• Title/Summary/Keyword: Scalable Service

Search Result 302, Processing Time 0.021 seconds

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

A Secure, Hierarchical and Clustered Multipath Routing Protocol for Homogenous Wireless Sensor Networks: Based on the Numerical Taxonomy Technique

  • Hossein Jadidoleslamy
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.121-136
    • /
    • 2023
  • Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. Some problems of WSNs are: severe resources' constraints, low reliability and fault tolerant, low throughput, low scalability, low Quality of Service (QoS) and insecure operational environments. One significant solution against mentioned problems is hierarchical and clustering-based multipath routing. But, existent algorithms have many weaknesses such as: high overhead, security vulnerabilities, address-centric, low-scalability, permanent usage of optimal paths and severe resources' consumption. As a result, this paper is proposed an energy-aware, congestion-aware, location-based, data-centric, scalable, hierarchical and clustering-based multipath routing algorithm based on Numerical Taxonomy technique for homogenous WSNs. Finally, performance of the proposed algorithm has been compared with performance of LEACH routing algorithm; results of simulations and statistical-mathematical analysis are showing the proposed algorithm has been improved in terms of parameters like balanced resources' consumption such as energy and bandwidth, throughput, reliability and fault tolerant, accuracy, QoS such as average rate of packet delivery and WSNs' lifetime.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

The mechanism for constructing an efficient SSENS Routing in SVC Multimedia Broadcast Service (SVC 멀티미디어 방송 서비스를 위한 효율적인 SSENS 라우팅 구성 방안)

  • Kwak, Yong-Wan;Im, Dong-Gi;Nam, Ji-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1188-1191
    • /
    • 2011
  • IPTV 방송에서 인터넷 기반 멀티캐스트는 일대다 또는 다대다 통신을 위한 차세대 중요한 서비스로 주목 받고 있다. 멀티캐스트는 네트워크 또는 애플리케이션 레벨에서 서비스할 수 있다. IP 멀티캐스트는 소스노드에서 라우터로 데이터그램을 보내면 라우터가 이를 복제하여 수신노드들에게 전달해 주는 네트워크레벨 서비스로 네트워크 자원을 효율적 사용할 수 있다. 그러나 네트워크에 IP 멀티캐스트 라우터가 설치되어야 하는 등 여러 문제로 인해 널리 사용되지 못하고 있다. 따라서 대안으로 애플리케이션 레벨에서의 오버레이 멀티캐스트가 주목 받고 있다. 오버레이 멀티캐스트는 종단호스트가 라우터처럼 동작하는 것으로 비록 IP 멀티캐스트에 비해서 링크 사용율과 지연 값이 높아질 수 있지만, IP 멀티캐스트의 현실적인 적용의 어려움을 해결할 수 있는 장점을 가지고 있다. 본 논문에서는 IP 멀티캐스트가 제공되지 않는 네트워크에서 효율적인 SVC(Scalable Video Coding) 멀티미디어 방송서비스와 SSENS(SVC Stream Exchange Network Server) 라우팅을 위한 MST(Minimum Spanning tree)를 목적으로 하는 오버레이 멀티캐스트 트리를 구현하는 알고리즘을 설계한다. 제안된 알고리즘의 성능 분석을 위해 시뮬레이션을 통해 패킷 손실 측면에서 Prim 알고리즘에 비해 평균 패킷 손실율이 40% 가까이 향상됨을 증명하였다.

P2P-based Group Communication Management Using Smart Mobile Device (스마트 이동 단말을 이용한 P2P 기반 그룹 통신 관리)

  • Chun, Seung-Man;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.18-26
    • /
    • 2012
  • As the performance of the next-generation broadband wireless networks is dramatically enhanced, various services (i.e., education, video conferencing, online games, etc.) have been provided to users through a smart mobile platform. Since those services are usually provided by using the centralized architecture, it is difficult for a lot of users to provide the scalable communication service with regard to traffic management. To solve these problems, we have proposed an architecture of P2P-based group communication management scheme using smart mobile device. More specifically, we design the group management protocol and algorithm for the group member management and the traffic management. By using these methods, the mobile multimedia streaming service can be provided with scalability. In order to verify the performance of the proposed scheme, we have mathematically analyzed the performance in terms of the average transmission delay and bandwidth utilization.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Adaptive Multi-stream Transmission Technique based on SPIHT Video Signal (SPIHT기반 비디오 신호의 적응적 멀티스트림 전송기법)

