An integrated three-tier trust management framework in mobile edge computing using fuzzy logic
- Published
- Accepted
- Received
- Academic Editor
- Qichun Zhang
- Subject Areas
- Algorithms and Analysis of Algorithms, Artificial Intelligence, Mobile and Ubiquitous Computing, Security and Privacy
- Keywords
- Mobile edge computing, Trust management, Service level agreement, Processing performance, Fuzzy logic
- Copyright
- © 2021 BM Mansour et al.
- Licence
- This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
- Cite this article
- 2021. An integrated three-tier trust management framework in mobile edge computing using fuzzy logic. PeerJ Computer Science 7:e700 https://doi.org/10.7717/peerj-cs.700
Abstract
Mobile edge computing (MEC) is introduced as part of edge computing paradigm, that exploit cloud computing resources, at a nearer premises to service users. Cloud service users often search for cloud service providers to meet their computational demands. Due to the lack of previous experience between cloud service providers and users, users hold several doubts related to their data security and privacy, job completion and processing performance efficiency of service providers. This paper presents an integrated three-tier trust management framework that evaluates cloud service providers in three main domains: Tier I, which evaluates service provider compliance to the agreed upon service level agreement; Tier II, which computes the processing performance of a service provider based on its number of successful processes; and Tier III, which measures the violations committed by a service provider, per computational interval, during its processing in the MEC network. The three-tier evaluation is performed during Phase I computation. In Phase II, a service provider total trust value and status are gained through the integration of the three tiers using the developed overall trust fuzzy inference system (FIS). The simulation results of Phase I show the service provider trust value in terms of service level agreement compliance, processing performance and measurement of violations independently. This disseminates service provider’s points of failure, which enables a service provider to enhance its future performance for the evaluated domains. The Phase II results show the overall trust value and status per service provider after integrating the three tiers using overall trust FIS. The proposed model is distinguished among other models by evaluating different parameters for a service provider.
Introduction
Cloud computing (CC) provides a variety of computing resources such as processing capabilities, storage, servers, for multiple cloud users over the network (Monir et al., 2015). Such resources are physically located at large data centers which are far away from users’ proximity. This causes high data transfer delays between service users and cloud resources, resulting in an increased network latency, while preventing real time applications like vehicular networks from being processed in a timely manner (Roman, Lopez & Mambo, 2016; Mach & Becvar, 2017; Shi et al., 2016; Taleb et al., 2017). Mobile edge computing had emerged as part of the cloud computing paradigm, in an attempt to be nearer to user premises, under the coverage of radio access networks (RAN) (Ahmed & Ahmed, 2016; Aslanpour et al., 2021).
In mobile edge computing (MEC), service executions such as computation and storage are transferred from the cloud network to the mobile base stations located at the network edge (Wang et al., 2017; Hu et al., 2015; Leppanen, 2019; Nunna et al., 2015). This provided low network latency, scalability and utilization of resources, which in return, minimizes computational and network overhead during data offloading for computational purposes. On the other hand, it enabled real time and data sensitive applications, such as smart health care systems, to be efficiently executed within their time limitation (Shangguang et al., 2019; Chen et al., 2016; Shi & Dustdar, 2016; Corcoran & Datta, 2016). MEC allowed more service providers and users to connect to the network, benefiting from the processing and storage capabilities, which became more accessible to them (Shi, Sun & Cao, 2017; Maoy, You & Zhang, 2017; Rani et al., 2021). This had relatively increased the transactions rate and number of participants connected to the MEC paradigm.
Problem Statement
However, due to the large number of communicating entities, several security and trust issues arise in such a vulnerable environment (Tang & Alazab, 2017). These security threats such as; fake service users, malicious service providers or denial of service attack (Jhaveri et al., 2018). Trust issues arise when service users route their private data for computational purposes, to unknown remote service providers, where they lose control of it (Sheikh et al., 2012). Due to lack of previous experience between service users and providers, service users hold several doubts like:
their data security, confidentiality and privacy (Deepa et al., 2020; Ranaweera, Jurcut & Liyanage, 2021);
unknown service provider’s processing performance efficiency and trust degree;
no guarantee that the selected service provider would abide to the agreed upon service level agreement (SLA) terms;
no recording of historical violations committed by a service provider, and the type of it. This may give a chance for malicious service providers to re-do their incorrect actions again, knowing that they are untraced by any authorized entity.
