Next Article in Journal
Multi-Objective Region Encryption Algorithm Based on Adaptive Mechanism
Previous Article in Journal
Efficient Adversarial Attack Based on Moment Estimation and Lookahead Gradient
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm

1
Electronic Science and Technology, Beijing University of Technology, Beijing 100124, China
2
Information and Communication Engineering, Beijing University of Technology, Beijing 100124, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(13), 2462; https://doi.org/10.3390/electronics13132462
Submission received: 18 March 2024 / Revised: 9 June 2024 / Accepted: 12 June 2024 / Published: 24 June 2024

Abstract

:
Today, with the presence of 5G communication systems, including Internet of Things (IoT) technology, there is a high demand for mobile devices (especially smartphones, tablets, wearable technology, and so on). Regarding this proliferation and high demand, the massive adoption of mobile devices (MDs) has led to an exponential increase in network latency; the heavy demand for cloud servers causes the degradation of data traffic, which considerably impacts the real-time communication and computing aspects of mobile devices. As a result, mobile edge computing (MEC), an efficient framework capable of enhancing processing, optimizing energy usage, and offloading computation tasks, is considered a promising solution. In current research, numerous models have been implemented to achieve resource allocation and task offloading. However, these techniques are ineffective due to privacy issues and a lack of sufficient resources. Hence, this study proposes secure task offloading and resource allocation strategies in mobile devices using the Probit Mish–Gated Recurrent Unit (PM-GRU) and Entropic Linear Interpolation-Serval Optimization Algorithm (ELI-SOA). Primarily, the tasks to be offloaded and their attributes are gathered from mobile users and passed to a local computing model to identify the edge server. Here, the task attributes and the server attributes are compared with a cache table using the Sorensen–Dice coefficient. If the attributes match, then details about the appropriate edge server are produced. If the attributes do not match, then they are inputted into a global scheme that analyzes the attributes and predicts the edge server based on the Probit Mish-Gated Recurrent Unit (PM-GRU). Then, the server information is preserved and updated in the cache table in the local scheme. Further, the attributes, along with the predicted edge server, are inputted into a system for privacy-preserving smart contract creation by using Exponential Earth Mover’s Distance Matrix-Based K-Anonymity (EEMDM-KA) to develop a secure smart contract. Subsequently, the traffic attributes in the smart contract are extracted, and the request load is balanced by using HCD-KM. Load-balanced requests are assigned to the edge server, and the optimal resources are allocated in the cloud server by using the Entropic Linear Interpolation-Serval Optimization Algorithm (ELI-SOA). Finally, the created smart contract is hashed based on KECCAK-512 and stored in the blockchain. With a high accuracy of 99.84%, the evaluation results showed that the proposed approach framework performed better than those used in previous efforts.

1. Introduction

The demand for smart gadgets, including smartphones, tablets, wearable technology, and intelligent sensors, is rising quickly around the world due to recent advancements stemming from the implementation of 5G communication and Internet of Things (IoT) technologies [1]. At this stage, the massive usage of mobile devices (MDs) leads to high network latency and data traffic, affecting real-time communication and computing processes [2]. Moreover, the large amount of mobile data produces heavy demand for cloud servers, which degrades systems’ consistency [3]. Hence, to enhance computation and optimize the energy consumption of mobile applications, an effective framework named mobile edge computing (MEC) was developed [4]. MEC makes it possible to offload computation tasks to nearby MEC servers, which help upgrade the resource allocation [5]. In numerous applications, such as IoT, Internet of Vehicles (IoV), and ultra-dense networks, MEC plays a significant role [6].
The architecture of MEC contains important layers, such as end devices, access networks, edge networks, and core infrastructure. These layers facilitate resource allocation and task offloading on mobile devices [7]. However, security and privacy issues represent an important problem that affects the reliability of the model. Due to this situation, the integration of secure and reliable task offloading and resource allocation is seen as an optimal solution [8]. Generally, authentication techniques such as the advanced encryption standard (AES), elliptic-curve cryptography (ECC), the digital signature algorithm (DSA), and the Rivest–Shamir–Adleman (RSA) algorithm are utilized to ensure secure task offloading and resource allocation processes [9]. Of these techniques, ECC is one of the most promising in the authentication process because it is more efficient and has high cryptographic strength, low computing power, and latency [10]. Numerous research works have presented task offloading and resource allocation in mobile applications. Figure 1 presents a diagram of MEC.
Previous studies based their approaches on ML techniques, such as the support vector machine (SVM), Markov model (MM), federated learning (FL), Q-learning, and decision tree (DT), to achieve effective task offloading and resource allocation in mobile devices [11]. These systems made significant contributions; however, they still present some inefficiency due to their high latency and battery power consumption. Therefore, effective DL approaches, such as deep neural networks (DNNs), deep reinforcement learning (DRL), and the deep deterministic policy gradient (DDPG) [12,13], were developed to improve the TO and RA processes in MEC. Furthermore, Lyapunov optimization, convex optimization, heuristic techniques, and game theory were also used to perform resource scheduling on mobile phones [14]. However, these models were not regularized well to optimize energy consumption, and they retained poor learning performance [15]. To overcome these downsides and upgrade the MEC network performance in mobile applications, our study proposes a combined Probit Mish–GRU model with the ELI–SOA to implement secure task offloading and resource allocation strategies.

1.1. Problem Statement

Some of the problems noticed in the existing works are as follows:
  • Most of the existing works performed task offloading and resource allocation by verifying the task features with the global scheme alone but failed to analyze the local computing features.
  • The existing works did not focus on the traffic attributes for load balancing. This resulted in more energy consumption.
  • The security of smart contracts was not ensured in the previous works, which lowered the trustworthiness of the networks.
  • System consistency is a major challenge for storing hashed information in the cloud computing environment.

1.2. Contributions

The proposed framework addresses several limitations in the existing mobile network systems by introducing innovative approaches. It focuses on hybrid models, such as cache- and content-based secure task offloading on edge and cloud servers, thus significantly enhancing model performance. This is achieved through the integration of an SD-based similarity evaluation with a cache table inside the local scheme and the introduction of a novel integrated Probit Mish (PM)–GRU working inside the global scheme for content-based task offloading, thereby improving the dynamic network performance. Moreover, energy-efficient resource allocation is improved using HCD-KM for load balancing, thus reducing communication and storage burdens. To tackle high computing latency and energy consumption at the edge server, the proposed design implements local and global schemes to enhance the edge server’s quality. Privacy and security concerns are addressed by incorporating EMD based on k-anonymization, ensuring privacy-preserving smart contract creation and enhancing the model’s trustworthiness. Additionally, blockchain is utilized to store hashed information, improving system consistency despite the consumption of computing resources during blockchain consensus.
The remainder of this article is organized as follows: in Section 2, we explore related models through a review of the recent literature. Similarly, Section 3 describes the mathematical derivation of the proposed framework, and Section 4 provides the experimental results and performance evaluations. Finally, Section 5 concludes the study, provides future enhancement strategies, and presents perspectives for future work.

