Resource_Allocation_in_Quantum_Key_Distribution_Secured_Datacenter
Resource_Allocation_in_Quantum_Key_Distribution_Secured_Datacenter
Abstract—Datacenter networks (DCNs) with cloud–edge col- transportation, smart agriculture, and healthcare are emerging.
laboration are emerging to satisfy the communication, compu- Such services may not only demand communication resources
tation, and caching (3C) requirements of future services such (e.g., wavelengths) for data transmission, but also require com-
as cloud-based IoT services. However, the enroute data over
DCNs with cloud–edge collaboration is likely to suffer from putation and caching resources (e.g., CPU cycles and caching
cyberattacks such as eavesdropping. A large number of services storage) for data processing and storing [1]. Datacenters
require not only 3C resources, but also cryptographic resources (DCs), as the primary information technology (IT) infras-
for encryption to ensure high security. Quantum key distribu- tructures, provide hardware resources, including computation
tion (QKD) is a practical approach to provide secret keys for and caching resources. DC networks (DCNs) interconnecting
remote users with information-theoretic security against attacks
from quantum computing. A QKD-secured DCN (QKD-DCN) DCs have been deployed as substrate networks to carry the
with cloud–edge collaboration can be deployed to satisfy the services with communication, computation, and caching (3C)
communication, computation, caching, and cryptographic (4C) requirements and play an important role in ensuring Quality
requirements of services. This article innovatively solves the of Services (QoS).
new 4C resource-allocation (4CRA) problem in the network to The cloud computing and caching paradigm has powerful
minimize the cryptographic resource consumption. It formu-
lates an integer linear programming (ILP) model and proposes computing and caching ability for data processing and stor-
a heuristic cryptographic-dependent 4CRA algorithm to find ing [2]. DCs in cloud computing and caching (i.e., cloud DCs)
optimal solutions. The proposed algorithm is compared with are usually centralized and located at few sites, which could be
two baseline 4CRA algorithms which, respectively, consider the far away from users. However, with the increasing data gener-
minimized service delivery latency and the first-fit resource avail- ated at the edge, the high bandwidth, long service delivery
ability. Analytical simulations show that the proposed algorithm
minimizes the key-resource-consumption ratio and the aver- latency, and large energy consumption will become bottle-
age key-resource consumption under static and dynamic traffic necks for cloud computing and caching. Edge computing and
scenarios in different network topologies. caching, which allows computation and caching performed at
Index Terms—Caching, cloud–edge collaboration, communica- the edge of the network, has emerged [3]. It can effectively
tion, computation, cryptographic, datacenter networks (DCNs), overcome the above deficiencies. It is usually deployed in
quantum key distribution (QKD), resource allocation. the form of small DCs (i.e., edge DCs) within the access-
aggregation networks. Previous works include the concepts
I. I NTRODUCTION like micro DC [4], cloudlet [5], cloud–edge computing [6],
etc. But they have the main bottleneck of the limited compu-
LOUD-BASED IoT services, tactile Internet services,
C and new IoT-based applications, such as smart
tation and communication capacities compared with the cloud
computing and caching. Cloud–edge collaboration, which can
quickly carry services by combining the idle edge resources
Manuscript received 9 December 2022; accepted 24 January 2023. Date
of publication 7 February 2023; date of current version 7 June 2023. This with the cloud resources, can be introduced in DCNs for
work was supported in part by the NSFC Project under Grant 61971068, performance improvement [7].
Grant U22B2026, and Grant 62150032; in part by the Funds for Creative In DCNs with cloud–edge collaboration, network security
Research Groups of China under Grant 62021005; in part by the Fund
of National Key Research and Development Program of China under has become one of the major challenges and will affect crit-
Grant 2020YFE0200600; in part by the Fundamental Research Funds for the ical services, such as smart hospitals and smart cities, and
Central Universities under Grant 2019XD-A05; and in part by BUPT Excellent banking, military, and government operations. The enroute
Ph.D. Students Foundation under Grant CX2021139. (Corresponding authors:
Xiaosong Yu; Yongli Zhao.) data over the DCNs is likely to suffer from cyberattacks such
Qingcheng Zhu, Xiaosong Yu, Yongli Zhao, and Jie Zhang are with the as eavesdropping. Apart from the intelligent intrusion detec-
State Key Laboratory of Information Photonics and Optical Communications, tion system to detect cyberattacks [8], classical cryptography
Beijing University of Posts and Telecommunications, Beijing 100876, China
(e-mail: [email protected]; [email protected]; yonglizhao@ based on the high complexity of mathematical problems is
bupt.edu.cn; [email protected]). usually applied to secure the data. As quantum computing
Avishek Nag is with the School of Electrical and Electronic Engineering, and quantum code-breaking are advancing rapidly, the security
University College Dublin, Dublin 4, D04 V1W8 Ireland (e-mail:
[email protected]). of traditional key-distribution techniques can be compro-
Digital Object Identifier 10.1109/JIOT.2023.3242725 mised. Quantum networks based on quantum entanglement are
2327-4662
c 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10917
inherently secure [9], [10], but their technologies have not been 4CRA algorithms which, respectively, consider the min-
mature for large-scale deployment. As a practical approach for imized service delivery latency and the first-fit resource
quantum cryptography, the quantum key distribution (QKD) availability, the proposed algorithm achieves the good
technology distributes secret keys for two remote entities performances in terms of secret key consumption and
with information-theoretic security [11]. It follows principles service success ratio (SR).
of quantum mechanics, including Heisenberg’s uncertainty The remainder of this article is organized as follows.
principle and the noncloning theorem [12], [13], [14]. The Section II investigates the related works; Section III gives the
QKD network is comprised of two or more QKD nodes problem statement; Section IV describes the network model
connected through QKD links, which allows sharing keys and 4CRA in QKD-DCNs with cloud–edge collaboration. In
between the QKD nodes by key relay. Until now, multiple Section V, the ILP model is formulated. In Section VI, the
QKD networks have been implemented [15], [16], [17] CryptoD-4CRA algorithm is proposed. Section VII presents
based on continuous-variable and discrete-variable QKD pro- the simulation results and analysis of the performances of the
tocols. Secret keys generated based on the QKD protocols ILP model, the CryptoD-4CRA algorithm, and baseline 4CRA
are a kind of cryptographic resources. By combining QKD algorithms. Finally, Section VIII concludes this article.
with encryption algorithms, such as one-time-pad (OTP) or
advanced-encryption-standard (AES) encryption [18], secret II. R ELATED W ORKS
keys can be provided for services to meet high-security
The related works are investigated from two aspects in
requirements.
