{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:40:18Z","timestamp":1764402018876},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The mobile devices connected to the fog environment are resource constrained and non-stationary. In such environments, offloading mobile user\u2019s computational task to nearby fog servers is necessary to satisfy the QoS requirements of time-critical IoT applications. Moreover, the fog servers are also susceptible to numerous attacks which induce security and privacy issues.Offloading computation task to a malicious fog node affects the integrity of users\u2019 data. Despite the fact that there are many integrity-preserving strategies for fog environments, the majority of them rely on a reliable central entity that might have a single point of failure. Blockchain is a promising strategy that maintains data integrity in a decentralized manner. The state-of-art blockchain offloading mechnanisms have not considered the mobility during secure offloading process. Besides, it is necessary to ensure QoS constraints of the IoT applications while considering mobility of user devices. Hence, in this paper, Blockchain assisted Mobility-aware Secure Computation Offloading (MSCO) mechanism is proposed to choose the best authorized fog servers for offloading task with minimal computational and energy cost. To address the optimization issue, a hybrid Genetic Algorithm based Particle Swarm Optimization technique is employed. Experimental results demonstrated the significant improvement of MSCO when compared to the existing approaches in terms of on average 11 % improvement of total cost which includes the parameters of latency and energy consumption.<\/jats:p>","DOI":"10.1186\/s13677-024-00599-8","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T04:01:44Z","timestamp":1712894504000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments"],"prefix":"10.1186","volume":"13","author":[{"given":"Veni","family":"Thangaraj","sequence":"first","affiliation":[]},{"given":"Thankaraja","family":"Raja Sree","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"issue":"4","key":"599_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A et al (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"599_CR2","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TETC.2015.2508382","volume":"5","author":"L Gu","year":"2015","unstructured":"Gu L et al (2015) Cost efficient resource management in fog computing supported medical cyber-physical system. IEEE Trans Emerg Top Comput 5(1):108\u2013119","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"599_CR3","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jss.2019.04.058","volume":"154","author":"SS Gill","year":"2019","unstructured":"Gill SS, Garraghan P, Buyya R (2019) ROUTER: fog enabled cloud based intelligent resource management approach for smart home IoT devices. J Syst Softw 154:125\u2013138","journal-title":"J Syst Softw"},{"issue":"4","key":"599_CR4","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s10723-020-09530-2","volume":"18","author":"A Shakarami","year":"2020","unstructured":"Shakarami A, Ghobaei-Arani M, Masdari M, Hosseinzadeh M (2020) A survey on the computation offloading approaches in mobile edge\/cloud computing environment: a stochastic-based perspective. J Grid Comput 18(4):639\u2013671","journal-title":"J Grid Comput"},{"issue":"4","key":"599_CR5","doi-asserted-by":"publisher","first-page":"3246","DOI":"10.1109\/JIOT.2018.2838022","volume":"5","author":"H Shah-Mansouri","year":"2018","unstructured":"Shah-Mansouri H, Wong VW (2018) Hierarchical fog-cloud computing for IoT systems: a computation offloading game. IEEE Internet Things J 5(4):3246\u20133257","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"599_CR6","doi-asserted-by":"publisher","first-page":"4977","DOI":"10.1109\/JIOT.2018.2838584","volume":"5","author":"H Guo","year":"2018","unstructured":"Guo H et al (2018) Mobile-edge computation offloading for ultradense IoT networks. IEEE Internet Things J 5(6):4977\u20134988","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"599_CR7","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/LCOMM.2014.2347272","volume":"18","author":"C Wang","year":"2014","unstructured":"Wang C, Li Y, Jin D (2014) Mobility-assisted opportunistic computation offloading. IEEE Commun Lett 18(10):1779\u20131782","journal-title":"IEEE Commun Lett"},{"key":"599_CR8","doi-asserted-by":"publisher","first-page":"21355","DOI":"10.1109\/ACCESS.2017.2748140","volume":"5","author":"X