2. Literature Review

Shahidinejad et al. [16] addressed the challenges of meeting user QoS requests, including improving the quality of user experience with the purpose of increasing performance within the mobile communication environment and optimizing the quality of task offloading. In order to investigate the challenge of integrating energy consumption with quality assurance in MEC and to meet the demand of mobile users for low-energy consumption and low latency, in [17], Tao et al. introduced an approach to minimizing energy consumption in MEC. In addition, they optimized and solved the issue using the Karush–Kuhn–Tucker approach. Based on the results of numerical simulations, this approach outperformed complete offloading and local computing in terms of delay performance and energy consumption. Wang et al. [18] proposed an MEC integrated into a framework for MSP performance trade-offs and used the Lyapunov algorithm to optimize the framework. The simulation performance showed important improvements where mobile service provision reached an expected maximum level with the promise of guaranteeing system stability and minimizing energy consumption. In [19], Von et al. introduced an integrated framework to improve computational performance after evaluating the costs of local and distant computing. Additionally, an expanded examination of metrics for computational offloading in MEC was carried out, and task offloading optimization approaches based on several AI approaches were compared in multiple dimensions. Zhang et al. [20] examined multiple task-aware unmanned aerial vehicle (UAV)-enabled MEC networks using RA- and DRL-based trajectory planning. Here, the multi-agent DDPG technique was employed to design trajectories. Similarly, the Particle Swarm Optimization (PSO) algorithm was used to carry out the RA procedure. This model had a completion time of 10 ms, which showed the high feasibility and supremacy of the system. However, it could design poor trajectories due to the massive spaces between ground devices. On the other hand, in [21], Baidas showed a successful RA in MEC networks with clustered non-orthogonal multi-access (NOMA) functioning enabled. Techniques such as successive convex approximation, K-means (KM), and stable marriage matching (SMM) were utilized to achieve RA while maximizing the offloading efficiency. The model had a high potential to handle multiple sub-carriers and mitigate the transmission delay. Still, it retained a high energy consumption (EC) value due to its large bandwidth. In the same manner, in [22], Kuang et al. first explored a model using cooperative computation offloading and RA to reduce the transmission delay in MEC. The purpose of this study was to minimize the frequency of CPU cycles and the transmission power. A monotonic optimization method was established to minimize the transmission power. Second, the Sheng Jin formula (SJF) was incorporated to reduce the CPU cycle frequency. Similarly, to minimize latency and upgrade the RA, a combined iterative approach based on Lagrangian dual decomposition was employed. However, this system did not consider all of the EC factors in CS. Conversely, in [23], Liao et al. presented a joint offloading decision and RA for MEC-enabled networks. Initially, graph theory was employed to recognize the bandwidth of the network. Finally, to generate a nearly optimal solution with the lowest possible cost in MD, a low-complexity heuristic algorithm was devised. This system attained a total of 75 offloaded tasks and achieved better offloading efficiency. However, it had a high computational complexity due to the increased network capacity.
In [24], Pereira et al. incorporated a framework named the RELIABLE resource allocation scheme for 5G mobile networks using MEC. This system employed the RELIABLE mechanism to handle resource management challenges. The performance of the RELIABLE scheme was great when dealing with the 5G network. This method took service time, mobility prediction, and bandwidth into account when allocating resources in the 5G network. However, it took considerable processing time, which mainly limited the model’s consistency. In the same way, in [25], Tong et al. used an adaptive computation offloading and RA technique based on DRL in an MEC environment. First, the Poisson distribution technique was used to generate tasks; secondly, the DRL technique was used to perform effective offloading and RA in MD. This technique finally helped reduce the response time and EC, but it had memory requirements that affected the MEC network performance.
In [26], Ning et al. incorporated an intelligent RA scheme into mobile blockchain to achieve secure transactions using DRL. This framework consisted of the integration of a mobile blockchain module (MBM), task offloading module (TOM), and decision-making modules (DMMs). In the MBM, all of the MDs were constructed in a blockchain network. In the TOM, the task mining of the MD with nearby MEC servers was carried out. Finally, the DMMs made a decision about RA in MEC using the fused DDPG and PSO approaches. This model attained high stability and a better convergence rate. However, it could reach false positives due to the random selection process of the training samples. Conversely, in [27], Yu et al. developed a DL-based TO and RA strategy in an MEC framework. A dueling deep Q-learning network (DQN) was established to monitor the TO and handle resource management. The EC and completion time obtained with this approach were, respectively, 52.18% and 34.72%. Thus, the results of the analysis showed that the model helped mitigate the EC and completion time. However, this method failed because it lacked a useful objective function.
In [28], Xue et al. showed a mobile network identity management and authentication system based on blockchain technology. In this case, user authentication was ensured using the public key and self-sovereign identities (SSIs) under blockchain monitoring. Similarly, a chameleon hash algorithm was established to record unauthorized users. The model was generalized well to reduce network delay and storage space. However, this technique took too much time to complete the validation process. In the same context, in [29], Li et al. created a federated-reinforcement-learning-based workload offloading method in MEC. This framework encompassed the local scheme and the system scheme. Initially, the local scheme was trained using a double DQN (DDQN). Likewise, the global scheme was trained based on historical information. This technique achieved task offloading on the edge server and resource allocation on the cloud server based on federated learning. This system had low latency and superior performance. However, it needed a large number of resources, which could affect the accuracy of the system.
Based on the above analysis, we compared the research contributions, some of which are summarized in Table 1, and we found that some of the recent contributions did not provide enough attention, leaving two main weaknesses in the existing literature. The first is an important lack of study of the real-life impact on the IoT environment. Secondly, the situation of the real-time communication and computing aspects of mobile devices was not adequately developed or even mentioned in these studies. There were no contributions demonstrating effective work concerning the performance of offloading on nearby edge servers that allocate suitable resources to virtual machines on cloud servers.

3. Secure Task Offloading with PM-GRU and ELI-SOA

In this study, secure task offloading and resource allocation strategies in mobile devices using Probit Mish combined with a GRU and ELI-SOA are proposed. The proposed system effectively offloads tasks to a nearby edge server and successfully allocates suitable resources to virtual machines in a cloud server. The safety and privacy of users’ sensitive information are a focus of the proposed framework. In Figure 2, the suggested architecture’s design is displayed.
Figure 1 illustrates the reliable task offloading and effective resource allocation inside the MEC network system. This model includes a local scheme, global scheme, load-balancing model, resource allocation scheme, blockchain, smart contract creation, and task offloading model.
(1)
The local scheme: The local scheme, which is primarily linked to mobile users’ data and is used to control all tasks and manage data coming from offloaded tasks, is a sub-part of the integral MEC system framework. It is also in charge of making updates to data when attributes match, and then details about the appropriate edge server are produced. If the attributes do not match, they are inputted into the server scheme, which predicts the edge server based on the Probit model and GRU.
(2)
The global scheme: A physical location that is close to the systems of mobile devices (apps) managing extracted information coming from a dataset and from the EEMDM-KA program is designated in our approach as the location for edge server prediction; this server is led by the proposed PM-GRU as the global scheme, and it manages datasets and feature extraction.
(3)
The load-balancing model: Defined as HCD-KM, this technique represents a method of proportionally distributing network traffic across a whole MEC system; most information, such as text, videos, images, and other data, is processed inside this component to allow mobile users to interchange information properly and efficiently. Its information passes through the local scheme, and EEMDM-KA passes through the program for traffic attribute extraction to arrive at the load-balancing scheme and, finally, be sent to the cloud server.
(4)
The resource allocation scheme: Resource allocation, which is the process of assigning and managing HCD-KM, delivers better ELI-SOA assets by providing complete cloud service in a manner that provides reliable profitability to the blockchain for KECCAK 512. This system includes managing tangible assets, such as hardware, to make the best use of softer assets, such as human capital.
(5)
The blockchain: The blockchain framework manages all processing to avoid any leakages of MEC data from the edge server while delivering secure and reliable task offloading.
(6)
Smart contact creation: Smart contracts are created and hashed based on the Keccak 512-bit Hash Generator. This system is adopted to automate the execution of any agreement so that all users can be promptly certain of the outcome without any intermediary’s involvement or loss of time.
(7)
Task offloading model: This model’s main role consists of transferring all resource-intensive computational tasks to other connected systems.
The mathematical derivation and a detailed explanation of the individual phases are presented in the following.