A service level agreement acts as a contract, signed between a service provider and user that states the agreed upon processing conditions. However, there is not a standard format for an SLA, which obscures its legal judgment. On the other hand, trust data extraction is a very difficult task due to the large number of transactions follow, in which a huge amount of data is generated like transaction type, terms, cost and service users’ ratings. Service user ratings, could be untrusted, biased, irrelevant or difficult to filter. Therefore, service users demand guidance of service providers’ trust degree prior their selection. Several works had been introduced in literature that evaluated service providers in terms of processing performance, processing quality, response time or SLA compliance degree. However, to the best of our knowledge at this time, none of the previous works covered all these major parameters together. Some of these works faced challenges such as depending on service users’ feedback opinion, lack of trust results update, unclear service provider assessment criteria.
Motivation
It is essential to build a trust evaluation scheme to evaluate service providers’ performance in the MEC environment for four main reasons:
Service users will be aware service provider’s trust degree prior their interaction.
Service providers will understand that their actions are being monitored and recorded in a historical database. This motivates them to enhance their processing performance capabilities and limits any malicious actions to happen.
The trust evaluation scheme allows a service provider to know its faulty points to improve them, (Asghar et al., 2020).
Service providers with good trust value will attract more service users, which increases their profits.
A standard and universal trust evaluation model for MEC entities, would greatly contribute in distinguishing trustworthy service providers among others in the MEC network and their offered services. This would avoid attacks such as, malicious or fake service providers, and collusion attacks. Building trusted relationships would secure future interactions in the MEC paradigm. Consequently, service users’ confidence and reliability on the MEC services will increase, leading to higher transactions rate (Chong et al., 2013a).
Paper contribution
Trust is defined as the level of service user confidence towards a service provider for fulfilling its computational requirements as expected (Chahal & Singh, 2015; Ruan, Durresi & Alfantoukh, 2016; Ruan & Durresi, 2016; Ruan & Durresi, 2017). A trust management system builds trusted relationships between the participating entities, by assessing each service provider provisioned services and making trust level results available to service users when requested. Therefore, service providers’ trust history should be captured, to avoid trust computation prior each new interaction, which saves time and yields to users’ awareness of service provider’s past interactions.
To address the above limitations, this research introduces the need of a unified trust management framework that evaluates service providers’ provisioned services in the MEC network considering various parameters. Trust evaluation is performed in a centralized manner, by a fully trusted third party known as cloud service manager (CSM), to grantee trust results credibility (Felix & Ricardo, 2012; Hatzivasilis et al., 2020). This also promotes for a secure and successful transactions between service users and providers in the MEC environment (Rathee et al., 2017).
On the other hand, fuzzy logic concept is used to address a situation of partial truth or uncertainty of values (AbdelKader, Naik & Nayak, 2011). This is an ideal choice, when evaluating the trustworthiness of a service provider, were the trust result is a dynamic variable depending on several measured parameters computed per computational interval (Tariq et al., 2020). This paper presents an integrated three-tier trust management framework using fuzzy logic. The main contributions of this paper are:
Phase I: Three tiers
Evaluation of service provider SLA compliance degree in Tier I;
Computation of service provider processing performance in Tier II;
Measurement of service provider violations in Tier III;
Each tier trust evaluation is performed Three tiers independently per transaction in a batch processing manner.
Phase II: Three-tiers integration
5. A MATLAB based overall trust fuzzy inference system (FIS) was developed to integrate the evaluated results of tiers I, II and II, in order to gain an overall trust value and status for a service provider.
In the proposed framework, an SLA trust value is evaluated using four parameters (execution time, storage, cost and maintenance), to have a standard format, which allows it for a consistent judgment (Sheikh, Sebestian & Max, 2011). On the other hand, the processing performance of a service provider is measured by computing the number of successful processes verses the total number of accepted jobs, while gaining the failure ratio. The violations measurement is gained by maintaining the type and number of malicious actions committed per service provider. The main aim of tier III is to monitor any wrong actions performed by a service provider. The three-tiers evaluation is performed using the proposed mathematical equations and algorithms. The output results of each tier of the three-tiers are inserted as an input to the buildup overall trust FIS, which provides a total trust value and status for a service provider per computational interval. This provides a full representation of a service provider abidance to the SLA contract, processing performance and violations committed during its service provisioning in the MEC paradigm. This paper is organized as follows; ‘Literature Review and Related Work’, introduces the literature review and related work. ‘Proposed Integrated Three-Tier Trust Management Framework’, presents the integrated three-tier trust management framework: Phase I. The three-tiers integration using fuzzy logic is detailed in ‘Phase II: Three-Tier Integration using Fuzzy Logic’. ‘Simulation Results and Discussion’, shows the simulation results. Finally, the conclusion and future work are discussed in ‘Conclusion and Future Work’.
