{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:59:27Z","timestamp":1740142767803,"version":"3.37.3"},"reference-count":44,"publisher":"Oxford University Press (OUP)","issue":"10","license":[{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["M22037"],"award-info":[{"award-number":["M22037"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science and Engineering Research Council"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,15]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Internet of Things (IoT) jobs not only require computational resources but also are delay-sensitive and security-sensitive. Edge computing emerges as a promising paradigm to improve the quality of experience for IoT users. Edge computing faces many security threats, perhaps even more than traditional data centers. With a growing amount of data offloaded to Edge Data Centers (EDCs), the EDC performance needs to be considered and evaluated carefully for improving the vulnerable EDC resource utilization while satisfying IoT job requirements. This paper develops an analytical model, which can capture the dynamics of an EDC system with the following features: (i) The system is under heterogeneous workloads; (ii) the system is subject to attacks, which prevent equipment units in the system from providing service and (iii) the jobs in the system are delay-sensitive. Namely, the job processing fails before the processing is completed. Based on the proposed model, we develop formulas for performance and profit metrics and conduct a series of simulation experiments to verify the correctness and accuracy of our model. Finally, through our model, we evaluate the performance of the EDC, and we offer solutions for EDC administrators to maximize profit.<\/jats:p>","DOI":"10.1093\/comjnl\/bxac081","type":"journal-article","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T09:27:06Z","timestamp":1656840426000},"page":"2339-2354","source":"Crossref","is-referenced-by-count":1,"title":["Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach"],"prefix":"10.1093","volume":"66","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7577-9632","authenticated-orcid":false,"given":"Runkai","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Information Security , Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, , Haidian, Beijing 100044, P.R. China"},{"name":"Beijing Jiaotong University , Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, , Haidian, Beijing 100044, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1251-3730","authenticated-orcid":false,"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Ryerson University , Victoria Street, Toronto, ON M5B 2K3, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav B","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Ryerson University , Victoria Street, Toronto, ON M5B 2K3, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4730-8793","authenticated-orcid":false,"given":"Xiao","family":"Liang","sequence":"additional","affiliation":[{"name":"Crypto Economics Business Department, Aisino Corporation , Haidian, Beijing 100195, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1764-8762","authenticated-orcid":false,"given":"Shenshen","family":"Zhou","sequence":"additional","affiliation":[{"name":"Crypto Economics Business Department, Aisino Corporation , Haidian, Beijing 100195, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Security , Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, , Haidian, Beijing 100044, P.R. China"},{"name":"Beijing Jiaotong University , Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, , Haidian, Beijing 100044, P.R. China"}]}],"member":"286","published-online":{"date-parts":[[2022,7,2]]},"reference":[{"key":"2023101421214588300_ref1","doi-asserted-by":"crossref","first-page":"1363","DOI":"10.1109\/TIE.2018.2869488","article-title":"Methods and systems for a smart energy city","volume":"66","author":"Strasser","year":"2018","journal-title":"IEEE Trans. Ind. Electron."},{"key":"2023101421214588300_ref2","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1016\/j.future.2017.11.030","article-title":"A secure and efficient location-based service scheme for smart transportation","volume":"92","author":"Lin","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"2023101421214588300_ref3","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1080\/00207543.2017.1351644","article-title":"Smart manufacturing","volume":"56","author":"Kusiak","year":"2018","journal-title":"Int. J. Prod. Res."},{"key":"2023101421214588300_ref4","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/978-981-10-5861-5_5","volume-title":"Internet of Everything","author":"Mahmud","year":"2018"},{"key":"2023101421214588300_ref5","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1109\/TCOMM.2018.2799937","article-title":"Energy-efficient admission of delay-sensitive tasks for mobile edge computing","volume":"66","author":"Lyu","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"2023101421214588300_ref6","doi-asserted-by":"crossref","first-page":"2427","DOI":"10.1109\/TMM.2018.2796246","article-title":"Joint optimization of radio and virtual machine resources with uncertain user demands in mobile cloud computing","volume":"20","author":"Li","year":"2018","journal-title":"IEEE Trans. Multim."