DCNs with cloud–edge collaboration, including resource allo-
To satisfy 3C requirements and the high-security require-
cation and cryptographic technology.
ment of services, a QKD-secured DCN (QKD-DCN) with
cloud–edge collaboration can be deployed, where the QKD
technology is used to generate secret keys and secure the data A. Resource Allocation in DCNs With Cloud–Edge
transmission in a DCN with cloud–edge collaboration. In such Collaboration
DCNs, QKD equipment, quantum signal channels (QSChs) for In this section, we introduce the previous works on resource
quantum signal transmission and public interaction channels allocation related to DCNs with cloud–edge collaboration. In
(PIChs) for classical information exchange are additionally optical networks for cloud–edge computing, a traffic grooming
built [13], so that cryptographic resources (i.e., secret keys algorithm which saves the wavelength consumption and energy
generated based on QKD) are provided. Meanwhile, tradi- consumption is proposed based on the deep reinforcement
tional 3C resource allocation (3CRA) problems in DCNs have learning technology [6]. In collaborative cloud–edge comput-
been extended to be communication, computation, caching, ing, a solution is proposed in [21] for the virtual machine
and cryptographic (4C) resource allocation (4CRA) problem in (VM) placement and workload assignment problem to mini-
QKD-DCNs with cloud–edge collaboration. A large amount of mize the consumption of IT infrastructures, which optimizes
data transmitted (Gbps) in the network needs to be encrypted the resource efficiency of edge DCs as a result. For the
with cryptographic resources. However, the relatively low services with computation and communication requirements,
secret-key generation rate (Mbps) [19] and the scheme for geo-distributed job scheduling and lightpath provisioning are
destroying the keys, once the keys are used [20], are criti- completed by reallocating routing, modulation level, and
cal limits for security assurance and network performances. frequency slots, which are able to save job completion time
The new 4CRA problem still needs more efficient solutions to significantly [4]. In DCNs with collaborative edge caching,
minimize secret-key consumption. edge caching helps to reduce the average transmission delay
In this work, we focus on designing the 4CRA strategy to of delay-sensitive services with high priority and balances
minimize cryptographic resource consumption in QKD-DCNs the network loads [22]. Subject to the limited computation
with cloud–edge collaboration. The main contributions of this and caching resources of each micro DC, the optimal content
work include the following aspects. caching problem is solved and the solution minimizes the aver-
1) To satisfy the 4C requirements of services, QKD-DCNs age content delivery latency by developing mix-cooperative
with cloud–edge collaboration are designed. Apart from caching [23]. To minimize the job completion time in DCNs
the traditional 3C resources, cryptographic resources with edge computing and caching, the 3CRA problem is solved
generated by QKD are newly introduced. Based on by dividing the geo-distributed data into multiple clusters for
the created 4C resource models, the 4CRA problem parallel processing [24]. For virtual optical network embed-
extended from the 3CRA problem is first specified. ding in DCNs, the continuity degree of the available spectrum
2) An integer linear programming (ILP) model is formu- is employed to weaken the influence of spectrum fragmenta-
lated and a heuristic cryptographic-dependent 4CRA tion and achieve better spectral efficiency [25]. In IoT-edge-
(CryptoD-4CRA) algorithm is proposed to minimize cloud computing environments, the task offloading problem
the cryptographic resource consumption. In the heuristic can be solved by using machine learning algorithms efficiently.
algorithm, the strategy with the minimized cryptographic A distributed deep learning-driven task offloading algorithm
resource consumption is selected among the candidate is proposed to jointly optimize the system utility and the
available strategies for each service. bandwidth allocation [26]; a novel deep meta-reinforcement
3) Comprehensive simulations under static and dynamic learning-based offloading framework is designed to jointly
scenarios are conducted. Compared with two baseline minimize the delay and energy consumption [27].
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10918 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
Most of these works involve the 3CRA in DCNs with multiplexed QKD-secured optical networks in [40]. End-to-
cloud–edge collaboration or edge collaboration to improve end QKD schemes are designed to provide secret keys for
resource utilization and QoS. During the resource alloca- users and improve secret-key resource utilization as reported
tion, these works do not consider the security requirements. in [41] and [42]. Focusing on the multicast services in QKD-
Inspired from these works, we solve the resource alloca- DCNs, a secure multicast scheme is proposed in [43]. To
tion problem with security considerations in DCNs with provide secret keys on demand for services efficiently, a
cloud–edge collaboration. novel Key-on-Demand (KoD) scheme and a Key-as-a-Service
(KaaS) framework are designed where quantum key pools
(QKPs) are constructed [44], [45]. They can positively balance
B. Cryptographic Technology in DCNs With Cloud–Edge security requirements and cryptographic resource usage. To
Collaboration secure virtual network function (VNF) distribution across DCs,
In this section, we introduce the cryptographic technology network functions virtualization orchestration and QKD tech-
which can be applied in DCNs with cloud–edge collabora- nology are combined and a time-shared approach is designed
tion. There are two types of cryptography, including public-key for cost-effective deployment in [46] and [47]. In the QKD-
cryptography (PKC) and symmetric-key cryptography (SKC). secured space–air–ground integrated networks (SAGINs), a
PKC is widely used to preserve the data security. For the universal QKD-service-provisioning framework is designed to
secure use of PKC, secure certificate revocation schemes are minimize the cost of QKD services under the uncertainty and
studied and can satisfy different security needs [28]. For bet- the dynamism of communications [48]. In the QKD-secured
ter key management for PKC, a distributed key management federated edge learning (FEL), the optimization of the QKD
scheme is proposed in heterogeneous public-key cryptosys- resource allocation scheme is formulated and a learning-based
tems and builds key management protocols into networks [29]. QKD allocation scheme is proposed to minimize the total
By combining the computational security principles with the deployment costs of QKD resources under uncertainty [49].
physical layer security primitives, a new hybrid network- On the one hand, the previous works applying PKC and
coding cryptosystem is designed and can obtain post-quantum SKC based on computational complexity are not able to
cryptography at high rates [30]. Taking advantages of the achieve the security against quantum attacks; on the other
PKC and blockchain technology that ensures the reliabil- hand, the previous works related to SKC with quantum cryp-
ity and irreversibility of data, the blockchain-based network tography focus on the cryptographic resource allocation itself.