Literature Review and Related Work
Many researches had developed various trust evaluation schemes to assess service providers’ provisioned services and behavior in different edge computing (EC) paradigms. This is in an attempt to improve service providers’ quality of service (QoS) and decrease losses emerging due to malicious actions performed over the network. This in return, will increase service users’ trust and dependency EC resources (Jhaveri et al., 2018). Table 1 discusses some of the related work.
Ref. model | Domain | Parameters measured | Discussion |
---|---|---|---|
(Monir, AbdelKader & EI-Horbaty, 2019) | MEC | SLA was evaluated by computing users’ opinion in service provider’s processing cost, storage, maintenance and execution time. | Trust evaluation results were totally dependent upon service users’ feedback opinion, which may led to less reliable trust results. |
(Ma & Li, 2018) | EC | Trust was measured by evaluating deployed data security and privacy mechanisms in terms of resource identity, performance and quality of service. | Trust updating and sharing was not addressed, which weakens the trust evaluation efficiency of the model. |
(Deng et al., 2020) | MEC | A reputation-based trust evaluation model and management for service providers was introduced that measured trust in terms of identity verification, deployed hardware capabilities (CPU, memory, disk, online time) and behavior. | Trust results were derived from service consumers’ previous interactions’ ratings. Unfortunately, such users’ ratings may not be trustworthy enough. |
(Ruan, Durresi & Uslu, 2018) | MEC | Service provider’s trustworthiness is measured according to its performance per transaction with a service user. A degree of confidence measure is associated accordingly that shows user expectation of service provider future behavior. | The model depended on users’ ratings, who could have different perspectives which may negatively affect trust evaluation accuracy. Monitoring and comparing such ratings in user-provider relationships is time consuming and may produce redundant data. |
(Khan, Chan & Chua, 2018) | CC | Service providers’ quality of service was evaluated in terms of service availability, response time and throughput. | Fuzzy rules were used to predict future behavior of a cloud service provider. The model helped service users in their service cost estimation. |
(Akhtar, 2014) | CC | Service provider performance was evaluated in terms of infrastructure (response time and resource utilization with respect to the number of users) and application performance (in terms of; response time to a user, volume of data linked and processing migration). | Service provider performance evaluation was computed using fuzzy logic. Results managed to conclude the service provider performance level. |
The abovementioned attempts measured trust considering different parameters, yet there isn’t a unified service provider trust evaluation framework that integrates all major attributes together. Such main attributes are; SLA compliance degree, processing performance level and violations measurement of service providers’ provisioned services in the MEC network.
Proposed Integrated Three-Tier Trust Management Framework
The proposed framework aims to measure service provider trust value, considering various attributes. The model is built up of two phases, as shown in Fig. 1. Phase I constitutes three main tiers: Tier I evaluates service provider’s SLA compliance degree, Tier II computes the processing performance value of a service provider, while Tier III measures the violations committed by a service provider during its processing in the MEC network. Phase II integrates the results of the three tiers in order to gain an overall trust value and status of a service provider using fuzzy logic concept.
Acting protocol entities
Service User “ ”: jth service user, is a user requesting a certain job to meet its computational needs. is represented by two attributes {service user unique id and name}.
Service Provider “ ”: ith service provider, could be an ordinary provider or an organization supplying computational services to users. is represented by three attributes {service provider unique id, service provider name and offered service type}.
Cloud Broker: acts as an intermediate entity to match between a service user seeking a suitable service provider. A cloud broker is considered as a semi-trusted entity.
Cloud Service Manager (CSM): is regarded as a fully trusted authorized party in the MEC network. CSM is responsible to perform, regulate and audit trust computation process for service providers in the MEC environment (Felix & Ricardo, 2012). CSM can exchange computed trust values of service providers within its coverage range with other CSM, in case requested. CSM also provides secure storage of trust computed results of service providers.
Network Provider: is responsible for registering a service user, provider and cloud broker to the MEC network. It also handles network communications between all of the above entities.
List of assumptions
The proposed trust framework considers the below assumptions:
Trust computation is handled by a fully trusted third party like CSM.
In case service provider1 sends part or all of user’s required task to service provider2 for processing, known as process migration, service provider1 is totally responsible for user’s data security. Service provider1 should also inform the user of this attempt, and offer the relative guarantee to ensure service user’s data security, privacy and integrity.
A service provider could own one or more platform that offers one or more different service type.
Each service type of a service provider is evaluated independently regardless it’s the same service provider.
There are three main jobs requested over the MEC network: 1-processing, 2-storage, 3-both of them, known as Job_type {Job1, Job2, Job3} respectively.