},{"key":"2023101421214588300_ref7","first-page":"154","volume-title":"IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)","author":"Budakoti","year":"2018"},{"key":"2023101421214588300_ref8"},{"key":"2023101421214588300_ref9"},{"key":"2023101421214588300_ref10"},{"key":"2023101421214588300_ref11","doi-asserted-by":"crossref","first-page":"3661","DOI":"10.1109\/TII.2019.2897364","article-title":"Computing resource trading for edge-cloud-assisted internet of things","volume":"15","author":"Li","year":"2019","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"2023101421214588300_ref12","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.future.2016.11.009","article-title":"Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges","volume":"78","author":"Roman","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"2023101421214588300_ref13","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MWC.2018.1700291","article-title":"Security in mobile edge caching with reinforcement learning","volume":"25","author":"Xiao","year":"2018","journal-title":"IEEE Wirel. Commun."},{"key":"2023101421214588300_ref14","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","article-title":"Security and trust issues in Fog computing: a survey","volume":"88","author":"Zhang","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"2023101421214588300_ref15","doi-asserted-by":"crossref","DOI":"10.1002\/0471791571","volume-title":"Queueing Networks and Markov Chains: Modeling and Performance Evaluation with Computer Science Applications","author":"Bolch","year":"2006"},{"key":"2023101421214588300_ref16","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1109\/TCC.2016.2560158","article-title":"Effective modeling approach for IAAS data center performance analysis under heterogeneous workload","volume":"6","author":"Chang","year":"2016","journal-title":"IEEE Trans. Cloud Comput."},{"key":"2023101421214588300_ref17","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1007\/s10723-018-9446-2","article-title":"Performability evaluation of a cloud-based disaster recovery solution for IT environments","volume":"17","author":"Andrade","year":"2019","journal-title":"J. Grid Comput."},{"key":"2023101421214588300_ref18","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/TCC.2017.2760836","article-title":"Hierarchical stochastic models for performance, availability, and power consumption analysis of IaaS clouds","volume":"7","author":"Ataie","year":"2017","journal-title":"IEEE Trans. Cloud Comput."},{"key":"2023101421214588300_ref19","doi-asserted-by":"crossref","first-page":"100054","DOI":"10.1016\/j.iot.2019.100054","article-title":"Modeling and evaluating a complex edge computing based systems: an emergency management support system case study","volume":"6","author":"d\u2019Oro","year":"2019","journal-title":"Internet Things"},{"key":"2023101421214588300_ref20","doi-asserted-by":"crossref","first-page":"5261","DOI":"10.1007\/s11227-017-2083-x","article-title":"Efficient and dynamic scaling of fog nodes for IoT devices","volume":"73","author":"Kafhali","year":"2017","journal-title":"J. Supercomput."},{"key":"2023101421214588300_ref21","doi-asserted-by":"crossref","first-page":"43564","DOI":"10.1109\/ACCESS.2019.2908223","article-title":"Optimal pricing and service selection in the mobile cloud architectures","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"2023101421214588300_ref22","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1007\/s10723-019-09476-0","article-title":"Performability evaluation and optimization of workflow applications in cloud environments","volume":"17","author":"Oliveira","year":"2019","journal-title":"J. Grid Comput."},{"key":"2023101421214588300_ref23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.peva.2016.10.005","article-title":"Modeling and performance analysis of cloudlet in mobile cloud computing","volume":"107","author":"Raei","year":"2017","journal-title":"Perform. Eval."},{"key":"2023101421214588300_ref24","first-page":"91","volume-title":"17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)","author":"Wang","year":"2016"},{"key":"2023101421214588300_ref25","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.jpdc.2017.08.001","article-title":"Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing","volume":"111","author":"Gai","year":"2018","journal-title":"J. Parallel Distributed Comput."},{"key":"2023101421214588300_ref26","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s12083-020-00968-5","article-title":"Performance analysis of heterogeneous cloud-edge services: a modeling approach","volume":"14","author":"Jiang","year":"2021","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"2023101421214588300_ref27","doi-asserted-by":"crossref","first-page":"1564","DOI":"10.1093\/comjnl\/bxaa062","article-title":"Model-based comparison of cloud-edge computing resource allocation policies","volume":"63","author":"Jiang","year":"2020","journal-title":"Comput. J."