architecture emerges. A new routing protocol with the cluster We design a resource allocation method considering both tra-
structure for the blockchain-based architecture outperforms the ditional 3C resources and cryptographic resources, so as to
state-of-the-art security countermeasures as proposed in [31]. optimize the resource utilization in DCNs with cloud–edge
A public-permissioned blockchain security mechanism using collaboration.
digital signature is proposed in [32]. The resource allocation
strategy is optimized based on deep reinforcement learn-
ing [33] and a cooperative computing strategy is designed to III. P ROBLEM S TATEMENT
reduce the time to acquire hash values of blocks [34]. The In QKD-DCNs with cloud–edge collaboration, there are not
blockchain-enabled IoT-edge-cloud computing is proposed to only 3C resources, but also cryptographic resources. For the
address the challenge of data loss or privacy disclosure that services requiring 4C resources, the 3CRA problem has been
may occur in the process of task offloading. An energy- extended to be a 4C resource-allocation (4CRA) problem. An
efficient dynamic task offloading algorithm is developed to example application of smart medical healthcare initiated by a
jointly minimize the energy consumption and task response node is shown as follows [50]. It will: 1) retrieve real-time data
time [35]. However, as quantum computing matures, the from the healthcare devices, which requires communication
security of PKC may be compromised. resources; 2) cache the retrieved data, which requires caching
In contrast to PKC, several forms of SKC are believed to resources; 3) perform data analysis and summarization, which
be resistant against quantum attacks [36], [37]. The security requires computation resources; 4) upload the result data to the
of SKC mainly relies on establishment of secure symmetric cloud, which requires communication resources; and 5) pro-
keys. The QKD technology belongs to quantum cryptog- tect and encrypt the sensitive data during transmission, which
raphy and has information-theoretic security based on the requires cryptographic resources. Secret keys generated based
laws of quantum physics. The QKD technology has been on QKD are a type of cryptographic resources. Importantly,
studied to supply secure secret keys for services. To enable the relationships between 3C resources and the newly added
QKD-secured optical connections, three types of channels are cryptographic resources need to be specified. Secret keys are
required, including traditional data channel (TDCh), QSCh, used during the communication process and play the role
and PICh [13] over wavelengths. The routing, wavelength, and of encrypting the enroute data over the network. The key-
time slot assignment algorithm based on optical time-division relay technology based on trusted relays is applied during
multiplexing (OTDM) is designed for the channels [38]. the cryptographic resource allocation. The data encryption or
Three novels efficient load balancing routing, wavelength, and decryption is operated using secret keys in the caching nodes,
time-slot assignment approaches are designed to reduce the computing nodes, and the users which initiate services. The
overall network congestion in [39]. The spectrum, core, and enroute data over the communication paths is the encrypted
link resource allocation problem is solved in space division data and the valuable information cannot be eavesdropped.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10919
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10920 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
and encrypt the contents required by services. The descriptions is a library denoted as Lr (t) = {l1 , l2 , . . . , l|L| } working
for 4C resources are presented as follows. in a first-in first-out way [55].
1) Communication Resources: Dense wavelength division 4) Cryptographic Resources: Secret keys are generated
multiplexing (DWDM) is applied to provide commu- using QKD and stored in the QKP. A QKP over a link
nication resources for data transmission [51]. It allows e has the limited capacity of Q bits which can store
the simultaneous transmission of signals over a sin- e
Ncryp = Q/uk keys where uk (bit) is the length of a key
gle fiber by using different wavelengths with small unit. XOR are operated over the trusted nodes to realize
spacing grids (e.g., 50 GHz) and increases the total com- key relay. The Recryp (t) over a link e at time t is calcu-
munication bandwidth significantly. The core network lated by (3). Here, δ e is the key-generation rate (uk /s)
is based on IP offloading, transponders with fixed bit and ξ e is the key-consumption rate (uk /s) over a link e.
t e
rates [52]. Wavelengths are considered as communica- δ dt is the total generated keys from time t0 to t and
tt0 e
t0 ξ dt is the total consumed keys from time t0 to t over
tion resources. We assume that each fibre link e has
wavelengths W = {λ1 , λ2 , . . . , λi , . . . , λ|W| }, where |W| e (t) is the available keys of a QKP if there
a link e. Kcryp
is the total number of wavelengths per fibre link e. is no capacity limitation Ncryp e . If K e (t) is larger than
cryp
A wavelength λi is unavailable if it was allocated for e
Ncryp , a part of the old keys is destroyed for safety con-
services or it met a channel quality drop. The avail- sideration and new keys are stored. The keys are highly
able status of λi is denoted by i (t) in (1). Hence, recommended not to be used twice or more [20]. Once
Recmu (t) = {i (t)|λi ∈ W}. The line rate of a wave- the keys are consumed by the services, the used keys
length is β (Gbps). The data transmission latency over should be destroyed from the QKPs
ee and ec is assumed to be τE and τC , respectively. In e
a generic manner, τC = γ τE where the values of the Kcryp (t), Kcryp
e (t) ≤ N e
Recryp (t) = cryp
ratio γ and τE are dependent to the specific edge and Ncryp , Kcryp e (t) > N e
cryp
t t
cloud infrastructure providers [53] e
Kcryp (t) = Recryp (t0 ) + δ e dt − ξ e dt. (3)
t0 t0
0, if λi is available at time t
i (t) = . (1)
1, if λi is unavailable at time t
C. 4C Resource Allocation
2) Computation Resources: A node r ∈ R connected with
Given a network topology G(V, E) and arriving services
DCs has the computational capability of C in terms
S, the 4C resource allocation needs to find the 4CRA paths,
of the number of CPU cycles per second. We assume
where the target 4CRA paths include: 1) the available com-
that C computational capability can be divided into
puting node vcpu to compute for contents where computation
Ncpu = C/up computation resource blocks where a cpu
resources Ds are allocated; 2) the available caching node
computation resource block has the computational capa-
supporting content Din s caching and the destination node to
bility of up . The available status of a computation
cache Dout using caching resources; 3) the available communi-
resource block θi is denoted by i (t) in (2). Hence, s
cation paths Pcmu for transmitting data where communication
Rvcpu (t) = {1 (t), 2 (t), . . . , i (t), . . . , Ncpu (t)}. Ncpu
E
C resources Dcmu s over Pcmu are allocated; and 4) the available
and Ncpu are the number of computation resource blocks
QKD paths Pcryp for encrypting data where the cryptographic
on ve ∈ R and vc ∈ R, respectively. It is assumed that cryp
resources Ds over Pcryp are allocated.