Phase I: proposed three-tier trust evaluation framework
Phase I constitutes of three tiers trust evaluation: Tier I—Service level agreement evaluation, Tier II—Processing performance evaluation and Tier III—Violations measurement. In each tier, several parameters are evaluated to gain the tier trust value, as shown in Fig. 2.
Tier I trust results are gained by service user rating of SLA, upon process completion. Tier II is computed by evaluating the processing performance of a service provider, whereas Tier III provides a violations measurement and warnings received by a service provider. The three-tier computation is performed per “n” computational interval as described in the below subsections.
Tier I—service level agreement evaluation
A service level agreement, is an agreement placed between a service provider and user, which states the job type requested by the service user and it’s agreed upon computational conditions. Assume that the requested job is one of the previously mentioned three job types; known as “a”, and the total number of requested jobs received by ith service provider, is referred to as “A”. The main conditions mentioned in an SLA should be standard for all SLAs, maintained by both parties and eligible for judgment if needed (Chong et al., 2013b). Assume that all SLAs contain four major conditions; computational cost , required computational storage capacity GB/TB ( ), computational maintenance duration h/min , and agreed computational execution time h/min be , (Monir, AbdelKader & EI-Horbaty, 2019). Upon job completion, a service user performs a compulsory rating process, to rate the service provider compliance to the four agreed upon conditions according to its own job execution experience. Assume that each of the above four major SLA components are rated as “r”, shown in Table 2.
Variable | Dissatisfaction rate | Satisfaction rate | Consequences of dissatisfaction rate > Threshold SLA drawback warnings |
---|---|---|---|
_R | 0 ≤ r ≤ 2 | 3 ≤ r ≤ 5 | W1_ issued |
_R | 0 ≤ r ≤ 2 | 3 ≤ r ≤ 5 | W2_ issued |
_R | 0 ≤ r ≤ 2 | 3 ≤ r ≤ 5 | W3_ issued |
_R | 0 ≤ r ≤ 2 | 3 ≤ r ≤ 5 | W4_ issued |
The abovementioned values could be adjusted according to own perspective.
Such ratings of computational cost, storage, maintenance and execution time ( _R, _R, _R, _R) respectively, reflects user degree of satisfaction/dissatisfaction and compliance of a service provider against the agreed upon SLA conditions. Assume that the total number of rated SLAs, equals the total number of accepted processes “A” by ith service provider. Let the computed rated SLA value be , were it ranges between “0” and “20”, given by Eq. (1), is as follows:
(1)
Eq. (1) is multiplied by five, to get the result in percentage form. Thus, the average computed SLAs value, “ ”, is calculated by;
(2)
SLAs average is computed per service provider as given in Eq. (2), by the CSM. This guarantees SLA evaluation results credibility. Noting that, each requested job is given a separate SLA, even if it’s requested by the same service user, and performed by the same service provider. However, each job could have different computational requirements.
On the other hand, a certain threshold value is set for each dissatisfaction rated component. The dissatisfaction rate is computed per ith service provider for each component per “n” computational interval. In case the dissatisfaction rate of any component had exceeded the predefined threshold for this component, a warning is issued for ith service provider as shown in Table 2. This alerts service providers for any dissatisfactory results gained for the SLA components in order to enhance their processing capabilities in this component.
Tier II—processing performance computation
The processing performance of ith service provider “ ”, refers to the value of successful processes accomplished by a service provider in “n” computational interval. Assume process “a” ends, either as successful or incomplete. A complete process implies that the service provider had abided to all the four processing conditions and is referred to as process success, “ ”. On the other hand, an incomplete process could be a result of one of the below three states:
a service provider had started the job processing but didn’t complete it within its agreed conditions,
a service provider didn’t start the job processing though accepted the job,
a service provider had started the job processing and is proceeding within its agreed upon conditions, and didn’t exceed its process execution time ). However, the service user wishes to terminate the job processing transaction.
States 1 and 2, are recommended as incomplete job processing, known as processing incompliance “ ” by a service provider. State 3 is referred to as user termination case, referred as “ ”. Tier II evaluates the processing performance of ith service provider, in terms of:
Average processing success ratio “ ”: is considered as the number of successful processes implemented by ith service provider, divided by the total number of accepted processes “A”, as shown in Eq. (3):
(3)
Average processing incompliance ratio “ ”: is the number of accepted processes by a service provider but failed to perform or complete them “ ”, is computed by Eq. (4);
(4)
Average user termination ratio “ ”: where a service user feels dissatisfied for any reason, and decides to terminate its computational transaction, as represented in state no. 3. This is known as user termination ratio, “ ”, and computed by Eq. (5);
(5)
The processing performance of ith service provider is gained by Eq. (6);
(6) where 0 ≤ ≤ 1 for “n = 1” computational interval
Eq. (6), shows the processing performance degree of a service provider in the MEC environment.