},{"key":"2023101421214588300_ref28","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/DSA.2017.26","volume-title":"International Conference on Dependable Systems and Their Applications (DSA)","author":"Liu","year":"2017"},{"key":"2023101421214588300_ref29","first-page":"346","volume-title":"IEEE International Conference on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA\/IUCC\/BDCloud\/SocialCom\/SustainCom)","author":"Yang","year":"2018"},{"key":"2023101421214588300_ref30","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1109\/TDSC.2018.2858786","article-title":"A risk management approach to defending against the advanced persistent threat","volume":"17","author":"Yang","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"2023101421214588300_ref31","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","article-title":"Survey on multi-access edge computing security and privacy","volume":"2","author":"Ranaweera","year":"2021","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"2023101421214588300_ref32","doi-asserted-by":"crossref","first-page":"102231","DOI":"10.1016\/j.peva.2021.102231","article-title":"Improving the mean-field fluid model of processor sharing queueing networks for dynamic performance models in cloud computing","volume":"151","author":"Ruuskanen","year":"2021","journal-title":"Perform. Eval."},{"key":"2023101421214588300_ref33","first-page":"1167","volume-title":"14th International Wireless Communications & Mobile Computing Conference (IWCMC)","author":"Minet","year":"2018"},{"key":"2023101421214588300_ref34","first-page":"1","article-title":"Performance modelling and quantitative analysis of vehicular edge computing with bursty task arrivals","author":"Miao","year":"2021","journal-title":"IEEE Trans. Mobile Comput"},{"key":"2023101421214588300_ref35","doi-asserted-by":"crossref","first-page":"12486","DOI":"10.1007\/s11227-021-03781-w","article-title":"Performance evaluation and optimization of a task offloading strategy on the mobile edge computing with edge heterogeneity","volume":"77","author":"Li","year":"2021","journal-title":"J. Supercomput"},{"key":"2023101421214588300_ref36","doi-asserted-by":"crossref","first-page":"3407","DOI":"10.1109\/TCOMM.2019.2895040","article-title":"Joint optimization of computational cost and devices energy for task offloading in multi-tier edge-clouds","volume":"67","author":"Haber","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"2023101421214588300_ref37","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s10723-018-9440-8","article-title":"A cost model for iaas clouds based on virtual machine energy consumption","volume":"16","author":"Hinz","year":"2018","journal-title":"J. Grid Comput."},{"key":"2023101421214588300_ref38","doi-asserted-by":"crossref","first-page":"3064","DOI":"10.1109\/TC.2015.2401021","article-title":"A profit maximization scheme with guaranteed quality of service in cloud computing","volume":"64","author":"Mei","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"2023101421214588300_ref39","doi-asserted-by":"crossref","first-page":"3864","DOI":"10.1109\/JIOT.2019.2892398","article-title":"Adaptive service offloading for revenue maximization in mobile edge computing with delay-constraint","volume":"6","author":"Samanta","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"2023101421214588300_ref40","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s10723-015-9358-3","article-title":"Energy efficient cloud service provisioning: keeping data center granularity in perspective","volume":"14","author":"Sharifi","year":"2016","journal-title":"J. Grid Comput."},{"key":"2023101421214588300_ref41","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/TIFS.2019.2924555","article-title":"Predictability of IP address allocations for cloud computing platforms","volume":"15","author":"Almohri","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2023101421214588300_ref42","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/TCC.2014.2306427","article-title":"Dynamic heterogeneity-aware resource provisioning in the cloud","volume":"2","author":"Zhang","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"2023101421214588300_ref43","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1109\/TSC.2013.44","article-title":"Stochastic model driven capacity planning for an infrastructure-as-a-service cloud","volume":"7","author":"Ghosh","year":"2013","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2023101421214588300_ref44"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/10\/2339\/52134826\/bxac081.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/comjnl\/article-pdf\/66\/10\/2339\/52134826\/bxac081.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T21:23:05Z","timestamp":1697318585000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/66\/10\/2339\/6627273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,2]]},"references-count":44,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,7,2]]},"published-print":{"date-parts":[[2023,10,15]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxac081","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2023,10]]},"published":{"date-parts":[[2022,7,2]]}}}