the output content size will scale down by a factor of ρ
An example of the 4CRA paths for 4CRA is illustrated
after computation [54]. Different numbers of the com-
in Fig. 2. The service initiated in Node B requires to fetch
putation resource blocks will be allocated for services
or download the contents c1 and c2 , compute and cache for
with computation execution time σ according to their
the input contents, and get the computed results. Node C
computational requirements [55]
is selected as computing and caching node. Content c1 is
stored in cloud layer and content c2 is cached in Node A. For
0, if θi is not usd for computation at time t
i (t) = . (2) inputting content c1 , the communication path Pcmu
c1
and QKD
1, if θi is usd for computation at time t c1
path Pcryp are both from cloud layer to Node C; for inputting
c2 c2
3) Caching Resources: A node r ∈ R has the caching stor- content c2 , the communication path Pcmu and QKD path Pcryp
age with F-bit capacity that can totally store Ncach r = are both A->D->C. After the contents c1 and c2 are transmitted
F/F caching blocks whose capacity is F bits. It is to to the computing node, Node C, the decryption is conducted
cache the contents which might be fetched or down- using keys and the input data is processed as the computed
loaded by services in the future. We assume that a set result using computation resources. For outputting the result
c3
of contents C = {c1 , c2 , . . . , c|C| } can be stored in r ∈ R. content c3 after computation, the communication path Pcmu
c3
The nodes with a content ci cached at time t are denoted and QKD path Pcryp are both from Node C to Node B. Two
c c c c c1 c2 c3
by V ci (t) = {v1i , v2i , . . . , vj i , . . . , v|Vi ci | }. The available wavelengths over Pcmu , Pcmu , and a wavelength over Pcmu are
caching resource is denoted by Rcach (t) and its value is
v allocated (filled rectangles over black arrows); two keys over
c1 c2 c3
the capacity not occupied by contents. The set of cached Pcryp , Pcryp , and a key over Pcryp are allocated (keys over
contents on a node r ∈ R connected with DCs at time t brown arrows).
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10921
Minimize Dcryp s
s,c x(i,j),c
s∈S (i,j)∈E c∈Din
s
+ s,c y(i,j),c .
Dcryp s
(4)
s∈S (i,j)∈E c∈Dout
s
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10922 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10923
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10924 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
the secret keys in QKPs along the path Pcryp will be allo-
cated for encrypting/decrypting data. In the 4CRA solution, a
CQPC algorithm is proposed and specified in Algorithm 3. The
CQPC algorithm not only considers the communication and
cryptographic resource status, but also considers the service
delivery latency along Pcmu and the secret key consumption
along Pcryp . Algorithm 3 is further applied in the CryptoD-
4CRA algorithm to prepare the basic Pcmu and Pcryp between
node pairs.
In Algorithm 3, to transmit and encrypt a required content
Fig. 3. Example of CryptoD-4CRA algorithm.
c from vs to vd on the network topology G(V, E), K-shortest-
paths Psd are first precalculated from vs to vd . Then, all paths
c
in Psd are traversed to check whether the Pcmu and Pcryp are cs ∈ Din s . For outputting content cd ∈ Ds
out
to V out , Pcmud
and
cd
with enough available resources. For each path p ∈ Psd at time Pcryp are calculated from each computing node vcpu ∈ V cpu
t, if the communication resources Recmu (t) on each link e ∈ p to each destination node vd ∈ V out . When vcpu is set as
is enough, that is, the number of free wavelengths satisfying the computing node, based on the calculated QKD path set
vcpu
the wavelength consistency along p are not smaller than the {p|p = Pccryp ∀c ∈ Din s ∪ Ds }, the number Qcryp of the
out
communication requirement Dcmu c of the content c, service consumed secret keys is calculated (line 13). After traversing
vcpu
delivery latency T c (p) along p is calculated, and the path p V cpu , the paths with the minimized Qcryp are selected as Target
is added to the temporary path set Ptcmu ; if the cryptographic paths. If Target paths are not found, the service is assumed to
resource Recryp (t) on each link e ∈ p at time t is enough, that is, be FAILED; otherwise, 4C resources are allocated according
the remained secret keys in QKPs along p are all not smaller to Target paths and the service is finally served successfully.
cryp
than cryptographic requirement Dc of the content c, secret The complexity analysis of the CryptoD-4CRA algorithm
key consumption Qc (p) along p is calculated and the path p is as follows. The time complexity to find K-shortest-paths
is added to temporary path set Ptcryp . After traversing Psd , is O(K|V|(|E| + |V|log|V|)). Under the worst scenario, the
p ∈ Ptcmu with the minimized T c (p) is selected as the target traversed times for V cpu are |R| which is the number of the
Pcmu ; p ∈ Ptcryp with the minimized Qc (p) is selected as the nodes with DCs. For each vcpu ∈ V cpu , V in , and V out are
target Pcryp . Finally, the communication path Pcmu and the traversed. The maximal number of |V in | is |R| and the maximal
QKD path Pcryp are achieved. number of |V out | is |V|. The times of running K-shortest-path