A predefined threshold is set for each of processing incompliance and user termination ratio values. In case a service provider computed results of these two parameters had exceeded this threshold within “n” computational interval, a relative warning is issued for ith service provider as shown in Table 3. This is to alert ith service provider for such incidents.
Tier II-variables | Processing performance drawbacks warnings |
---|---|
> Threshold | W5_ issued |
> Threshold | W6_ issued |
Tier III: violations measurement
Tier III proposes two algorithms: 1—complain and evidence algorithm, 2—violations measurement algorithm. Data privacy leakage (Talal & Quan, 2015), incidents occurring by service providers are monitored through the “complain and evidence” algorithm as described in “Data privacy leakage complaint algorithm”. On the other hand, the violations measurement algorithm presented in “Violations Measurement Computation”, counts the warnings gained by a service provider per “n” computational interval, to gain its trust value in Tier III.
(A) Data privacy leakage complaint algorithm
A service provider is responsible for service user data privacy while a user is provisioning provider’s services or applications, by installing the necessary data protection mechanisms. However, a service user may face a situation where it discovers that its own private data had been routed by a service provider, without prior permission for doing so, this hinders user’s data privacy (Deepa et al., 2020; Talal & Quan, 2013). A data privacy leakage is known as a security threat, where it can lead to cyber-attacks, social issues, or cause user robbery by different means (Javed et al., 2021; Iwendi et al., 2020; Vasani & Chudasama, 2018). To monitor such service provider actions, a service user sends a complain message “ ” to the CSM, against the suspected service provider including an evidence for this incident. The complaint message “ ” should include:
screenshot of service user data appearing in unknown platform for the user;
service user data ownership evidence (could be a previous email sent from the user to the respective service provider including this data);
transaction SLA including & .
The mentioned conditions in the complaint message, “ ” are investigated by the CSM for verification. If the CSM investigation results are approved to be true against ith service provider, this incident is considered as incident 1 and an alarm message “incident1_ ” is sent to the accused service provider accordingly, as shown in Fig. 3. Incident 1 is counted and stored by the CSM.
In case a data privacy leakage complaint had been submitted by a different service user, but against the same service provider, CSM investigates the case. If CSM approves the complaint message to be true as mentioned previously, CSM considers these incidents as data privacy leakage attack, where the accused service provider is penalized by sending to it warning no. 7, “W7_ ”. On the other hand, such warning degrades the trust value for the accused service provider as shown in Table 4. This is to avoid recurrent occurrence of such attacks in the future by malicious service providers.
Warning name | Reason | “θ” decreasing factor | Tier |
---|---|---|---|
W1_Sri | Exceeded cost dissatisfaction threshold. | θW1 = 0.1 | I-SLA |
W2_Sri | Exceeded storage dissatisfaction threshold. | θW2 = 0.1 | |
W3_Sri | Exceeded maintenance dissatisfaction threshold. | θW3 = 0.1 | |
W4_Sri | Exceeded agreed computational execution time dissatisfaction threshold. | θW4 = 0.1 | |
W5_Sri | Exceeded processing incompliance threshold. | θW5 = 0.2 | II-Processing performance |
W6_Sri | Exceeded user termination ratio threshold. | θW6 = 0.1 | |
W7_Sri | Data privacy leakage incident. | θW7 = 0.3 | III-Violations Measurement |
The data privacy leakage complaint algorithm presented in Fig. 3, traces and counts data leakage actions committed by ith service provider in “n” computational interval, with different users. These incidents and warning are being stored in a historical database by the CSM per ith service provider.
(B) Violations measurement computation
The violations measurement computation algorithm measures the warnings imposed on ith service provider in tiers I and II, (during SLA evaluation and processing performance computation), and in case of a data privacy leakage incident. The relationship between the three-tier framework warnings is shown in Fig. 4.
Each warning type is given a number, from 1 to 7, as shown in Table 4. A decreasing factor “θ” is given for warnings imposed on ith service provider, which is computed according to the number and reason of warning. Noting that “θ” is a changing variable, that could be assigned different values according to own perspective. Assume the total warnings value for ith service provider computed in Tier III, be “ ”, which is calculated by Eq. (7):
(7) where
Given that “ ” gives the total warnings value, hence, the violations measurement “ ”, is computed by;
(8)
The violations measurement of ith service provider is computed in Tier III, as shown in Fig. 5, by the CSM. In this algorithm, CSM checks whether ith service provider had received any warnings (W1_ , …, W7_ ). If ith service provider received any warning, it computes its relative “θ” and “ ” value by Eq. (7) accordingly. “T ” is computed by Eq. (8), to gain the violations measurement for ith service provider.