  • 강경원;정태일;류권열;권기룡;문광석
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.697-703
    • /
    • 2002
  • In this paper, we propose the adaptive multi stream transmission technique based on SPIHT video signal for the highest quality service over the current Internet that does not guarantee QoS. In addition to the reliable transmission of the video stream over the asynchronous packet network, the proposed approach provides the transmission using the adaptive frame pattern control and multi steam over the TCP for continuous replay. The adaptive frame pattern control makes the transmission date scalable in accordance with the client's buffer status. Apart from this, the multi stream transmission improves the efficiency of video stream, and is robust to the network jitter problem, and maximally utilizes the bandwidth of the client's. As a result of the experiment, the DR(delay ratio) in the proposed adaptive multi-stream transmission is more close to zero than in the existing signal stream transmission, which enables the best-efforts service to be implemented.

  • PDF

Performance Analysis about the Failure Restoration Scheme Using a Multi-path in Hierarchical MPLS Networks (계층형 MPLS 네트워크에서 다중 경로를 이용한 장애 복구 방안에 관한 성능 분석)

  • Jang, Seong-Jin;Kim, Ki-Yong;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.61-64
    • /
    • 2007
  • MPLS networks architectures have been prevailed as scalable approach to provide quality of service in the Internet. Many researches have been mainly focused on scalability and multi-path calculation scheme for failure restoration. However, the MPLS network have an scalability problem about traffic, and the existing failure restoration methods are wasted resources, and it has the problem that loss of a packet by a lot of delay occurs in too. Therefore in this paper, we propose a H-MPLS (Hierachical-Multiprotocol Label Switching)network for rapidly failure restorations and effective management of network extended. The proposed H-MPLS Network apply LSP multi-path routing algorithm and consists of several MPLS. After comparing the performance among the existing failure restoration methods with various network models, we use NS simulator in order to analyze the performance. Finally, we present an improvement scheme of the efficiency and scalability.

  • PDF

Scalable Overlay Multicast supporting QoS and Reliability (QoS와 신뢰성을 제공하는 확장성 있는 오버레이 멀티캐스트)

  • Rhee, Choon-Sung;Song, Jung-Wook;Choi, Byoung-Uk;Han, Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.767-774
    • /
    • 2006
  • In order to support overlay multicast with scalability and reliability, in this paper, we introduced a new multicast tree construction method and a regional multicast. The architecture we introduce efficiently transmits streaming data to the users from multicast source in an environment in which non-multicast network and multicast network. The new multicast tree construction method enables the connection with a remote relay which is an optimum condition in case there is no relay in subnet. Besides, by defining a new service type to traffic class of IPv6 header, a selective adoption or FEC and a distinctive transmission became possible. In order to verify the effect of the solution we suggested, we embodied an environment which is similar to the actual service environment by a simulator and tested it. The result of the test shows that the proposed method is more efficient than the traditional unicast approach method and the existing overlay multicast.

Analysis of Component Performance using Open Source for Guarantee SLA of Cloud Education System (클라우드 교육 시스템의 SLA 보장을 위한 오픈소스기반 요소 성능 분석)

  • Yoon, JunWeon;Song, Ui-Sung
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.167-173
    • /
    • 2017
  • As the increasing use of the cloud computing, virtualization technology have been combined and applied a variety of requirements. Cloud computing has the advantage that the support computing resource by a flexible and scalable to users as they want and it utilized in a variety of distributed computing. To do this, it is especially important to ensure the stability of the cloud computing. In this paper, we analyzed a variety of component measurement using open-source tools for ensuring the performance of the system on the education system to build cloud testbed environment. And we extract the performance that may affect the virtualization environment from processor, memory, cache, network, etc on each of the host machine(Host Machine) and a virtual machine (Virtual Machine). Using this result, we can clearly grasp the state of the system and also it is possible to quickly diagnose the problem. Furthermore, the cloud computing can be guaranteed the SLA(Service Level Agreement).