algorithm is (|V| + |R|)|R|. Hence, the time complexity of
the CryptoD-4CRA algorithm is O(K|V||R|(|V| + |R|)(|E| +
C. Cryptographic-Dependent 4C Resource Allocation |V|log|V|)).
In QKD-DCNs with cloud–edge collaboration, to solve An example of the CryptoD-4CRA algorithm
the 4CRA problem and minimize the cryptographic resource is shown in Fig. 3. The example service se ,
cpu cryp
consumption, the CryptoD-4CRA algorithm is proposed and Dse = (use , Din se , Dse , Dse , Dse , Dse ), requires to
out cmu
specified in Algorithm 1. The algorithm considers the required retrieve a content c1 cached in edge node v1 , compute and
contents both cached in different edge DCs and stored in cache c1 in computing node, and transmit the computed result
cloud DCs. It prepares different potential 4CRA strategies c2 to edge node v3 . Here, V in = {v1 }, V out = {v3 }, Din se = c1 ,
cryp cryp
by applying different computing nodes in V cpu , and calculat- Dout
se = c2 , Dse ,c1 = 2, and D se ,c2 = 1. There are four
ing the corresponding communication and QKD paths Pcmu nodes with computation resources, including v1 , vcloud , v2 ,
and Pcryp . The selection of target 4CRA paths depends on the and v3 , where v1 , v2 , and v3 are the edge nodes and vcloud
cryptographic resource consumption over the potential 4CRA is the cloud node. Assuming that the available computation
cpu
strategies and the paths with the minimized cryptographic resources in v1 is smaller than Dse , the candidate computing
resource consumption are the target paths. nodes V cpu
= {v2 , v3 , vcloud } are obtained by adopting the
In Algorithm 1, when there is an unserved service s at time CCNS algorithm. By adopting the CQPC algorithm, the
t, the 4C resource status are updated based on the current QKD paths corresponding to vcloud , v2 , and v3 are listed
vd
network situations. The available caching resources Rcach (t) in Fig. 3, including Path2 P2 , Path3 P3 , and Path4 P4 ,
in the node where caching is required, are first checked. If the respectively. The communication paths are assumed to be the
caching requirement is not satisfied, the service s is marked same with QKD paths. The path before the computing node
FAILED. Otherwise, the candidate computing nodes V cpu are is the inputting path and the path after the computing node
selected by adopting the CCNS algorithm. Different comput- is the outputting path. As for the secret key consumption,
vcloud v3
ing nodes influence different 4CRA paths and strategies. For we can get the calculation results Qcryp = 5, Qcryp = 4,
v2 v2
each computing node vcpu ∈ V cpu , the inputting paths and and Qcryp = 3. Because Qcryp is the minimized among the
outputting paths are calculated, respectively, by adopting the candidate paths, Path3 P3 is selected as the Target path and
CQPC algorithm. For inputting contents Din s to vcpu , source v2 is selected as the final computing node. The 4C resources
node set V in corresponding to contents Dins is obtained; then, are allocated for the service, including the computation and
Pccmu
s and Pccryp
s are calculated from each source node vs ∈ V in caching resources in v2 , the communication and cryptographic
to each computing node vcpu ∈ V cpu for inputting content resources over P3 .
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10925
TABLE I
PARAMETERS AND T HEIR VALUES IN THE S IMULATIONS
the services are generated one by one and the secret keys are
generated periodically.
In the simulation, two different content-caching conditions
are considered. Under the content-caching condition I (II),
each content is cached in the cloud and one (two) edge node(s)
that is (are) connected with DCs. The contents are retrieved
following uniform distribution. The number of the cached con-
tents is assumed to be 50 in a small-scale topology and 150
Fig. 4. Two small-scale network topologies. (a) 3-edge-node network in a large-scale topology. The size of the contents in DCNs
topology. (b) 6-edge-node network topology.
is assumed to be uniformly distributed between 1 and 10
Gb. The transmission time is dependent on specific infras-
tructure providers. In the simulation, τE is assumed to be
10 ms [56] and γ is 20 [53]. The computing time σ is assumed
as 100 ms [4] when allocating several up . Per Gb data to
be computed is assumed to require uk computation resources.
The output size ratio ρ is assumed to be 0.2 [54]. AES-256
(uk = 256 bit) is used as the encryption algorithm and 5uk
keys are required to encrypt per Mb data for high security
consideration. The key generation rate when applying a pair of
QKD equipment over a link ee is assumed as 10.24 Mb/s [19]
(δ ee = 4 × 104 uk /s). Considering the larger data volume
over the links between the cloud and edge, four pairs of QKD
equipment are equipped per link ec (δ ec = 1.6 × 105 uk /s).
ee ec
As for QKP, Ncryp is set as 2 × 106 uk and Ncryp is set as
8 × 10 uk . The initial numbers of keys in QKPs over ee and
6
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10926 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
TABLE II
R ESULTS OF THE ILP M ODEL AND THE C RYPTO D-4CRA A LGORITHM
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10927
Fig. 8. SR versus the number of services in 6-edge-node topology. Fig. 9. AL versus the number of services in 6-edge-node topology.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10928 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
Fig. 11. KCR versus service arrival rate in 6-edge-node topology. Fig. 13. AKC versus service arrival rate in 6-edge-node topology.
Fig. 12. KCR versus service arrival rate in 38-edge-node topology. Fig. 14. AKC versus service arrival rate in 38-edge-node topology.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10929
Fig. 15. SR versus service arrival rate in 6-edge-node topology. Fig. 17. AL versus service arrival rate in 6-edge-node topology.
Fig. 16. SR versus service arrival rate in 38-edge-node topology. Fig. 18. AL versus service arrival rate in 38-edge-node topology.
Figs. 13 and 14 show the AKC per service for dynamic dynamic services. Under content-caching condition I at arrival
services in 6-edge-node topology and 38-edge-node topology. rate 70 (250) in small-scale topology (large-scale topol-
We can find that the AKC of the CryptoD-4CRA algorithm is ogy), the CryptoD-4CRA-I algorithm achieves 1.8% (6.1%)
the lowest among the simulated 4CRA algorithms. As shown in higher SR than the LatenD-4CRA-I algorithm and also has
Fig. 13 (Fig. 14), when the service arrival rate is 70 (250), the higher SR than the FirstD-4CRA-I algorithm. Differently, the
KCR of the CryptoD-4CRA-I algorithm is 41.1% and 36.5% CryptoD-4CRA-II algorithm has 0.3% lower SR than the
(32.8% and 9.5%) lower than the LatenD-4CRA-I algorithm LatenD-4CRA-II algorithm in Fig. 15. This is because with
and the FirstD-4CRA-I algorithm, which is similar to the KCR the arrival rate increasing, the bottleneck of the resource avail-
performance improvement. The reason is that the CryptoD- ability over the nodes with DCs influences SR performance of
4CRA algorithm always chooses the computing node and the the CryptoD-4CRA algorithm, especially in the small-scale
corresponding paths to save the secret keys while serving a topology. Under content-caching condition II, it is observed
service. We can also find that the decreasing trend of AKC that the CryptoD-4CRA-II algorithm has 2.6% higher SR than
for the LatenD-4CRA algorithm versus the service arrival rate the LatenD-4CRA-II algorithm and similar SR compared with
is different from the increasing trend of KCR, which is more the FirstD-4CRA-II algorithm in Fig. 16. This is because in
obvious in Figs. 12 and 14. The reason for the decreasing trend the large-scale topology, when the service arrival rate becomes
of AKC for the LatenD-4CRA algorithm is that the LatenD- larger, the LatenD-4CRA-II algorithm will consume the major-
4CRA algorithm has a priority of selecting the paths with low ity of resources at the edge layer and cause lower SR, while
latency, while in cloud–edge collaboration cases, the paths with the other algorithms may consume more resources at the
low latency may have high secret key consumption. When the cloud layer. According to the relationship that the higher SR
arrival rate increases, resource-providing ability is relatively embodies the lower average network cost per service, the
fixed. Hence, the services requiring relatively high secret key CryptoD-4CRA algorithm is more cost-efficient than the other
consumption are more blocked in the LatenD-4CRA algorithm two algorithms under content-caching condition I and at least
and its AKC will decrease. one other algorithm under condition II.