The violations measurement algorithm presented in Fig. 5, checks the warnings received by ith service provider, to compute its total warnings value “ ”. Hence, the total warnings value is deducted from “1”, to gain its violations measurement “ ”. In case a service provider didn’t receive any warnings, this service provider gains the full value of the violations measurement “ ”, which is equal to “1”.
Summary
The proposed three-tier protocol in Phase I, aims to maintain the trust value of ith service provider considering three main attributes; SLA compliance degree, processing performance level and violations measurement. This is in an attempt to optimize trust results credibility. In Phase II, an integration of the three-tier results is provided to gain an overall trust value of ith service provider, building up the whole framework. This disseminates service providers’ processing performance and pervious interactions in the MEC network.
Phase II: Three-Tier Integration Using Fuzzy Logic
The overall trust value of ith service provider is an aggregate value of the computed end results of each of the above three tiers (SLA evaluation, processing performance computation and violations measurement). Hence, ith service provider overall trust value is computed using the developed fuzzy inference system (FIS) named “Overall_Trust”, as shown in Fig. 1 and described in ‘Using Fuzzy Logic for Trust Computation in Mobile Edge Computing’ and ‘Integration of Tiers I, II and III Results using Fuzzy Logic’.
Using fuzzy logic for trust computation in mobile edge computing
Fuzzy logic is a form of artificial intelligence, were the input parameters are given to a fuzzy inference system as unclear or uncertain information, denoting partial truth of a parameter (Nagarajan, Selvamuthukumaran & Thirunavukarasu, 2017). This is in contrast of Boolean logic, which belongs to discrete numbers, either 0 or 1. Such input values range between 0 and 1 and are placed in membership functions to distinguish each range of values, known as fuzzification process (Sule et al., 2017). If-then-else rules are set to the fuzzy inference rule base editor, in MATLAB, in order to allocate each range of input values to a specific output decision. The output result is converted into a crisp value known as defuzzification process. Fuzzy logic concept has great advantages, like flexibility, fast response time, low cost and logical reasoning. For these reasons, fuzzy logic was chosen to compute service providers overall trust value and status in this framework, since MEC is a highly dynamic environment. Service providers trust computation helps service users during their service provider selection, and balances between offered services and cost.
Integration of tiers I, II and III results using fuzzy logic
Fuzzy logic concept is used to integrate the end results of Tiers I, II, and III of Phase I, in order to gain an overall trust value for ith service provider, during Phase II computation, as shown in Fig. 1. The fuzzy logic toolbox in MATLAB was used to develop the “overall trust” system. Trapezoid-cure shape was used to represent each of the three fuzzy inputs of the three tiers, (SLA evaluation, processing performance computation, violations measurement), and their relative fuzzy membership functions, as shown in Fig. 6. Membership functions input values range between [0,100], which are converted to fuzzy linguistic input variables, forming three fuzzy sets (low, medium, high), during the fuzzification process, as presented in Table 5.
FIS Name | Overall Trust | ||||||
---|---|---|---|---|---|---|---|
FIS Type | Mamdani | ||||||
Rules | 21 | ||||||
Defuzzification type | Centroid | ||||||
Input | Output | ||||||
No. of | 3 | 1 | |||||
Name | SLA Processing performance Violations measurement |
Overall Trust | |||||
No. of membership functions | 3 | 4 | |||||
Membership function Type | Trapezoidal | Triangular | |||||
Membership function name | Low | Medium | High | Low | Medium | High | Excellent |
Range | 0-40 | 30-70 | 60-100 | 0-30 | 30-60 | 60-90 | 90-100 |
Centroid defuzzification was performed to obtain a crisp overall trust value for ith service provider. The triangular-shape curve represents the output value membership functions (low, medium, high, excellent), as shown in Fig. 7. ith service provider overall trust value belongs to one of the four fuzzy output sets. Twenty-one inference rules were added to the Mamdani inference system, to compute the overall trust status of ith service provider, considering its SLA evaluation, processing performance computation and violations measurement. Each rule, used AND logical operator, to co-relate between input and output variables, as given in Table 6.
