Trustworthy caching for mobile big data in social networks

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Edge computing enabled social networks can improve the quality of experience (QoE) to deliver mobile big data to users, where multiple caches are placed at the edge of networks to help mobile users exchange and share contents. However, with the ever-increasing scale of mobile big data, how to provide a trustworthy caching scheme to deliver mobile social big data becomes a new challenge. To tackle the above problems, this paper presents a trustworthy edge caching scheme for mobile big data in social networks based on a matching game approach. Firstly, to guarantee the security of the networks, a trust evaluation mechanism is designed to evaluate the reliability of each edge node. Then, each content generator selects the optimal edge node to cache the content and determines the optimal caching size, where the interactions between edge nodes and mobile users are modeled by a matching game. Finally, the simulation results show that the proposal can not only improve the QoE of mobile users, but also can prevent the attacks of malicious edge nodes.

Original languageEnglish
Title of host publicationINFOCOM 2018 - IEEE Conference on Computer Communications Workshops
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages808-812
Number of pages5
ISBN (Electronic)9781538659793
DOIs
StatePublished - 6 Jul 2018
Externally publishedYes
Event2018 IEEE Conference on Computer Communications Workshops, INFOCOM 2018 - Honolulu, United States
Duration: 15 Apr 201819 Apr 2018

Publication series

NameINFOCOM 2018 - IEEE Conference on Computer Communications Workshops

Conference

Conference2018 IEEE Conference on Computer Communications Workshops, INFOCOM 2018
Country/TerritoryUnited States
CityHonolulu
Period15/04/1819/04/18

Keywords

  • Mobile social networks
  • edge computing
  • mobile big data
  • multiple concurrent contents
  • security
  • trust evaluation

Fingerprint

Dive into the research topics of 'Trustworthy caching for mobile big data in social networks'. Together they form a unique fingerprint.

Cite this