The performance in terms of SR is illustrated in Figs. 17 and 18 are the simulation results in terms of AL
Figs. 15 and 16 under two content-caching conditions for versus arrival rate. In these cases, the LatenD-4CRA algorithm
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10930 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
VIII. C ONCLUSION
In this article, we mainly solved the resource alloca-
tion problem to minimize cryptographic resource consump-
tion in QKD-DCNs with cloud–edge collaboration where
multidimensional 4C resources exist. An ILP model is for-
mulated which finds the optimal solution for services in terms
of key resource consumption. The heuristic cryptoD-4CRA
algorithm is also innovatively proposed which is scalable
to large-scale networks while considering the 4C resource
constraints. In the proposed algorithm, to obtain the candi-
date computing nodes, the CCNS algorithm is designed by
jointly considering the locations of the computing nodes and
Fig. 20. WU versus service arrival rate in 38-edge-node topology. the cached contents, as well as the cryptographic resource
consumption; to obtain the potential 4C resource allocation
has the minimized AL. Compared with the CryptoD-4CRA-I (4CRA) paths, the CQPC algorithm is proposed to calculate
algorithm and the FirstD-4CRA-I algorithm, the LatenD- the communication paths and QKD paths with awareness of
4CRA algorithm reduces the AL by 40.8% and 64.1% in the service delivery latency and the cryptographic resource
the small-scale 6-edge-node topology at arrival rate 70 and consumption; the 4CRA paths with the minimized crypto-
28.7% and 52.6% in the large-scale topology at arrival rate graphic resource consumption among the potential paths are
250. The CryptoD-4CRA algorithm saves the secret keys at the selected as the target solution. In the simulations, the results of
cost of longer AL, so as the FirstD-4CRA algorithm. This is the ILP model are presented in terms of the consumed num-
because serving the services over the edge-to-cloud links needs ber of keys. The great performances of the CryptoD-4CRA
fewer secret keys but longer latency compared to that over algorithm are analyzed comprehensively and compared with
the edge-to-edge links. And, the difference between content- the baseline algorithms, including the LatenD-4CRA algorithm
caching conditions I and II more impacts the performance and the FirstD-4CRA algorithm under static and dynamic sce-
of the CryptoD-4CRA and LatenD-4CRA algorithms because narios. The simulation results show that our algorithm reduces
they use the similar CCNS and CQPC algorithms where the the key resource consumption ratio and average key resource
candidate computing nodes and potential paths are influenced consumption significantly. The performances of the simulated
by the cached locations of the required contents. 4CRA algorithms in terms of SR, AL, and WU are also
Figs. 19 and 20 depict the WU of the 4CRA algorithms in evaluated.
different topologies. As shown in Fig. 19, at the arrival rate 70, The QKD technology will play a significant role in DCNs
the WU of the LatenD-4CRA-I algorithm occupies the mini- due to its information-theoretic security. The resource alloca-
mized wavelengths which is 14.9% and 42.7% lower than the tion for various applications in QKD-DCNs will become an
CryptoD-4CRA-I and FirstD-4CRA-I algorithm, respectively. investigation direction in the future. The 4CRA considering the
The reason is that the WU is mainly affected by the computing network virtualization technology will be critical for the future
node selection and the communication path calculation. The DCN evolution. For the development of machine-learning-
communication paths selected by the CQPC algorithm with related technologies, the enhanced optimization of 4CRA is
the minimized service delivery latency are more likely to con- also possible. Moreover, the protection and recovery methods
sume few wavelengths. As shown in Fig. 20, we can find that in QKD-DCNs are an important topic, which will keep the
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
ZHU et al.: RESOURCE ALLOCATION IN QUANTUM-KEY-DISTRIBUTION-SECURED DATACENTER NETWORKS 10931
stable QoS and network performances in case of the optical [24] Z. Liu, J. Zhang, Z. Guo, and Y. Ji, “Multi-stage aggregation and light-
channel quality drop. path provisioning of geo-distributed data over EON assisted by MEC,”
in Proc. Opt. Fiber Commun. Conf. (OFC), San Diego, CA, USA, 2020,
pp. 1–3.
[25] W. Wei, H. Gu, K. Wang, X. Yu, and X. Liu, “Improving cloud-based
R EFERENCES iot services through virtual network embedding in elastic optical inter-
DC networks,” IEEE Internet Things J., vol. 6, no. 1, pp. 986–996,
[1] W. Fang, M. Lu, X. Liu, L. Gong, and Z. Zhu, “Joint defragmenta- Feb. 2019.
tion of optical spectrum and IT resources in elastic optical datacenter
[26] H. Wu, Z. Zhang, C. Guan, K. Wolter, and M. Xu, “Collaborate edge and
interconnections,” J. Opt. Commun. Netw., vol. 7, no. 4, pp. 314–324,
cloud computing with distributed deep learning for smart city Internet
Apr. 2015.
of Things,” IEEE Internet Things J., vol. 7, no. 9, pp. 8099–8110,
[2] Cisco Global Cloud Index: Forecast and Methodology 2016–2021, Sep. 2020.
Cisco, San Jose, CA, USA, White Paper, Jul. 2018.
[27] G. Qu, H. Wu, R. Li, and P. Jiao, “DMRO: A deep meta reinforcement
[3] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge computing: Vision
learning-based task offloading framework for edge-cloud computing,”
and Challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646,
IEEE Trans. Netw. Service Manag., vol. 18, no. 3, pp. 3448–3459,
Oct. 2016.
Sep. 2021.
[4] Z. Liu, J. Zhang, Y. Li, L. Bai, and Y. Ji, “Joint jobs scheduling and
[28] M. M. E. A. Mahmoud, J. Mišić, K. Akkaya, and X. Shen, “Investigating
lightpath provisioning in fog computing micro datacenter networks,” J.
public-key certificate revocation in smart grid,” IEEE Internet Things J.,
Opt. Commun. Netw., vol. 10, no. 7, pp. 152–163, Jul. 2018.
vol. 2, no. 6, pp. 490–503, May 2015.
[5] S. Chen, L. Jiao, F. Liu, and L. Wang, “EdgeDR: An online mecha-
[29] X. Lv, Y. Mu, and H. Li, “Key distribution for heterogeneous public-key
nism design for demand response in edge clouds,” IEEE Trans. Parallel
cryptosystems,” J. Commun. Netw., vol. 15, no. 5, pp. 464–468, 2013.
