN113992676B (en) * | 2021-10-27 | 2022-09-06 | 天津大学 | Incentive method and system for layered federal learning under terminal edge cloud architecture and complete information |
CN115484054A (en) * | 2022-08-03 | 2022-12-16 | 国网浙江省电力有限公司桐乡市供电公司 | Dynamic trust evaluation method facing edge equipment |
-
2023
- 2023-03-07 CN CN202310209062.2A patent/CN116074841B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924081A (en) * | 2018-05-03 | 2018-11-30 | 深圳中泰智丰物联网科技有限公司 | Privacy of user is protected to resist malicious user method in Internet of Things based on edge calculations |
WO2022240906A1 (en) * | 2021-05-11 | 2022-11-17 | Strong Force Vcn Portfolio 2019, Llc | Systems, methods, kits, and apparatuses for edge-distributed storage and querying in value chain networks |
Also Published As
Publication number | Publication date |
---|---|
CN116074841A (en) | 2023-05-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | A resource allocation model based on double-sided combinational auctions for transparent computing | |
Dai et al. | A learning-based approach for vehicle-to-vehicle computation offloading | |
Jin et al. | Data-driven pricing for sensing effort elicitation in mobile crowd sensing systems | |
Ghosh et al. | Mobility-aware cost-efficient job scheduling for single-class grid jobs in a generic mobile grid architecture | |
CN106060145A (en) | Profit based request access control method in distributed multi-cloud data center | |
Deb et al. | DEFT: Decentralized multiuser computation offloading in a fog-enabled IoV environment | |
Maan et al. | Deep Q-network based fog node offloading strategy for 5 G vehicular Adhoc Network | |
Meneguette et al. | A virtual machine migration policy based on multiple attribute decision in vehicular cloud scenario | |
CN115714817A (en) | Dynamic feedback weighted cloud storage resource scheduling method, device and equipment | |
Li et al. | DQN-enabled content caching and quantum ant colony-based computation offloading in MEC | |
CN116541106A (en) | Computing task unloading method, computing device and storage medium | |
Nguyen et al. | Flexible computation offloading in a fuzzy-based mobile edge orchestrator for IoT applications | |
Zhang et al. | Multi-attribute-based QoS-aware virtual network function placement and service chaining algorithms in smart cities | |
Kwantwi et al. | Blockchain-based computing resource trading in autonomous multi-access edge network slicing: A dueling double deep q-learning approach | |
Aloqaily et al. | An auction-driven multi-objective provisioning framework in a vehicular cloud | |
Durga et al. | Context-aware adaptive resource provisioning for mobile clients in intra-cloud environment | |
CN116074841B (en) | Edge computing trusted access method, device, equipment and computer storage medium | |
Laroui et al. | Virtual mobile edge computing based on IoT devices resources in smart cities | |
Tiwari et al. | Fedserv: Federated task service in fog-enabled internet of vehicles | |
Li et al. | Optimal service selection and placement based on popularity and server load in multi-access edge computing | |
Fan et al. | Knative autoscaler optimize based on double exponential smoothing | |
CN109040283A (en) | A kind of modified load-balancing algorithm based on difference reaction type | |
Liu et al. | Joint task offloading and dispatching for mec with rational mobile devices and edge nodes | |
Dai et al. | Edge trusted sharing: task-driven decentralized resources collaborate in IoT | |
Suksomboon et al. | Lawnfo: A decision framework for optimal location-aware network function outsourcing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |