DOI QR코드

DOI QR Code

Range Segmentation of Dynamic Offloading (RSDO) Algorithm by Correlation for Edge Computing

  • Kang, Jieun (Dept. of IT Engineering, Sookmyung Women's University) ;
  • Kim, Svetlana (Dept. of IT Engineering, Sookmyung Women's University) ;
  • Kim, Jae-Ho (Dept. of Electronics and Information Engineering, Sejong University) ;
  • Sung, Nak-Myoung (Korea Electronics Technology Institute (KETI)) ;
  • Yoon, Yong-Ik (Dept. of IT Engineering, Sookmyung Women's University)
  • Received : 2021.01.21
  • Accepted : 2021.06.27
  • Published : 2021.10.31

Abstract

In recent years, edge computing technology consists of several Internet of Things (IoT) devices with embedded sensors that have improved significantly for monitoring, detection, and management in an environment where big data is commercialized. The main focus of edge computing is data optimization or task offloading due to data and task-intensive application development. However, existing offloading approaches do not consider correlations and associations between data and tasks involving edge computing. The extent of collaborative offloading segmented without considering the interaction between data and task can lead to data loss and delays when moving from edge to edge. This article proposes a range segmentation of dynamic offloading (RSDO) algorithm that isolates the offload range and collaborative edge node around the edge node function to address the offloading issue.The RSDO algorithm groups highly correlated data and tasks according to the cause of the overload and dynamically distributes offloading ranges according to the state of cooperating nodes. The segmentation improves the overall performance of edge nodes, balances edge computing, and solves data loss and average latency.

Keywords

Acknowledgement

This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-01456, AutoMaTa: Autonomous Management framework based on artificial intelligent technology for adaptive and disposable IoT). This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. NRF-2019R1I1A1A01064054).

References

  1. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: architecture, enabling technologies, security and privacy, and applications," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, 2017. https://doi.org/10.1109/JIOT.2017.2683200
  2. A. Colakovic and M. Hadzialic, "Internet of Things (IoT): a review of enabling technologies, challenges, and open research issues," Computer Networks, vol. 144, pp. 17-39, 2018. https://doi.org/10.1016/j.comnet.2018.07.017
  3. T. Kawakami, "A structured overlay network scheme based on multiple different time intervals," Journal of Information Processing Systems, vol. 16, no. 6, pp. 1447-1458, 2020. https://doi.org/10.3745/JIPS.04.0198
  4. J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H. J. Kim, "An empower Hamilton loop based data collection algorithm with mobile agent for WSNs," Human-centric Computing and Information Sciences, vol. 9, article no. 18, 2019. https://doi.org/10.1186/s13673-019-0179-4
  5. L. Zhou and Y. Shan, "Privacy-preserving, energy-saving data aggregation scheme in wireless sensor networks," Journal of Information Processing Systems, vol. 16, no. 1, pp. 83-95, 2020. https://doi.org/10.3745/JIPS.03.0131
  6. L. Tran, H. To, L. Fan, and C. Shahabi, "A real-time framework for task assignment in hyperlocal spatial crowdsourcing," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 9, no. 3, article no. 37, 2018. https://doi.org/10.1145/3078853
  7. Z. Lu, X. Sun, and T. La Porta, "Cooperative data offload in opportunistic networks: from mobile devices to infrastructure," IEEE/ACM Transactions on Networking, vol. 25, no. 6, pp. 3382-3395, 2017. https://doi.org/10.1109/TNET.2017.2747621
  8. B. Li, M. He, W. Wu, A. K. Sangaiah, and G. Jeon, "Computation offloading algorithm for arbitrarily divisible applications in mobile edge computing environments: an OCR case," Sustainability, vol. 10, no. 5, article no. 1611, 2018. https://doi.org/10.3390/su10051611
  9. W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. https://doi.org/10.1002/spe.2163
  10. W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: privacy-preserving data aggregation in wireless sensor networks," in Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM), Anchorage, AK, 2007, pp. 2045-2053.
  11. H. He, L. H. Zheng, P. Li, L. Deng, L. Huang, and X. Chen, "An efficient attribute-based hierarchical data access control scheme in cloud computing," Human-centric Computing and Information Sciences, vol. 10, article no. 49, 2020. https://doi.org/10.1186/s13673-020-00255-5
  12. H. Kim and S. Lee, "Document summarization model based on general context in RNN," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1378-1391, 2019. https://doi.org/10.3745/JIPS.02.0123
  13. M. J. J. Ghrabat, G. Ma, I. Y. Maolood, S. S. Alresheedi, and Z. A. Abduljabbar, "An effective image retrieval based on optimized genetic algorithm utilized a novel SVM-based convolutional neural network classifier," Human-centric Computing and Information Sciences, vol. 9, article no. 31, 2019. https://doi.org/10.1186/s13673-019-0191-8
  14. Y. Bengio, Learning Deep Architectures for AI. Hanover, MA: Now Publisher, 2009.
  15. C. Zhang, P. Patras, and H. Haddadi, "Deep learning in mobile and wireless networking: a survey," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2224-2287, 2019. https://doi.org/10.1109/COMST.2019.2904897
  16. W. Lin, C. Liang, J. Z. Wang, and R. Buyya, "Bandwidth-aware divisible task scheduling for cloud computing," Software: Practice and Experience, vol. 44, no. 2, pp. 163-174, 2014. https://doi.org/10.1002/spe.2163
  17. J. Kang, S. Kim, J. Kim, N. Sung, and Y. Yoon, "Dynamic offloading model for distributed collaboration in edge computing: a use case on forest fires management," Applied Sciences, vol. 10, no. 7, article no. 2334, 2020. https://doi.org/10.3390/app10072334
  18. X. A. Yan, W. Q. Shi, and H. Tian, "Cloud storage security deduplication scheme based on dynamic bloom filter," Journal of Information Processing Systems, vol. 15, no. 6, pp. 1265-1276, 2019. https://doi.org/10.3745/JIPS.04.0143
  19. C. T. Yang, S. T. Chen, Y. W. Chan, and Y. C. Shen, "On construction of a cloud storage system with heterogeneous software-defined storage technologies," Human-centric Computing and Information Sciences, vol. 9, article no. 12, 2019. https://doi.org/10.1186/s13673-019-0173-x