Distrib. Syst., vol. 33, no. 2, pp. 343–358, Feb. 2022.
[6] R. Zhu, S. Li, P. Wang, M. Xu, and S. Yu, “Energy-efficient deep [30] A. Cohen, R. G. L. D’Oliveira, S. Salamatian, and M. Médard, “Network
reinforced traffic grooming in elastic optical networks for cloud-fog coding-based post-quantum cryptography,” IEEE J. Sel. Areas Inf.
computing,” IEEE Internet Things J., vol. 8, no. 15, pp. 12410–12421, Theory, vol. 2, no. 1, pp. 49–64, Mar. 2021.
Aug. 2021. [31] S. A. Latif et al., “AI-empowered, blockchain and SDN integrated secu-
[7] J. Ren, G. Yu, Y. He, and G. Y. Li, “Collaborative cloud and edge rity architecture for IoT network of cyber physical systems,” Comput.
computing for latency minimization,” IEEE Trans. Veh. Technol., vol. 68, Commun., vol. 181, pp. 274–283, Jan. 2022.
no. 5, pp. 5031–5044, May 2019. [32] D. Ngabo, D. Wang, C. Iwendi, J. H. Anajemba, L. A. Ajao, and
[8] C. Iwendi, S. Rehman, A. Javed, S. Khan, and G. Srivastava, C. Biamba, “Blockchain-based security mechanism for the medical data
“Sustainable security for the Internet of Things using artificial intel- at fog computing architecture of Internet of Things,” Electronics, vol. 10,
ligence architectures,” ACM Trans. Internet Technol., vol. 21, no. 3, no. 17, p. 2110, Aug. 2021.
pp. 1–22, Aug. 2021. [33] J. Feng, F. R. Yu, Q. Pei, X. Chu, J. Du, and L. Zhu, “Cooperative
[9] M. Chehimi and W. Saad, “Entanglement rate optimization in hetero- computation offloading and resource allocation for blockchain-enabled
geneous quantum communication networks,” in Proc. 17th Int. Symp. mobile-edge computing: A deep reinforcement learning approach,” IEEE
Wireless Commun. Syst. (ISWCS), Sep. 2021, pp. 1–6. Internet Things J., vol. 7, no. 7, pp. 6214–6228, Jul. 2020.
[10] S. Zhang, S. Shi, C. Qian, and K. L. Yeung, “Fragmentation-aware entan- [34] D. Wu and N. Ansari, “A cooperative computing strategy for blockchain-
glement routing for quantum networks,” J. Lightw. Technol., vol. 39, secured fog computing,” IEEE Internet Things J., vol. 7, no. 7,
no. 14, pp. 4584–4591, Jul. 14, 2021. pp. 6603–6609, Jul. 2020.
[11] P. Kumavor, L. Cherian, E. Donkor, B. C. Wang, and S. F. Yelin, [35] H. Wu, K. Wolter, P. Jiao, Y. Deng, Y. Zhao, and M. Xu, “EEDTO:
“Comparison of four multi-user quantum key distribution schemes over An energy-efficient dynamic task offloading algorithm for blockchain-
passive optical networks,” in Proc. Opt. Fiber Commun. Conf. (OFC), enabled IoT-edge-cloud orchestrated computing,” IEEE Internet Things
Feb. 2004, p. 205. J., vol. 8, no. 4, pp. 2163–2176, Feb. 2021.
[12] W. Maeda, A. Tanaka, S. Takahashi, A. Tajima, and A. Tomita, [36] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst.
“Technologies for quantum key distribution networks integrated with Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949.
optical communication networks,” IEEE J. Sel. Topics Quant. Electron., [37] L. K. Grover, “Quantum mechanics helps in searching for a needle in
vol. 15, no. 6, pp. 1591–1601, Nov./Dec. 2009. a haystack,” Phys. Rev. Lett., vol. 79, no. 2, pp. 325–328, Jul. 1997.
[13] H. K. Lo, M. Curty, and K. Tamaki, “Secure quantum key distribution,” [38] Y. Zhao et al., “Resource allocation in optical networks secured by quan-
Nat. Photon., vol. 8, pp. 595–604, Jul. 2014. tum key distribution,” IEEE Commun. Mag., vol. 56, no. 8, pp. 130–137,
[14] H. K. Lo and H. F. Chau, “Unconditional security ofquantum key dis- Aug. 2018.
tribution over arbitrarily long distances,” Science, vol. 283, no. 5410, [39] W. Ma et al., “Equilibrium allocation approaches of quantum key
pp. 2050–2056, 1999. resources with security levels in QKD-enabled optical data center
[15] M Peev et al., “The SECOQC quantum key distribution network in networks,” IEEE Internet Things J., vol. 9, no. 24, pp. 25660–25672,
Vienna,” New J. Phys., vol. 11, no. 7, 2009, Art. no. 075001. Dec. 2022.
[16] M Sasaki et al., “Field test of quantum key distribution in the Tokyo [40] E. E. Moghaddam, H. Beyranvand, and J. A. Salehi, “Resource alloca-
QKD Network,” Opt. Exp., vol. 19, no. 11, pp. 10387–10409, 2011. tion in space division multiplexed elastic optical networks secured with
[17] Q Zhang et al., “Large scale quantum key distribution: Challenges and quantum key distribution,” IEEE J. Sel. Areas Commun., vol. 39, no. 9,
solutions,” Opt. Exp., vol. 26, no. 18, pp. 24260–24273, 2018. pp. 2688–2700, Sep. 2021.
[18] R. Alléaume et al., “Using quantum key distribution for crypto- [41] H. Wang, Y. Zhao, A. Nag, X. Yu, X. He, and J. Zhang, “End-to-
graphic purposes: A survey,” Theor. Comput. Sci., vol. 560, pp. 62–81, end quantum key distribution (QKD) from metro to access networks,”
Dec. 2014. in Proc. 16th Int. Conf. Design Rel. Commun. Netw. (DRCN), 2020,
[19] Z. Yuan et al., “10-Mb/s quantum key distribution,” J. Lightw. Technol., pp. 1–5.
vol. 36, no. 16, pp. 3427–3433, Aug. 15, 2018. [42] A. Aguado, V. Lopez, J. Martinez-Mateo, M. Peev, D. Lopez, and
[20] “Quantum key distribution networks—Key management,” ITU, Geneva, V. Martin, “Virtual network function deployment and service automation
Switzerland, ITU Recommandation Y.3803, 2020. to provide end-to-end quantum encryption,” IEEE/OSA J. Opt. Commun.