3.1. Mobile Cloud Resource Allocation

First, numerous mobile users send a request to access cloud resources. Second, a user request undergoes further processing before resource allocation. Finally, the mobile users M p Θ are initialized as
M p Θ M 1 Θ , M 2 Θ , M P Θ ,   p = 1 , 2 , P
where P denotes the number of mobile users. Here, the crucial attributes of the mobile users are established to implement further computation. This is described in the following.
In this phase, the tasks to be offloaded (Th) and their attributes are extracted from mobile users. The offloading of tasks refers to the transfer of data from user devices to another external device. Here, the attributes, such as the number of dimensions, speed, cost, weight, and data size, are extracted. This can be formulated as follows:
T h = T 1 , T 2 , T H
α b T h α 1 , α 2 , α 3 , α B ,   b = 1 , , B
where h = 1 , 2 , H indicates the total of T h , and B defines the maximum number of extracted attributes. Finally, T h and α b are given to a local computing system for edge server prediction.
In this LS, T h and α b are subjected to an evaluation of their similarity with a cache table. For this purpose, the Sorensen–Dice formula (SD) is used. It compares the attributes with the cache information to select a suitable edge server. This process can be described as follows:
S c = 2 T h + α b δ f T h + α b + δ f
S S c = = δ f , m d Φ e l s e , n t Ω
where S denotes the similarity evaluation, c indicates the cache table, δ f represents the historical attributes stored in c , and m d Φ and n t Ω define the matched and unmatched outcomes, respectively.
If the attributes are matched, then the LS l provides the relevant edge server ζ y according to the tasks to be offloaded. Then, the attributes are inputted into the privacy-preserving smart contract creation model and updated in the cache table. This is represented as follows:
l = m d Φ ζ y ,   y = 1 , 2 , Y
where Y represents the number of edge servers.
Thus, the LS proficiently provides a suitable edge server for the task attributes. On the other hand, if the attributes are not matched, they are handled by the global scheme. The entire scheme evaluates the attributes and predicts a suitable edge server while preserving the information. Further, they are used to create smart contracts, which are then updated in the cache table. The significance of the global scheme is described in the following.
Here, n t Ω is the input for the global scheme, which is trained with historical information of tasks to be offloaded. The global scheme analyzes the attributes and provides the optimal edge server. The methods involved in the global scheme are described in the following.
Initially, past data are gathered from the publicly available resources and utilized to train the global scheme. The collected data d e are represented as follows:
d e = d 1 , d 2 , d E ,   e = 1 , 2 , E
where E represents the total amount of collected data holding historical information about the tasks to be offloaded.
After data collection, the significant features, such as CPU cores, CPU capacity, CPU usage, memory usage, and received throughput of the network, are extracted from d e . Thus, the extracted features χ r are denoted as follows:
χ r = χ 1 , χ 2 , χ R
where r = 1 t o R indicates the number of features extracted from d e .
In this phase, χ r undergoes the process of ES prediction based on the Probit Mish–GRU. A traditional GRU was selected due to its high flexibility with sequence data and because it requires less memory. However, it has a poor learning efficiency and convergence rate. To overcome these drawbacks, our proposed approach incorporates the Probit Mish activation function to optimize the convergence rate and improve the learning process. Figure 3 displays the block design of the proposed Probit Mish–Gated Recurrent Unit (PM-GRU).
The working process of the proposed Probit Mish–GRU is discussed in the following.
  • Input: Here, the extracted features are considered as the input. χ r indicates the inputs in the present time frame, and h i d u 1 indicates the input from the previous hidden state. The inputs proceed to flow via the gates.
  • Probit Mish Activation Function: The Probit Mish activation function (PMAF) is employed to improve the learning process and convergence rate. This is formulated as follows:
s i g χ r = 2 e χ r 2 ϖ r 1
where s i g denotes the Probit Mish activation function, and e denotes the Euler number.
  • Reset Gate: This gate should decide how much irrelevant information needs to be eradicated from the gates. The reset gate is determined as follows:
= s i g ϖ r h i d u 1 , χ r
where ϖ r represents the weight value of .
  • Update Gate: The update gate decides how much crucial information needs to be allowed through the gates for further computation. The update gate can be written in a mathematical form as follows:
s i g ϖ u × h i d u 1 , χ r
where ϖ u signifies the weight parameter of .
  • Candidate Hidden State: This gate considers the reset gate and determines what relevant information needs to be stored. This is formulated as follows:
h i d u = tanh ϖ c h h i d u 1 , χ r
tanh χ r = sin χ r cos χ r
where h i d u denotes the candidate hidden state, ϖ c h indicates the weight value of h i d u , and tanh represents the tangent activation function.
  • Hidden State: Finally, the hidden state makes a decision about what information needs to be passed through the network as an outcome, and it is defined as follows:
h i d u = tanh 1 × h i d u 1 + h i d u
where h i d u indicates the present hidden state. Finally, the global scheme g Ξ predicts the appropriate ES. This can be expressed as follows:
g Ξ h i d u = n t Ω ζ y
The pseudo-code for the Probit Mish–GRU is given in the Algorithm 1.
Algorithm 1 pseudo-code for the Probit Mish–GRU.
Input: Extracted features χ r
Output: Edge Server Prediction ζ y
Begin:
    Initialize h i d u 1 , tanh , h i d u , , , iteration i r , and maximum iteration i r max
    Set i r = 1
    While i r i r max
        For 1 to R number of χ r
            Perform reset gate
                = s i g ϖ r h i d u 1 , χ r
            Apply Probit Mish activation function
                s i g χ r = 2 e χ r 2 ϖ r 1
            Implement update gate  s i g ϖ u × h i d u 1 , χ r
            Calculate  h i d u = tanh ϖ c h h i d u 1 , χ r
            Execute hidden state:  h i d u = tanh 1 × h i d u 1 + h i d u
        End For
    End While
Return  g Ξ h i d u = n t Ω ζ y
End