Meng","year":"2017","unstructured":"Meng X, Wang W, Zhang Z (2017) Delay-constrained hybrid computation offloading with cloud and fog computing. IEEE Access 5:21355\u201321367","journal-title":"IEEE Access"},{"key":"599_CR9","doi-asserted-by":"crossref","unstructured":"Chang Z, Zhou Z, Ristaniemi T, Niu Z (2017) Energy efficient optimization for computation offloading in fog computing system. In: GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, p 1-6","DOI":"10.1109\/GLOCOM.2017.8254207"},{"issue":"4","key":"599_CR10","doi-asserted-by":"publisher","first-page":"3192","DOI":"10.1109\/TNSE.2021.3106956","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2021) Secure computation offloading in blockchain based IoT networks with deep reinforcement learning. IEEE Trans Netw Sci Eng 8(4):3192\u2013208","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"6","key":"599_CR11","doi-asserted-by":"publisher","first-page":"4187","DOI":"10.1109\/TII.2019.2936869","volume":"16","author":"X Xu","year":"2019","unstructured":"Xu X, Zhang X, Gao H, Xue Y, Qi L, Dou W (2019) BeCome: blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Trans Ind Inform 16(6):4187\u20134195","journal-title":"IEEE Trans Ind Inform"},{"issue":"8","key":"599_CR12","doi-asserted-by":"publisher","first-page":"10854","DOI":"10.1007\/s11227-021-04254-w","volume":"78","author":"N Sarrafzade","year":"2022","unstructured":"Sarrafzade N, Entezari-Maleki R, Sousa L (2022) A genetic-based approach for service placement in fog computing. J Supercomput 78(8):10854\u201310875","journal-title":"J Supercomput"},{"key":"599_CR13","doi-asserted-by":"crossref","unstructured":"Guo N, Zhao C, Gao T (2020) An anonymous authentication scheme for edge computing-based carhome connectivity services in vehicular networks. Futur Gener Comput Syst 106:659\u2013671","DOI":"10.1016\/j.future.2020.01.028"},{"key":"599_CR14","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2018.11.021","volume":"149","author":"A Gupta","year":"2019","unstructured":"Gupta A, Tripathi M, Shaikh TJ, Sharma A (2019) A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw 149:29\u201342","journal-title":"Comput Netw"},{"issue":"5","key":"599_CR15","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/TMC.2017.2748133","volume":"17","author":"D Chatzopoulos","year":"2017","unstructured":"Chatzopoulos D, Ahmadi M, Kosta S, Hui P (2017) Flopcoin: a cryptocurrency for computation offloading. IEEE Trans Mob Comput 17(5):1062\u20131075","journal-title":"IEEE Trans Mob Comput"},{"key":"599_CR16","doi-asserted-by":"crossref","unstructured":"Luong NC, et al. (2018) Optimal auction for edge computing resource management in mobile blockchain networks: a deep learning approach. In: 2018 IEEE International Conference on Communications (ICC). IEEE","DOI":"10.1109\/ICC.2018.8422743"},{"key":"599_CR17","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.comcom.2020.10.007","volume":"164","author":"W Dou","year":"2020","unstructured":"Dou W, Tang W, Liu B, Xu X, Ni Q (2020) Blockchain-based Mobility-aware Offloading mechanism for Fog computing services. Comput Commun 164:261\u2013273","journal-title":"Comput Commun"},{"issue":"6","key":"599_CR18","doi-asserted-by":"publisher","first-page":"4310","DOI":"10.1109\/TNSE.2022.3198114","volume":"9","author":"A Mukherjee","year":"2022","unstructured":"Mukherjee A et al (2022) Mcg: mobility-aware computation offloading in edge using weighted majority game. IEEE Trans Netw Sci Eng 9(6):4310\u20134321","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"599_CR19","doi-asserted-by":"crossref","unstructured":"Xiong Z, Feng S, Niyato D, Wang P, Han Z (2017) Edge computing resource management and pricing for mobile blockchain. arXiv preprint arXiv:1710.01567","DOI":"10.1109\/ICC.2018.8422517"},{"issue":"4","key":"599_CR20","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/JIOT.2020.3033521","volume":"8","author":"H Wu","year":"2020","unstructured":"Wu H et al (2020) EEDTO: an energy-efficient dynamic task offloading algorithm for blockchain-enabled IoT-edge-cloud orchestrated computing. IEEE Internet Things J 8(4):2163\u20132176","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"599_CR21","doi-asserted-by":"publisher","first-page":"11049","DOI":"10.1109\/TVT.2018.2868013","volume":"67","author":"F Sun","year":"2018","unstructured":"Sun F et al (2018) Cooperative task scheduling for computation offloading in vehicular cloud. IEEE Trans Veh