• Title/Summary/Keyword: Utility computing

Search Result 104, Processing Time 0.031 seconds

Dynamic Computation Offloading Based on Q-Learning for UAV-Based Mobile Edge Computing

  • Shreya Khisa;Sangman Moh
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.68-76
    • /
    • 2023
  • Emerging mobile edge computing (MEC) can be used in battery-constrained Internet of things (IoT). The execution latency of IoT applications can be improved by offloading computation-intensive tasks to an MEC server. Recently, the popularity of unmanned aerial vehicles (UAVs) has increased rapidly, and UAV-based MEC systems are receiving considerable attention. In this paper, we propose a dynamic computation offloading paradigm for UAV-based MEC systems, in which a UAV flies over an urban environment and provides edge services to IoT devices on the ground. Since most IoT devices are energy-constrained, we formulate our problem as a Markov decision process considering the energy level of the battery of each IoT device. We also use model-free Q-learning for time-critical tasks to maximize the system utility. According to our performance study, the proposed scheme can achieve desirable convergence properties and make intelligent offloading decisions.

Task offloading under deterministic demand for vehicular edge computing

  • Haotian Li ;Xujie Li ;Fei Shen
    • ETRI Journal
    • /
    • v.45 no.4
    • /
    • pp.627-635
    • /
    • 2023
  • In vehicular edge computing (VEC) networks, the rapid expansion of intelligent transportation and the corresponding enormous numbers of tasks bring stringent requirements on timely task offloading. However, many tasks typically appear within a short period rather than arriving simultaneously, which makes it difficult to realize effective and efficient resource scheduling. In addition, some key information about tasks could be learned due to the regular data collection and uploading processes of sensors, which may contribute to developing effective offloading strategies. Thus, in this paper, we propose a model that considers the deterministic demand of multiple tasks. It is possible to generate effective resource reservations or early preparation decisions in offloading strategies if some feature information of the deterministic demand can be obtained in advance. We formulate our scenario as a 0-1 programming problem to minimize the average delay of tasks and transform it into a convex form. Finally, we proposed an efficient optimal offloading algorithm that uses the interior point method. Simulation results demonstrate that the proposed algorithm has great advantages in optimizing offloading utility.

A Resource Access Control Mechanism Considering Grid Accounting (그리드 어카운팅을 고려한 자원 접근 제어 메커니즘)

  • Hwang Ho-Joen;An Dong-Un;Chung Seung-Jong
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.363-370
    • /
    • 2006
  • Currently, many people have been researching diverse mechansmims related to a resource access control in Grid environment. Mostly Grid user's resource access control was designed to authorize according to their attributes and roles. But, to provide Grid with resources continuously, a resource access based on utility computing must be controlled. So, in this paper we propose and implement mechanism that intergrates Grid accounting concept with resource access control. This mechanism calcuates costs of Grid service on the basis of accounting, and determines based on user's fund availibility whether they continue to make use of site resources or not. Grid jobs will be controlled according to a site resource access control policy only if the amount of available fund is less than its costs. If Grid job completed, resource consumer pays for the costs generated by using provider's idle resources. Therefore, this paper provides mechansim to be able to control user's resource access by Grid accounting, so that it is evaluated as the research to realize utility computing environment corresponding to economic principle.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.

Adaptive QoS Mechanism for Wireless Mobile Network

  • Kim, Kwang-Sik;Uno, Shintaro;Kim, Moo-Wan
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.2
    • /
    • pp.153-172
    • /
    • 2010
  • Wireless mobile multimedia communications have been greatly increased in the number of users, diversity of applications and interface technologies. Wireless mobile networks are being evolved and integrated into IP based core network, so it is necessary to provide sufficient QoS (Quality of Service) mechanism to provide enhanced user's satisfaction. In this paper, we propose a new adaptive QoS mechanism based on utility function borrowed from the field of microeconomics, call setup and handover signaling mechanism integrating QoS and mobility management. Through a simulation, we show that adaptive resource allocation based on user preferences can be realized in the wireless mobile network with some considerations.

Preferences for Supercomputer Resources Using the Logit Model

  • Hyungwook Shim;Jaegyoon Hahm
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.261-267
    • /
    • 2023
  • Public research, which requires large computational resources, utilizes the supercomputers of the National Supercomputing Center in the Republic of Korea. The average utilization rate of resources over the past three years reached 80%. Therefore, to ensure the operational stability of this national infrastructure, specialized centers have been established to distribute the computational demand concentrated in the national centers. It is necessary to predict the computational demand accurately to build an appropriate resource scale. Therefore, it is important to estimate the inflow and outflow of computational demand between the national and specialized centers to size the resources required to construct specialized centers. We conducted a logit model analysis using the probabilistic utility theory to derive the preferences of individual users for future supercomputer resources. This analysis shows that the computational demand share of specialized centers is 59.5%, which exceeds the resource utilization plan of existing specialized centers.

OPTIMAL CONSUMPTION/INVESTMENT AND LIFE INSURANCE WITH REGIME-SWITCHING FINANCIAL MARKET PARAMETERS

  • LEE, SANG IL;SHIM, GYOOCHEOL
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.19 no.4
    • /
    • pp.429-441
    • /
    • 2015
  • We study optimal consumption/investment and life insurance purchase rules for a wage earner with mortality risk under regime-switching financial market conditions, in a continuous time-horizon. We apply the Markov chain approximation method and suggest an efficient algorithm using parallel computing to solve the simultaneous Hamilton-Jaccobi-Bellman equations arising from the optimization problem. We provide numerical results under the utility functions of the constant relative risk aversion type, with which we illustrate the effects of regime switching on the optimal policies by comparing them with those in the absence of regime switching.