3.2. Secure Resource Allocation in MEC

In this stage, the outcomes from the local scheme and global scheme are preserved in a secure manner, and they are utilized to create a smart contract. This smart contract represents a protocol that executes programmed contracts or agreements when they are made. Then, the created smart contract is stored as the c function. In the proposed framework, the Exponential Earth Mover’s distance-matrix-based K-Anonymity (EEMDM-KA) algorithm is used to perform privacy-preserving smart contract creation. The existing KA algorithm is employed due to its advantageous nature, which is characterized by its better security and greater efficiency in preserving the sensitive information of users if the system fails when addressing the nature of a region, which leads to poor consistency. Hence, the proposed approach uses the exponential EMD to consider the region’s nature, which improves the system’s performance. The steps involved in the EEMDM-KA algorithm are described in the following.
Sensitive data identification: In this phase, sensitive data w s e n and non-sensitive q n o n data are identified by using the EEMDM-KA method. The EEMDM-KA algorithm is used to ensure the nature of the attributes, and it is represented as follows:
L ω = l g Ξ exp j w s e n , q n o n
where L w represents the distance parameter, and j denotes the domain of the attributes.
Suppression: Here, several attributes of a user’s sensitive information are preserved by replacing the asterisk “*” to ensure reliable communication.
ϕ s p r = w s e n r e p l a c e
Generalization: In the context of generalization, certain attributes of the sensitive information are represented in a particular range category. This is formulated as follows:
φ g e n = w s e n a 1 < a t t b 1
where ϕ s p r and φ g e n denote the processes of suppression and generalization. a t t represents the attributes, and a 1 and b indicate random values used to set the boundaries.
Smart Contract Creation: The preserved information is used to create a smart contract ƛ x s n and is further updated in the cache table; this value is defined as
ƛ x s n = ϕ s p r , φ g e n + c ƛ 1 s n , ƛ 2 s n , ƛ X s n
where x = 1 , 2 , X indicates the number of smart contracts created.
Subsequently, the traffic attributes, such as the number of requests, network bandwidth, network latency, uplink, and downlink, are extracted from the mobile users. Then, the extracted traffic attributes λ t can be represented in mathematical form as
λ t λ 1 , λ 2 , λ T
where t = 1 t o T represents the value of λ t . Here, λ t is inputted to perform load balancing by using the Hamming Curtis Dot K-Means (HCM-KM) technique. The process of load balancing helps to mitigate the delay and burden, thus resulting in high efficiency. In our proposed approach, the conventional K-Means (KM) technique is introduced to balance the user requests. The KM technique can be outperformed when it deals with large data resources. However, the Euclidean distance does not consider prior information, which limits the clustering outcomes. Therefore, the proposed approach employs the HCM algorithm to estimate the distance value, which leads to accurate clustering results. Then, the HCM-KM algorithm can be mathematically described as follows:
  • Step 1: The number of clusters κ f is specified; then, the centroid point c ψ is randomly initialized by using Equation (21):
κ f = λ t r a n d o m c ψ
where f = 1 t o F denotes the total number of clusters to be formed.
  • Step 2: During the next part of the derivation, the value of the distance between λ t and c ψ is estimated by using the HCM technique. The HCM technique is used to effectively calculate the distance among the data points. The data points are then assigned to the cluster that has the nearest distance value. This can be expressed as follows:
η d i s = t = 1 T λ t c ψ λ t + c ψ
κ f a s s i g n min η d i s λ t
  • Step 3: Finally, the centroid point is recalculated, and the clustering process is repeated until it converges. Thus, the load-balanced requests ρ j υ are given as follows:
ρ j υ = ρ 1 υ , ρ 2 υ , ρ J υ ,   j = 1 , 2 , J
where J denotes the number of load-balanced requests.
In this stage, ρ j υ is assigned to the next edge server, and the cloud server’s virtual machines are then assigned to the best resources by that edge server. Here, resource allocation is performed by considering the task features and the cloud features. In our approach, the ELI-SOA technique is adopted to perform resource allocation. The traditional SOA was chosen due to its dynamic hunting strategy and its good ability to provide appropriate solutions. However, the position of the SOA is randomly replaced with the observation of the degradation of the search process. Therefore, the proposed approach incorporates the ELPI technique to update the SOA’s position, which enhances the optimization performance. The enhanced-searching-based SOA process is discussed in the following.
  • Input features: Here, the task features and cloud features are chosen to perform RA. The task features, such as the number of dimensions, speed, cost, weight, and data size, are extracted. Then, cloud features, such as size, RAM, bandwidth, length, file size, storage, and VM, are also taken into account to allocate the optimal resources. The G -many extracted features β g are initialized as follows:
β g = β 1 , β 2 , β G ,   g = 1 t o G
  • Population Initialization: First, the population of the SOA is initialized in the search space. Here, β g is assumed to be the serval. This is structured in the form of a matrix as follows:
N = N 1 N g N G G × v i n i t i a l i z e β 1 , 1 β 1 , k β 1 , v β g , 1 β g , k β g , v β G , 1 β G , k β G , v G × v
β g , k = l w k + r n d g , k u p k l w k
where N denotes the population matrix of the serval’s location, k = 1 t o v represents the number of decision variables, l w k and u p k are, respectively, the values of the lower and upper bounds of the decision variable, and r n d is a random parameter that holds a value between 0 and 1.
  • Fitness Function: In this step, the fitness value of β g , k is derived by considering the minimum response time r s t m . This can be estimated by using Equation (28):
τ f i t = min r s t m τ f i t 1 τ f i t g τ f i t G G × 1 = τ f i t N 1 τ f i t N g τ f i t N G G × 1
c a n N B e s t τ f i t
where τ f i t depicts the vector of the fitness function, and τ f i t g demonstrates the estimated fitness function value (FFV) of the g t h serval. Then, the best candidate solution c a n N is defined according to the best FFV and B e s t τ f i t between the estimated FFVs. Moreover, the location of the serval, FFV, and the best candidate can be updated in the following iteration of the SOA.
  • Exploration Phase (prey selection and attack): In this phase, an exploration is carried out according to strategies followed by the serval to perform prey selection and attack. The exploration stage can be briefly described as follows:
β g , k s g e 1 β g , k + r n d g , k y k p o s o g , k β g , k
N g = i f τ f i t g s g e 1 < τ f i t g , β g , k s g e 1 e l s e , N g
where β g , k s g e 1 denotes the new position of the serval in the first stage, y k p o s expresses the prey’s location, o g , k indicates values that are randomly selected from the set {1, 2}, and τ f i t g s g e 1 denotes the updated FFV of the serval in the first stage.
  • Exploitation Phase (chasing process): After the process of attacking the prey, the exploitation phase takes place based on the chasing strategy of the serval. Here, the entropic linear interpolation (ELI) method is used to update the serval’s position, and its value is defined as follows:
β g , k s g e 2 = β g , k + Σ P u p k l w k Σ P u p k l w k log u p k l w k
N g = i f τ f i t g s g e 2 < τ f i t g , β g , k s g e 2 e l s e , N g
where β g , k s g e 2 symbolizes the updated position of the serval in the second stage, Σ P u p k l w k Σ P u p k l w k log u p k l w k indicates the ELI factor, P denotes the probability factor, and τ f i t g s g e 2 represents the new FFV of the serval in the second stage.
The above derivations are repeated until the process converges. Finally, the optimal resources are allocated for each of the requests to the cloud server μ ϑ . The value of Q for the allocated resources γ q is denoted as follows:
γ q = γ 1 , γ 2 , γ Q ,   q = 1 , 2 , Q
μ ϑ a l l o c a t e M p Θ γ q
The pseudo-code for the ELI-SOA algorithm is presented in the Algorithm 2.
Algorithm 2 pseudo-code for the ELI-SOA algorithm.
Input: Extracted features ( β g )
Output: Allocated resources γ q
Begin:
    Initialize  N , τ f i t , β g , k s g e 1 , τ f i t g s g e 2 , iteration w , and maximum iteration w m x
    Set  w = 1
    While  w w m x
        For 1 to G of β g
         Initialize population in the search space
             β g , k = l w k + r n d g , k u p k l w k
         Estimate the FFV τ f i t
         Implement Exploration Phase
             β g , k s g e 1 β g , k + r n d g , k y k p o s o g , k β g , k
            If  τ f i t g s g e 1 < τ f i t g
               Update the serval’s position to β g , k s g e 1
            Else
               No need to update the serval’s position
            End If
         Perform Exploitation phase
             β g , k s g e 2 = β g , k + r n d g , k u p k l w k i t r
         Update FFV and serval position