Rule | Fuzzy input variables | Defuzzified output | ||
---|---|---|---|---|
No. | Overall Trust | |||
1. | L | L | L | Low |
2. | L | L | M | Low |
3. | L | M | L | Low |
4. | M | L | L | Low |
5. | L | L | H | Low |
6. | L | H | L | Low |
7. | H | L | L | Low |
8. | M | M | M | Medium |
9. | M | M | L | Medium |
10. | M | L | M | Medium |
11. | L | M | M | Medium |
12. | M | M | H | Medium |
13. | M | H | M | Medium |
14. | H | M | M | Medium |
15. | H | H | M | High |
16. | H | M | H | High |
17. | M | H | H | High |
18. | H | H | L | Medium |
19. | H | L | H | Medium |
20. | L | H | H | Medium |
21. | H | H | H | Excellent |
The fuzzification of the three-tiers values participate in forming the overall trust fuzzy inference system, which computes ith service provider overall trust in the MEC network, as presented in Fig. 8. A smooth surface is shown in Fig. 9, while comparing the processing performance and SLA evaluations against the overall trust value.
Phase II: summary
The main aim of Phase II, is to provide an overall trust value for a service provider in the MEC network. This is done by gaining the value of service provider’s successful interactions and the violations degree measurement, while maintaining service users’ opinion of the SLA. Through the fuzzy logic concept, the three tiers’ end results were integrated to produce ith service provider overall trust value and status.
Simulation Results and Discussion
The integrated three-tier trust management framework simulation was performed using Matlab R2017a. Simulation results are shown in ‘Integrated Three-Tier Trust Management Framework Simulation Results’. A comparison with previous protocols is presented in ‘Comparison with Previous Protocols’. ‘The Intergrated Three-Tier Trust Management Framework Achievements’ depicts the proposed framework achievements.
Integrated three-tier trust management framework Simulation Results
A MATLAB-based simulation was developed to show Phase I and II results of the integrated three-tier trust management framework. Random number generation was used for the input values of each of: SLA rating components; number of received processes (successful, failed and user termination ratio); and privacy leakage incident. The overall trust fuzzy inference system was developed using MATLAB fuzzy logic designer tool. However, each of the simulated service providers was forced a specific range of values, to validate the developed system equations and twenty-one fuzzy inference system rules set, in various conditions. The overall trust FIS contains three input membership functions. Each membership function presents the computed results of each tier (SLA, processing performance and violations measurement).
System setup:
Assume five different service providers’ cases studies.
Each service provider initial trust value is “0”.
Three-tier computation was performed in n = 1 computational interval.
All service providers received the same number of job requests, in one job_type {Job3}.
Hardware PC configuration was; core i7, RAM 6 GB and hard disk 1 Tera.
The three-tier simulation results of Phase I for the five service providers are shown in Table 7. These results are shown for ith service provider, upon the completion of “n” computational interval. Phase I presents detailed computational results and points of enhancement for each service provider per tier. The warning methodology helps a service provider to know its points of weakness.
Service Provider | SLA | PP | Violations | Warnings issued | Enhancement Recommendation | ||
---|---|---|---|---|---|---|---|
SLA | PP | Violations | |||||
Sr1 | 80.6 | 87.8 | 83.3 | W1_ | √ -SC |
||
Sr2 | 50 | 50 | 50 | W2_
, W4_
, W6_
, W7_ |
√ -SS -SE |
√ -UTR |
√ -DPR |
Sr3 | 20.3 | 22.1 | 23 | W2_ , W3_ , W4_ , W5_ , W6_ , W7_ | √ -SS -SM -SE |
√ -PI -UTR |
√ -DPR |
Sr4 | 48.2 | 56.3 | 86 | W2_
, W6_ , |
√ - |
√ -UTR |
|
Sr5 | 80.6 | 50.9 | 23.9 | W5_ , W6_ , W7_ | √ -PI -UTR |
√ -DPR |
Phase II simulation results are shown in Table 8. The overall trust FIS computes the trust value and status per service provider in one of the predefined job types. In case a service user is seeking the processing of job3, overall trust value and status of the available service providers in this job type is shown in Table 8. However, a service user could reveal the three-tier results, with the overall trust value and status of the five service providers for serious selection, as shown in Fig. 10.
Service provider | Overall trust value | Overall trust status |
---|---|---|
Sr1 | 95 | Excellent |
Sr2 | 45 | Medium |
Sr3 | 15 | Low |
Sr4 | 45 | Medium |
Sr5 | 50 | Medium |
Fig. 10 gives a full representation for each of the simulated five service providers processing performance in the MEC network.
Comparison with previous protocols
A comparison between the proposed three-tier trust management framework evaluated parameters, and previous protocols measured parameters in cloud computing and mobile edge computing is presented in Table 9.