[21] W. Wang et al., “Infrastructure-efficient virtual-machine placement and Netw., vol. 10, no. 4, pp. 421–430, Apr. 2018.
workload assignment in cooperative edge-cloud computing over back- [43] K. Dong, Y. Zhao, A. Nag, X. Yu, and J. Zhang, “Distributed
haul networks,” IEEE Trans. Cloud Comput., early access, Aug. 27, subkey-relay-tree-based secure multicast scheme in quantum data center
2021, doi: 10.1109/TCC.2021.3107596. networks,” Opt. Eng., vol. 59, no. 6, 2020, Art. no. 065102.
[22] W. Ke, Y. Wang, M. Ye, and J. Chen, “A priority-based multicast flow [44] Y. Cao, Y. Zhao, C. Colman-Meixner, X. Yu, and J. Zhang, “Key
scheduling method for a collaborative edge storage datacenter network,” on demand (KoD) for software-defined optical networks secured
IEEE Access, vol. 9, pp. 79793–79805, 2021. by quantum key distribution (QKD),” Opt. Exp., vol. 25, no. 22,
[23] N. Wang, W. Shao, S. K. Bose, and G. Shen, “MixCo: Optimal coop- pp. 26453–26467, 2017.
erative caching for mobile edge computing in fiber-wireless access [45] Y. Cao, Y. Zhao, J. Wang, X. Yu, Z. Ma, and J. Zhang, “KaaS: Key
networks,” in Proc. Opt. Fiber Commun. Conf. Exposit. (OFC), 2018, as a service over quantum key distribution integrated optical networks,”
pp. 1–3. IEEE Commun. Mag., vol. 57, no. 5, pp. 152–159, May 2019.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.
10932 IEEE INTERNET OF THINGS JOURNAL, VOL. 10, NO. 12, 15 JUNE 2023
[46] A. Aguado et al., “Secure NFV orchestration over an SDN-controlled Xiaosong Yu (Member, IEEE) received the Ph.D. degree from Beijing
optical network with time-shared quantum key distribution resources,” University of Posts and Telecommunications (BUPT), Beijing, China, in 2015.
J. Lightw. Technol., vol. 35, no. 8, pp. 1357–1362, Apr. 15, 2017. From September 2013 to September 2014, he was a Visiting Scholar
[47] A. Aguado et al., “The engineering of software-defined quantum key with UC Davis, Davis, CA, USA. He is currently with the State Key
distribution networks,” IEEE Commun. Mag., vol. 57, no. 7, pp. 20–26, Laboratory of Information Photonics and Optical Communications, BUPT.
Jul. 2019. His research focuses on quantum key distribution optical networks, optical
[48] M. Xu et al., “Quantum-secured space-air-ground integrated networks: network optimization, and software-defined optical networks.
Concept, framework, and case study,” IEEE Wireless Commun., early
access, Oct. 10, 2022, doi: 10.1109/MWC.008.2200163.
[49] M. Xu et al., “Privacy-preserving intelligent resource allocation for fed-
erated edge learning in quantum Internet,” Oct. 2022, arXiv:2210.04308. Yongli Zhao (Senior Member, IEEE) received the B.S. degree in communica-
[50] M. Tang, L. Gao and J. Huang, “Communication, computation, and tion engineering and the Ph.D. degree in electromagnetic field and microwave
caching resource sharing for the Internet of Things,” IEEE Commun. technology from Beijing University of Posts and Telecommunications
Mag., vol. 58, no. 4, pp. 75–80, Apr. 2020. (BUPT), Beijing, China, in 2005 and 2010, respectively.
[51] “Spectral grids for WDM applications: DWDM frequency grid,” ITU, During January 2016 to January 2017, he was a Visiting Associate
Geneva, Switzerland, ITU Recommendation G.694.1, 2012. Professor with UC Davis, Davis, CA, USA. He is currently a Professor with
[52] M. Tahon et al., “Valuing flexibility in the migration to flexible- the Institute of Information Photonics and Optical Communications, BUPT,
grid networks [invited],” J. Opt. Commun. Netw., vol. 5, no. 10, pp. where he has been a Full Professor since 2018. He has published more than
A184–A191, Oct. 2013. 300 international journal and conference papers. His research focuses on
[53] X. Xia, F. Chen, Q. He, J. C. Grundy, M. Abdelrazek, and H. Jin, “Cost- F5G, software-defined optical networks, elastic optical networks, and optical
effective app data distribution in edge computing,” IEEE Trans. Parallel network security.
Distrib. Syst., vol. 32, no. 1, pp. 31–44, Jan. 2021.
[54] S. Luo, X. Chen, and Z. Zhou, “F3C: Fog-enabled joint computation,
communication and caching resource sharing for energy-efficient IoT
data stream processing,” in Proc. IEEE 39th Int. Conf. Distrib. Comput. Avishek Nag (Senior Member, IEEE) received the B.E. degree (Hons.) from
Syst. (ICDCS), 2019, pp. 1019–1028. Jadavpur University, Kolkata, India, in 2005, the M.Tech. degree from Indian
[55] Y. Wei, F. R. Yu, M. Song, and Z. Han, “Joint optimization of caching, Institute of Technology Kharagpur, Kharagpur, India, in 2007, and the Ph.D.
computing, and radio resources for fog-enabled IoT using natural actor– degree from the University of California at Davis, Davis, CA, USA, in 2012.
critic deep reinforcement learning,” IEEE Internet Things J., vol. 6, He is currently an Assistant Professor with the School of Electrical
no. 2, pp. 2061–2073, Apr. 2019. and Electronic Engineering, University College Dublin, Dublin, Ireland. He
[56] B. Charyyev, E. Arslan, and M. H. Gunes, “Latency comparison of worked as a Research Associate with the CONNECT Centre for Future
cloud datacenters and edge servers,” in Proc. IEEE Global Commun. Networks and Communication, Trinity College Dublin, Dublin, before joining
Conf. (GLOBECOM), 2020, pp. 1–6. University College Dublin. His research interests include, but are not limited
to cross-layer optimization in wired and wireless networks, network reliability,
mathematics of networks (optimization, graph theory), network virtualization,
software-defined networks, machine learning, data analytics, blockchain, and
the Internet of Things.
Dr. Nag is the Outreach Lead for Ireland for the IEEE U.K. and Ireland
Blockchain Group.
Authorized licensed use limited to: University of Leeds. Downloaded on December 04,2024 at 21:33:17 UTC from IEEE Xplore. Restrictions apply.