        End For
    End While
Return  γ q
End
Finally, the created smart contract ƛ x s n is hashed by using the Keccak 512-bit Hash Generator and then stored in the blockchain. The hashing demonstrates the ability of KECCAK-512 to work against attacks. KECCAK-512 is referred to as a sponge function because its functioning is based on the construction of a sponge. Finally, the different phases and steps of the KECCAK-512 algorithm are detailed in the following.
Padding phase: First, the input ƛ x s n is padded by using a padding rule ε that gives the size of the output, which is multiplied by the bit rate b r t , and this is defined as follows:
ε = ƛ x s n × b r t
Block division: Second, the padded input is further divided into several blocks of length b r t . Then, each block is processed using an XOR operation with a bit rate. Moreover, the output is concatenated with the capacity c Π , which is written as follows:
a m = a 1 , a 2 , a M ,   m = 1 t o M
x o r = a m b r t X O R + c Π
where M denotes the number of divided blocks a m , and x o r represents the outcome of the XOR operation.
Absorbing phase: Here, x o r is inputted into the absorbing phase. In this phase, the function f η is applied, and the following steps are repeated for the number of rounds.
  • Theta Step:
  • For 0 v < 5 and 0 w < w d ,
    D v , w = q v , 0 , w q v , 1 , w q v , 2 , w q v , 3 , w q v , 4 , w
  • For 0 v < 5 and 0 w < w d ,
    E v , w = D v 1 mod 5 , w D v + 1 mod 5 , w 1 mod w d
  • For 0 v < 5 , 0 x < 5 , and 0 w < w d ,
    q 1 v , x , w = q v , x , w E v , w
Here, D and E represent the intermediate variables; q and q 1 denote the initial state and intermediate state, respectively; v , x , and w denote the axis points; and ƛ w d represents the width.
  • Rho Step:
  • For 0 w < ƛ w d ,
    F a r r 0 , 0 , w = q 1 0 , 0 , w
  • Assume that v , x = 1 , 0 .
  • For 0 k 23 and for 0 < w < ƛ w d ,
    F a r r v , x , w = q 1 v , x , w k + 1 k + 2 / 2 mod ƛ w d
    v , x x , 2 v + 3 x mod ƛ w d
  • Pi Step:
  • For 0 v < 5 , 0 x < 5 , and 0 w < ƛ w d ,
    F a r r v , x , w = F a r r v + 3 x mod 5 , v , w
  • Chi Step:
  • For 0 v < 5 , 0 x < 5 , and 0 w < ƛ w d ,
    q v , x , w = F a r r v , x , w { N O T F a r r v + 1 mod 5 , x , w A N D F a r r v + 2 mod 5 , x , w }
  • Iota Step:
  • For 0 w < ƛ w d ,
q 0 , 0 , 0 = q 0 , 0 , w r Ζ w
where F a r r represents the permutation state array, K denotes the bit position, and r z defines the round constant. Finally, the smart contract is hashed and defined as (ζhash). After the process, it is stored inside the blockchain, allowing the proposed approach to work proficiently and allocate resources in a secure manner by using the PM-GRU and ELI-SOA.

4. Results and Discussion

This section aims to evaluate our proposed framework’s performance using multiple quality indicators by contrasting it with various established methodologies. Furthermore, Python is used as the working platform for the implementation of the proposed system. Here, in order to demonstrate the superiority and prominence of the suggested work, a performance evaluation and comparative analysis are conducted.

4.1. Dataset Description

The proposed system was assessed by using two datasets, namely, the Heterogeneous Computing Scheduling Program (HCSP) [30] and Grid Workloads Archive (GWA-T-12-Bitbrains) [31] datasets, which are mentioned in the reference section. The HCSP dataset contains significant information about day-to-day tasks and contains data on users and servers. This dataset includes information about 1024 tasks and 32 machines. The collected data were used to acquire the task features and to train the system. Moreover, the GWA-T-12-Bitbrains dataset encompasses the performance metrics of the 1750 virtual machines that were used to train the global scheme. In this dataset, 41 scenarios were recorded by constantly monitoring the task offloading and resource allocation processes of the virtual machines. Each of the scenarios contained plentiful task information. Of all of the data, 80% of the information was employed to perform training, while the remaining data were used for testing.

4.2. Simulation and Analysis Parameters

To assess its performance, the proposed system was executed using the PYTHON 3.7 software, which emphasizes code readability and integrates systems efficiently. Moreover, the hardware, which included the Windows 10 operating system, an Intel i5/core i7 processor, a system with 64 bits with a 3.20 GHz central processing unit (CPU) speed, and random-access memory (RAM) with 4 GB of storage space, was utilized to simulate the proposed framework.

4.3. Performance Analysis

This section describes the validation of the performance of the proposed ELI-SOA to depict the model’s consistency [32]. We conducted a comparative analysis between our proposed ELI-SOA and the traditional SOA, COA, BOA, and WOA techniques in terms of various metrics [33]. The analysis of the proposed Entropic Linear Interpolation–Serval Optimization Algorithm is discussed in the following.
The performance of the proposed ELI-SOA and other existing models, such as SOA, COA, BOA, and WOA, is compared in Figure 4 based on their resource utilization (RU). The proposed ELI-SOA incorporated the entropic linear interpolation technique to update the serval’s position, which enhanced its optimization performance. The proposed ELI-SOA achieved an RU of 97.65% for 100 tasks, whereas the traditional methods achieved an RU of approximately 92.72% for 100 tasks. In Figure 3, it is absolutely clear that the proposed ELI-SOA had greater RU and more optimal results than those of the prevailing models.
Figure 5 compares the proposed ELI-SOA approach in terms of the EC, response time (RT), and waiting time (WT). The proposed ELI-SOA had better search capabilities and was more efficient in identifying the optimal resources within a limited period of time. As shown in Figure 5, the proposed ELI-SOA had EC, RT, and WT values of 6545 mj, 3867 ms, and 1769 ms, respectively, for 200 tasks. However, the existing methods achieved an average EC, RT, and WT of 14,951 mj, 5038 ms, and 3072 ms, respectively, for 200 tasks. Thus, the global results for the performance support that the proposed ELI-SOA achieved better EC and lower time complexity than those of the other traditional methods.
Here, the performance of the proposed PM-GRU scheme was validated to prove the reliability of the system. In this phase, we also compared the proposed PM-GRU with some traditional classifiers, such as the GRU, bidirectional long short-term memory (Bi-LSTM), long short-term memory (LSTM), and recurrent neural networks (RNNs).
We evaluated the performance of the proposed PM-GRU in comparison with other existing techniques, such as the GRU, Bi-LSTM, LSTM, and RNNs, according to their accuracy, precision, sensitivity, and specificity. The proposed PM-GRU incorporated the Probit Mish activation function, which helped improve its learning process and convergence rate. Figure 6 demonstrates that the proposed PM-GRU obtained better accuracy, precision, sensitivity, and specificity of 99.84%, 99.87%, 99.55%, and 99.16%, respectively. However, the existing methodologies achieved an average accuracy, precision, sensitivity, and specificity of 94.40%, 94.48%, 93.83%, and 94.67%, respectively. The experimental outcomes allowed the conclusion that the proposed PM-GRU outperformed the other traditional methods.
The next figure illustrates an evaluation of the true positive rate (TPR) and true negative rate (TNR) of the proposed PM-GRU and other existing methods, such as GRU, BiLSTM, LSTM, and RNNs. The proposed PM-GRU effectively predicted the edge server with fewer false positives due to the improved PMAF. Figure 7 shows that the proposed PM-GRU achieved a TPR and TNR of 99.52% and 99.48%, respectively. However, the other existing methodologies had poor performances in terms of the TPR and TNR values, with 94% and 94.68%, respectively. So, the proposed architecture had an impressive performance and was proven to be a less error-prone model [34,35].
The proposed HCD-KM was finally compared with some traditional clustering algorithms, such as KM, Partition around Medoids (PAM), Balanced Iterative Reducing and Clustering Using Hierarchies (BIRCH), and Fuzzy C-Means (FCM), to demonstrate the importance of the suggested model. This is explained in more detail in the Figure 8.
Table 2 compares the makespan of the suggested system with that of a few current models, including KM, PAM, BIRCH, and FCM. The proposed HCD-KM helped cluster the data based on priority, which definitely improved the computational efficiency. The proposed HCD-KM had a makespan of 2145 ms for 100 tasks. However, the traditional algorithms had a makespan of approximately 3646 ms for 100 tasks. By showing a comparison with the current methods, Table 2 clearly shows the high computational efficiency of the proposed system.
Then, the performance of the proposed EEMDM-KA and some existing methodologies, such as KA, L-Diversity, T-Closeness, and Randomization, was validated.
The proposed model was analyzed in terms of anonymization time (AT), as displayed in Figure 9. Here, the proposed EEMDM-KA was compared with traditional techniques, such as KA, L-Diversity, T-Closeness, and Randomization. The proposed EEMDM-KA was able to recognize sensitive information, and it was more effective in preserving user information. As shown in Figure 9, the proposed EMD based on k-Ano EEMDM-KA achieved an AT of 754 ms, whereas the other existing techniques had an AT of approximately 2011 ms. Thus, the evaluation outcomes showed that the proposed exponential EEMDM-KA had lower time complexity and more dominant performance than that of the existing techniques.
The following table compares the proposed EEMDM-KA with other techniques, such as KA, L-Diversity, T-Closeness, and Randomization, according to the privacy preservation rate (PPR). The proposed EEMDM-KA effectively preserved the users’ sensitive data by replacing them with an asterisk and defining them within a certain range category. As shown in Table 3, the proposed EEMDM-KA achieved a PPR of 97%, whereas the other traditional techniques had an average PPR of 88.5%. Thus, the proposed EEMDM-KA is more promising in privacy-preserving smart contract creation than the other conventional methods.
An analysis was carried out on the proposed system by comparing it with various related works using several quality metrics.
The results of the comparative analysis of the proposed framework are shown in Table 4. The data reveal the beneficial characteristics of the model. The proposed approach was compared with recent methods in the literature, such as those proposed by Wang et al. [36], Mahenge et al. [37], Elgendy et al. [38], Nguyen et al. [39], and Qi [40]. The proposed model used the PM-GRU and ELI-SOA to achieve task offloading and resource allocation in mobile applications. The proposed PMAF helped enhance the classification performance. Likewise, the proposed ELI-based position updating process led to optimal results. Similarly, the traditional systems utilized techniques such as the Difference of Convex Approximation (DCA), Particle Swarm Optimization (PSO), Gray Wolf Optimization (GWO), Multi-User Multi-Task Computing Offloading Algorithm (MU-MT-COA), DRL, and DNN to perform task offloading and resource allocation. As shown in Table 4, the proposed model had an accuracy, EC, RT, and RU of 99.84%, 3965 mj, 1865 ms, and 97.65%, respectively. However, the other existing methods had limited performance and high EC. Thus, the comparative analysis justified that the performance of the proposed framework was remarkably superior to that of the other traditional approaches.
This study assessed the proposed model in terms of various metrics while using two different datasets. Here, the dataset, namely, the Heterogeneous Computing Scheduling Program (HCSP), was used to obtain the task characteristics, which were shared between the user and server. Further, the Grid Workloads Archive (GWA-T-12-Bitbrains) dataset was used to train on the tasks obtained in the global scheme.