Technol 67(11):11049\u201311061","journal-title":"IEEE Trans Veh Technol"},{"key":"599_CR22","doi-asserted-by":"crossref","unstructured":"Al-Shatri H, M\u00fcller S, Klein A (2016) Distributed algorithm for energy efficient multi-hop computation offloading. In: 2016 IEEE International Conference on Communications (ICC). IEEE, p 1-6","DOI":"10.1109\/ICC.2016.7510809"},{"issue":"2014","key":"599_CR23","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj Yellow Pap 151(2014):1\u201332","journal-title":"Ethereum Proj Yellow Pap"},{"issue":"2","key":"599_CR24","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1007\/s11277-023-10310-w","volume":"130","author":"KM Matrouk","year":"2023","unstructured":"Matrouk KM, Matrouk AD (2023) Mobility Aware-Task Scheduling and Virtual Fog for Offloading in IoT-Fog-Cloud Environment. Wirel Pers Commun 130(2):801\u2013836","journal-title":"Wirel Pers Commun"},{"key":"599_CR25","doi-asserted-by":"publisher","first-page":"102974","DOI":"10.1016\/j.jnca.2021.102974","volume":"178","author":"A Shakarami","year":"2021","unstructured":"Shakarami A, Shahidinejad A, Ghobaei-Arani M (2021) An autonomous computation offloading strategy in Mobile Edge Computing: a deep learning-based hybrid approach. J Netw Comput Appl 178:102974","journal-title":"J Netw Comput Appl"},{"issue":"7","key":"599_CR26","doi-asserted-by":"publisher","first-page":"4212","DOI":"10.1109\/TITS.2021.3056461","volume":"22","author":"A Lakhan","year":"2021","unstructured":"Lakhan A et al (2021) Mobility aware blockchain enabled offloading and scheduling in vehicular fog cloud computing. IEEE Trans Intell Transp Syst 22(7):4212\u20134223","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"7","key":"599_CR27","doi-asserted-by":"publisher","first-page":"5773","DOI":"10.1109\/JIOT.2019.2946426","volume":"7","author":"M Adhikari","year":"2019","unstructured":"Adhikari M, Mukherjee M, Srirama SN (2019) DPTO: a deadline and priority-aware task offloading in fog computing framework leveraging multilevel feedback queueing. IEEE Internet Things J 7(7):5773\u20135782","journal-title":"IEEE Internet Things J"},{"key":"599_CR28","doi-asserted-by":"publisher","first-page":"107348","DOI":"10.1016\/j.comnet.2020.107348","volume":"179","author":"RM Abdelmoneem","year":"2020","unstructured":"Abdelmoneem RM, Benslimane A, Shaaban E (2020) Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures. Comput Netw 179:107348","journal-title":"Comput Netw"},{"issue":"4","key":"599_CR29","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1109\/TMC.2018.2847337","volume":"18","author":"J Zheng","year":"2018","unstructured":"Zheng J, Cai Y, Wu Y, Shen X (2018) Dynamic computation offloading for mobile cloud computing: a stochastic game-theoretic approach. IEEE Trans Mob Comput 18(4):771\u2013786","journal-title":"IEEE Trans Mob Comput"},{"key":"599_CR30","doi-asserted-by":"crossref","unstructured":"Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE international congress on big data (BigData congress). IEEE, p 557\u2013564","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"599_CR31","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-030-03596-9_15","volume-title":"InInternational Conference on Service-Oriented Computing","author":"P Lai","year":"2018","unstructured":"Lai P, He Q, Abdelrazek M, Chen F, Hosking J, Grundy J, Yang Y (2018) Optimal edge user allocation in edge computing with variable sized vector bin packing. InInternational Conference on Service-Oriented Computing. Springer, Cham, pp 230\u2013245"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00599-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00599-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00599-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T04:03:39Z","timestamp":1712894619000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00599-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["599"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00599-8","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"27 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors were voluntarily involved in this study to know more about the recent research related to anonymity.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors ensure that the publisher has the author\u2019s permission to publish this research article.<b>Informed consent<\/b>Author have the consent to publish the paper in this journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"88"}}