Ref.no. | Platform | Service provider evaluated parameters | History Capturing | Trust Evaluation Methodology | Discussion and limitations | |||
---|---|---|---|---|---|---|---|---|
SLA | Processing Performance | Violations measurement | Other | |||||
(Akhtar, 2014) | CC | √ | Infrastructure performance | Fuzzy logic-based rules | Measured limited parameters for each performance variable. | |||
(Khan, Chan & Chua, 2018) | CC | √ | System training using Fuzzy logic-based rules | Didn’t evaluate other parameters, like processing success rate, data security or privacy measures taken by a service provider. | ||||
(Monir, AbdelKader & EI-Horbaty, 2019) | MEC | √ | √ | -User feedback opinion | Only evaluated SLA by considering service users’ feedback opinion, which may affect trust results credibility. | |||
(Deng et al., 2020) | MEC | √ | Identity management and hardware capabilities | -User feedback opinion | The hardware capabilities are claimed by the service provider, which doesn’t ensure their credibility. Processing performance evaluation depends only on users’ opinion, which may be biased. The model doesn’t encounter threats such as bad mouthing or collusion attacks. | |||
Integrated Three-Tier Trust Management Framework | MEC | √ | √ | √ | √ | -User feedback opinion -Computation-based with the aid of fuzzy logic concept |
Service user trust value should be measured. Transaction cost should be considered to eliminate false transactions rating. |
As shown in Table 9, the proposed framework had successfully measured various service performance parameters for service providers, with a warning and history capturing methodology, in comparison to previous works.
The intergrated three-tier trust management framework achievements
The proposed integrated three-tier trust management framework achieves the following:
Service provider assessment based on its behavior during its interactions on the MEC network according to its predefined job type and not by the quantity of hardware or software resources it possess, or job type offered.
Service providers’ awareness of their faulty points, while displaying the degree of improvement needed per component.
Future prediction for service provider performance competency per tier.
Malicious service provider detection and their points of attack through the violations measurement, warnings mechanism and the low trust fuzzy membership function.
Trust evaluation with minimal human interaction to maximize trust results credibility.
Dynamic trust computation for service providers, per “n” computational interval, considering history capturing mechanism.
Helps in cost estimation, for example, if a service provider’s service cost is high, this could be justified if its trust value is high in the three evaluated components. Service users’ awareness and guidance during their service selection for credible and trustworthy service providers. Consequently, service users will gain confidence and increase their dependency on the MEC network services.
Low computational trust evaluation time complexity. This is mainly due to: 1—the simplicity of the model equations, 2—history capturing makes trust results update easy, 3—the developed fuzzy inference system. Thus, the model can be used for large number of service providers in the MEC network, which is time efficient.
Computational storage saving, were there is no data redundancy during trust computation.
Conclusion and Future Work
Finding credible service providers in a vast ambiguous environment like mobile edge computing had been a very hard task faced by service users. The proposed integrated three-tier trust management framework, measures the trust value of a service provider considering three main attributes; SLA compliance, processing performance and violations measurement, in Tiers I, II and III of Phase I. Tiers I, II and III constitutes of different evaluated parameters, which eliminates the opportunity of false ratings and collusion attacks by service users. However, the three-tier protocol shows service provider’s points of weakness or strength per tier. The three-tier results are aggregated to give an overall trust value and status for a service provider, using the developed overall fuzzy inference system in Phase II. Trust evaluation in performed in a history capturing manner to ease trust updating process.
From a service user perspective, the three-tier protocol could also be beneficial, since service users may have different preferences, in spite they are requesting the same job type. For example, a service user may search for a service provider which will abide to its SLA, in terms of time compliance, for time critical operations, rather than its processing performance quality. This obviously helps service users and organizations in their selection for credible service providers to fulfil their computational demands.
The integrated three-tier framework computational simulation results show the trust value of a service provider in terms of SLA compliance, processing performance, and violations occurrence. The proposed warnings protocol, shows each service provider points of weakness, which supports its improvement. Finally, the results of the three-tier framework integration reflects the overall trust value and status of a service provider in the MEC network.
In the future, we plan to measure service user trust value, which could be a factor multiplied by its rated value. Therefore, the higher this factor, the more likely this rating to be true, which increases the service provider computed trust results reliability. On the other hand, service user trust value can be considered as a filtering mechanism for falsified ratings. However, the transaction cost should be considered as an affecting weight, during trust computation. Usually transactions of high cost are rarely mentioned to be fake. The active work time of a service provider should be measured in comparison to its total subscription life time in the MEC network. This actually reflects dedicated operational service providers.