5. Conclusions and Future Work

5.1. Conclusions

In this study, a novel and promising approach to secure task offloading and resource allocation in mobile applications based on the Probit Mish–Gated Recurrent Unit (PM-GRU) and Entropic Linear Interpolation–Serval Optimization Algorithm is proposed. The proposed PM-GRU effectively enhances learning efficiency and classification performance. An effective Entropic Linear Interpolation–Serval Optimization Algorithm was proposed to allocate the optimal resources regarding the attributes of a task. This study developed the offloading of tasks with attributes by gathering them from mobile users and submitting them to local models, where the attributes were compared with a cache table using the Sørensen–Dice index (SDI) in two ways (when attributes matched and when they did not). Then, the information was preserved and updated in the cache table in the local scheme. Finally, an evaluation of this proposal was performed using multiple quality indicators by contrasting it with various established methodologies using smart contracts that were hashed based on the Keccak 512-bit Hash Generator and stored in the blockchain. This research also used the Heterogeneous Computing Scheduling Problem (HCSP) and Grid Workloads Archive (GWA-T-12-Bitbrains) datasets in a simulation of an implementation to contribute to the provision of datasets containing significant information about day-to-day tasks completed between the user and server. Up to 1024 tasks and 32 machines were incorporated into the program; these are essential data, especially for global server implementation.
The evaluation outcomes demonstrated that the proposed PM-GRU achieved a better accuracy, sensitivity, and specificity of 99.84%, 99.55%, and 99.16%, respectively, which proved the model’s supremacy. Likewise, the proposed Entropic Linear Interpolation–Serval Optimization Algorithm had an RU and EC of 97.65% and 3965 mj, respectively, which showed the consistency of the system. Then, the latency achieved by the proposed HCD-KM was 1875 ms, which depicted its better performance and lower time complexity. Moreover, the proposed EEMDM-KA obtained a high PPR of 97%, which justified the trustworthiness of the model. Ultimately, the comparative analysis and experimental findings demonstrated the superior efficacy and high significance of the suggested framework in relation to other widely used models. This approach is an essential contribution to the realization of these sorts of implementation scenarios, especially for scholars and institutions.
This work only concentrated on secure and reliable task offloading and resource allocation. However, it did not concentrate on edge server mobility, the mobility of terminal devices, or even the process of monitoring assigned tasks in a VM when a machine shuts down or some other issues arise.

Advantages and Drawbacks

As the cache information was updated in the cache table in the local computing system, the edge server was determined to be more appropriate for the task attributes. Further, the analysis of the task attributes aided in effective task offloading and load balancing. The preservation of smart contract privacy and load balancing prior to resource allocation provided optimal RA. Eventually, the created smart contracts were hashed using KECCAK-512 for storage in the blockchain to maximize the system’s efficiency. Even though secure task offloading and RA were the focus of this study, the tasks assigned in a VM if a machine disconnects or some other issues arise were not considered.

5.2. Future Work

In order to overcome the aforementioned limitation in the proposed framework, the assigned tasks in VMs will be monitored in future work. Hence, any machines that shut down and some other issues that arise in cloud environments can be identified to achieve enhanced task offloading and RA.

Author Contributions

Conceptualization, A.O.N.S.; Data curation, A.O.N.S.; Formal analysis, A.O.N.S.; Investigation, A.O.N.S.; Methodology, Q.L. and P.S.; Project administration, Q.L.; Supervision, P.S.; Validation, P.S.; Writing—original draft, A.O.N.S.; Writing—review and editing, Q.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The datasets presented in this article are not readily available because the data are part of an ongoing study. Requests to access the datasets should be directed to correspondence author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhu, X.; Zhou, M. Multiobjective Optimized Cloudlet Deployment and Task Offloading for Mobile-Edge Computing. IEEE Internet Things J. 2021, 8, 15582–15595. [Google Scholar] [CrossRef]
  2. Li, W.; Jin, S. Performance evaluation and optimization of a task offloading strategy on the mobile edge computing with edge heterogeneity. J. Supercomput. 2021, 77, 12486–12507. [Google Scholar] [CrossRef]
  3. Liao, J.X.; Wu, X.W. Resource Allocation and Task Scheduling Scheme in Priority-Based Hierarchical Edge Computing System. In Proceedings of the 2020 19th Distributed Computing and Applications for Business Engineering and Science, DCABES, Xuzhou, China, 16–19 October 2020; pp. 46–49. [Google Scholar] [CrossRef]
  4. Lin, B.; Lin, X.; Zhang, S.; Wang, H.; Bi, S. Computation task scheduling and offloading optimization for collaborative mobile edge computing. In Proceedings of the International Conference on Parallel and Distributed Systems-ICPADS, Hong Kong, China, 2–4 December 2020; pp. 728–734. [Google Scholar] [CrossRef]
  5. Xu, J.; Liu, X.; Zhu, X. Deep Reinforcement Learning Based Computing Offloading and Resource Allocation Algorithm for Mobile Edge Networks. In Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications, ICCC, Chengdu, China, 11–14 December 2020; pp. 1542–1547. [Google Scholar] [CrossRef]
  6. Xue, J.; An, Y. Joint Task Offloading and Resource Allocation for Multi-Task Multi-Server NOMA-MEC Networks. IEEE Access 2021, 9, 16152–16163. [Google Scholar] [CrossRef]
  7. Zhang, N.; Guo, S.; Dong, Y.; Liu, D. Joint task offloading and data caching in mobile edge computing networks. Comput. Netw. 2020, 182, 107446. [Google Scholar] [CrossRef]
  8. Chen, X.; Liu, G. Joint Optimization of Task Offloading and Resource Allocation via Deep Reinforcement Learning for Augmented Reality in Mobile Edge Network. In Proceedings of the 2020 IEEE 13th International Conference on Edge Computing, EDGE, Beijing, China, 19–23 October 2020; pp. 76–82. [Google Scholar] [CrossRef]
  9. Peng, K.; Nie, J.; Kumar, N.; Cai, C.; Kang, J.; Xiong, Z.; Zhang, Y. Joint optimization of service chain caching and task offloading in mobile edge computing. Appl. Soft Comput. 2021, 103, 107142. [Google Scholar] [CrossRef]
  10. Jiang, W.; Feng, D.; Sun, Y.; Feng, G.; Wang, Z.; Xia, X.-G. Joint Computation Offloading and Resource Allocation for NOMA based multi-access mobile computing systems. IEEE Trans. Serv. Comput. 2022, 196, 108256. [Google Scholar] [CrossRef]
  11. Alfakih, T.; Hassan, M.M.; Gumaei, A.; Savaglio, C.; Fortino, G. Task offloading and resource allocation for mobile edge computing by deep reinforcement learning based on SARSA. IEEE Access 2020, 8, 54074–54084. [Google Scholar] [CrossRef]
  12. Mohammed, A.; Nahom, H.; Tewodros, A.; Habtamu, Y.; Hayelom, G. Deep Reinforcement Learning for Computation Offloading and Resource Allocation in Blockchain-Based Multi-UAV-Enabled Mobile Edge Computing. In Proceedings of the 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP, Chengdu, China, 18–20 December 2020; pp. 295–299. [Google Scholar] [CrossRef]
  13. Jiang, H.; Dai, X.; Xiao, Z.; Iyengar, A.K. Joint Task Offloading and Resource Allocation for Energy-Constrained Mobile Edge Computing. IEEE Trans. Mob. Comput. 2023, 22, 4000–4015. [Google Scholar] [CrossRef]
  14. Wang, G.; Yu, X.; Xu, F.; Cai, J. Task offloading and resource allocation for UAV-assisted mobile edge computing with imperfect channel estimation over Rician fading channels. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 169. [Google Scholar] [CrossRef]
  15. Nath, S.; Wu, J. Deep reinforcement learning for dynamic computation offloading and resource allocation in cache-assisted mobile edge computing systems. Intell. Converg. Netw. 2020, 1, 181–198. [Google Scholar] [CrossRef]
  16. Shahidinejad, A.; Ghobaei-Arani, M. Joint computation offloading and resource provisioning for edge-cloud computing environment: A machine learning-based approach. Softw. Pract. Exp. 2020, 50, 2212–2230. [Google Scholar] [CrossRef]
  17. Tao, X.; Ota, K.; Dong, M.; Qi, H.; Li, K. Performance guaranteed computation offloading for mobile-edge cloud computing. IEEE Wirel. Commun. Lett. 2017, 6, 774–777. [Google Scholar] [CrossRef]
  18. Wang, X.; Wang, K.; Wu, S.; Di, S.; Jin, H.; Yang, K.; Ou, S. Dynamic resource scheduling in mobile edge cloud with cloud radio access network. IEEE Trans. Parallel Distrib. Syst. 2018, 29, 2429–2445. [Google Scholar] [CrossRef]
  19. von Mankowski, J.; Durmaz, E.; Papa, A.; Vijayaraghavan, H.; Kellerer, W. Aerial-aided multiaccess edge computing: Dynamic and joint optimization of task and service placement and routing in multilayer networks. IEEE Trans. Aerosp. Electron. Syst. 2022, 59, 2593–2607. [Google Scholar] [CrossRef]
  20. Zhang, C.; Li, Z.; He, C.; Wang, K.; Pan, C. Deep Reinforcement Learning Based Trajectory Design and Resource Allocation for UAV-Assisted Communications. IEEE Commun. Lett. 2023, 213, 88–98. [Google Scholar] [CrossRef]
  21. Baidas, M.W. Resource allocation for offloading-efficiency maximization in clustered NOMA-enabled mobile edge computing networks. Comput. Netw. 2021, 189, 107919. [Google Scholar] [CrossRef]
  22. Kuang, Z.; Ma, Z.; Li, Z.; Deng, X. Cooperative computation offloading and resource allocation for delay minimization in mobile edge computing. J. Syst. Arch. 2021, 118, 102167. [Google Scholar] [CrossRef]
  23. Liao, Y.; Shou, L.; Yu, Q.; Ai, Q.; Liu, Q. Joint offloading decision and resource allocation for mobile edge computing enabled networks. Comput. Commun. 2020, 154, 361–369. [Google Scholar] [CrossRef]
  24. Pereira, R.S.; Lieira, D.D.; da Silva, M.A.C.; Pimenta, A.H.M.; da Costa, J.B.D.; Rosário, D.; Villas, L.; Meneguette, R.I. Reliable: Resource allocation mechanism for 5G network using mobile edge computing. Sensors 2020, 20, 5449. [Google Scholar] [CrossRef]
  25. Tong, Z.; Deng, X.; Ye, F.; Basodi, S.; Xiao, X.; Pan, Y. Adaptive computation offloading and resource allocation strategy in a mobile edge computing environment. Inf. Sci. 2020, 537, 116–131. [Google Scholar] [CrossRef]
  26. Ning, Z.; Sun, S.; Wang, X.; Guo, L.; Wang, G.; Gao, X.; Kwok, R.Y.K. Intelligent resource allocation in mobile blockchain for privacy and security transactions: A deep reinforcement learning based approach. Sci. China Inf. Sci. 2021, 64, 162303. [Google Scholar] [CrossRef]
  27. Yu, Z.; Xu, X.; Zhou, W. Task Offloading and Resource Allocation Strategy Based on Deep Learning for Mobile Edge Computing. Comput. Intell. Neurosci. 2022, 2022, 1427291. [Google Scholar] [CrossRef] [PubMed]
  28. Xu, J.; Xue, K.; Tian, H.; Hong, J.; Wei, D.S.L.; Hong, P. An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks. IEEE Trans. Veh. Technol. 2020, 69, 6688–6698. [Google Scholar] [CrossRef]
  29. Li, J.; Yang, Z.; Wang, X.; Xia, Y.; Ni, S. Task offloading mechanism based on federated reinforcement learning in mobile edge computing. Digit. Commun. Netw. 2023, 9, 492–504. [Google Scholar] [CrossRef]
  30. Chaieb, M.; Ben Sassi, D. Measuring and evaluating the Home Health Care Scheduling Problem with Simultaneous Pick-up and Delivery with Time Window using a Tabu Search metaheuristic solution. Appl. Soft Comput. 2021, 113, 107957. [Google Scholar] [CrossRef]
  31. Amiri, M.; Mohammad-Khanli, L.; Mirandola, R. A sequential pattern mining model for application workload prediction in cloud environment. J. Netw. Comput. Appl. 2018, 105, 21–62. [Google Scholar] [CrossRef]
  32. Liang, Z.; Shu, T.; Ding, Z. A Novel Improved Whale Optimization Algorithm for Global Optimization and Engineering Applications. Mathematics 2024, 12, 636. [Google Scholar] [CrossRef]
  33. Dehghani, M.; Trojovský, P. Serval Optimization Algorithm: A New Bio-Inspired Approach for Solving Optimization Problems. Biomimetics 2022, 7, 204. [Google Scholar] [CrossRef]
  34. Pirani, M.; Thakkar, P.; Jivrani, P. A Comparative Analysis of ARIMA, GRU, LSTM and BiLSTM on Financial Time Series Forecasting. In Proceedings of the 2022 IEEE International Conference on Distributed Computing and Electrical, Ballari, India, 23–24 April 2022. [Google Scholar]
  35. Bhuvaneswaria, A.; Timothy Jones Thomasb, J.; Kesavanc, P. Embedded Bi-directional GRU and LSTMLearning Models to Predict Disasterson Twitter Data. In Proceedings of the International Conference on Recent Trends in Advanced Computing 2019, ICRTAC, Chennai, India, 11–12 November 2019. [Google Scholar]
  36. Wang, J.-B.; Yang, H.; Cheng, M.; Wang, J.-Y.; Lin, M.; Wang, J. Joint Optimization of Offloading and Resources Allocation in Secure Mobile Edge Computing Systems. IEEE Trans. Veh. Technol. 2020, 69, 8843–8854. [Google Scholar] [CrossRef]
  37. Mahenge, M.P.J.; Li, C.; Sanga, C.A. Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications. Digit. Commun. Netw. 2022, 8, 1048–1058. [Google Scholar] [CrossRef]
  38. Elgendy, I.A.; Zhang, W.-Z.; Zeng, Y.; He, H.; Tian, Y.-C.; Yang, Y. Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2410–2422. [Google Scholar] [CrossRef]
  39. Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Privacy-Preserved Task Offloading in Mobile Blockchain with Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2536–2549. [Google Scholar] [CrossRef]
  40. Qi, P. Task Offloading and Scheduling Strategy for Intelligent Prosthesis in Mobile Edge Computing Environment. Wirel. Commun. Mob. Comput. 2022, 2022, 2890473. [Google Scholar] [CrossRef]
Figure 1. Synoptic diagram of the architecture of MEC.
Figure 1. Synoptic diagram of the architecture of MEC.
Electronics 13 02462 g001
Figure 2. A diagram of the proposed architecture.
Figure 2. A diagram of the proposed architecture.
Electronics 13 02462 g002
Figure 3. A structural representation of the proposed Probit Mish–GRU.
Figure 3. A structural representation of the proposed Probit Mish–GRU.
Electronics 13 02462 g003
Figure 4. Analysis of resource utilization.
Figure 4. Analysis of resource utilization.
Electronics 13 02462 g004
Figure 5. Performance validation of the proposed approach in terms of energy consumption (a), response time (b), and waiting time (c).
Figure 5. Performance validation of the proposed approach in terms of energy consumption (a), response time (b), and waiting time (c).
Electronics 13 02462 g005
Figure 6. Performance evaluation of the proposed PM-GRU.
Figure 6. Performance evaluation of the proposed PM-GRU.
Electronics 13 02462 g006
Figure 7. Assessment of the TPR and TNR.
Figure 7. Assessment of the TPR and TNR.
Electronics 13 02462 g007
Figure 8. Performance evaluation of the proposed HCD-KM (a) for load balancing and (b) for latency. The performance of the proposed HCD-KM is compared with that of traditional algorithms, such as KM, PAM, BIRCH, and FCM, according to load balancing and latency. The proposed HCD-KM incorporated the Hamming–Curtis Dot technique to estimate the distance value, which improved the clustering performance. The proposed HCD-KM had values of load balancing and latency of 1204 ms and 1875 ms, respectively, for 100 tasks. However, the conventional methods acquired an average load balancing and latency of 2571 and 3113 ms for 100 tasks. From these results, it can be seen that the proposed HCD-KM was superior to the traditional models and had the lowest latency.
Figure 8. Performance evaluation of the proposed HCD-KM (a) for load balancing and (b) for latency. The performance of the proposed HCD-KM is compared with that of traditional algorithms, such as KM, PAM, BIRCH, and FCM, according to load balancing and latency. The proposed HCD-KM incorporated the Hamming–Curtis Dot technique to estimate the distance value, which improved the clustering performance. The proposed HCD-KM had values of load balancing and latency of 1204 ms and 1875 ms, respectively, for 100 tasks. However, the conventional methods acquired an average load balancing and latency of 2571 and 3113 ms for 100 tasks. From these results, it can be seen that the proposed HCD-KM was superior to the traditional models and had the lowest latency.
Electronics 13 02462 g008
Figure 9. Validation according to the anonymization time.
Figure 9. Validation according to the anonymization time.
Electronics 13 02462 g009
Table 1. Analysis of the contributions in the literature.
Table 1. Analysis of the contributions in the literature.
Ref.Main ContributionsWeaknessesAdvantages
[16]This study addressed the challenges of meeting user QoS requests, including improving the quality of user experience with the purpose of increasing the performance of user experience with mobile communication environments.The research provides a consistent survey of approaches to secure computational offloading based on AI technology.There is a significant lack of details concerning resource allocation strategies, and IoT was not properly mentioned in the literature.
[20]This study presented a series of investigations of task-aware multi-unmanned aerial vehicle (UAV)-enabled MEC networks using RA- and DRL-based trajectory planning; there was an important focus on mobile system implementation.The proposed system might design poor trajectories due to the massive space between ground devices.The authors adopted the DDPG approach to design trajectories. Similarly, the particle swarm optimization (PSO) algorithm was used to carry out the RA procedure. This model had a completion time of 10 ms, which was considered high performance compared with the results obtained in recent works in the same context. This result showed the high feasibility and supremacy of the system.
[22]This study proposed an approach using cooperative computation offloading and RA to reduce transmission delay in an MEC system. The structure of the design was based on minimizing the frequency of CPU cycles and transmission power.The proposed method did not consider all of the EC factors in the CS implementation.The adoption of a monotonic optimization method to minimize the transmission power and the integration of the Sheng Jin formula (SJF) to reduce the CPU cycle frequency were important contributions that minimized the latency and upgraded the RA.
[28]This study introduced an identity management and authentication scheme for mobile systems based on blockchain technology; user authentication was ensured and secured using a public key and self-sovereign identities (SSIs) under blockchain monitoring.The proposed technique took too much time to complete the validation process.The model was adopted and generalized well to reduce network delay and storage space and allow good management of resource allocations.
Table 2. Makespan analysis.
Table 2. Makespan analysis.
Techniques/Makespan (ms)Number of Tasks
100200300400500
Proposed HCD-KM214541236124824510,227
KM286748786713885210,869
PAM344653697423932411,337
BIRCH384557487812974811,875
FCM44286245835410,27812,434
Table 3. Comparative analysis of the proposed model.
Table 3. Comparative analysis of the proposed model.
MethodsPrivacy Preservation Rate (%)
Proposed: exponential EMD matrix based on k-Anonymization97
KA94
L-Diversity90
T-Closeness87
Randomization83
Table 4. Comparative analysis of the proposed work.
Table 4. Comparative analysis of the proposed work.
WorksTechniquesAccuracy (%)EC (mj)RT (ms)RU (%)
Proposed workPM-GRU and ELI-SOA99.843965186597.65
Wang et al. [36]DCA-4500--
Mahenge et al. [37]PSO + GWO-4339198281
Elgendy et al. [38]MU-MT-COA-5089283378
Nguyen et al. [39]DRL--2600-
Qi [40]DNN896873--
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sindi, A.O.N.; Si, P.; Li, Q. Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm. Electronics 2024, 13, 2462. https://doi.org/10.3390/electronics13132462

AMA Style

Sindi AON, Si P, Li Q. Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm. Electronics. 2024; 13(13):2462. https://doi.org/10.3390/electronics13132462

Chicago/Turabian Style

Sindi, Ahmed Obaid N., Pengbo Si, and Qi Li. 2024. "Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm" Electronics 13, no. 13: 2462. https://doi.org/10.3390/electronics13132462

APA Style

Sindi, A. O. N., Si, P., & Li, Q. (2024). Secure Task Offloading and Resource Allocation Strategies in Mobile Applications Using Probit Mish-Gated Recurrent Unit and an Enhanced-Searching-Based Serval Optimization Algorithm. Electronics, 13(13), 2462. https://doi.org/10.3390/electronics13132462

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop