Computation Offloading for Smart Devices in Fog-Cloud Queuing System

被引:23
作者
Sufyan, Farhan [1 ]
Banerjee, Amit [1 ]
机构
[1] South Asian Univ, Dept Comp Sci, New Delhi 110021, India
关键词
Computation offloading; Fog-Cloud computing; queuing theory; smart devices (SDs); MOBILE; INTERNET; ENERGY; OPTIMIZATION;
D O I
10.1080/03772063.2020.1870876
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advancements in sensor and hardware technology have surged the growth of smart devices (SDs), including smartphones, and wearable devices. The data generated by the built-in sensors are utilized by different applications such as health-care, smart-city, and connected-vehicles. However, due to the computation and energy limitations of the SDs, they often need to offload the computation-intensive tasks for processing to the remote server. The cloud-based offloading can meet various applications' demands, but due to high network latency, it is inefficient for real-time applications. Fog computing provides an alternative for the same, as it aggregates the fog nodes' resources at the edge of the network to meet the computational requirements of the real-time applications. In this paper, we consider a Fog-Cloud architecture consisting of multiple SDs, fog nodes, and the cloud. We use appropriate queuing models to simulate the traffic delay at different network elements and formulate a non-linear multi-objective optimization problem to minimize the energy consumption, execution delay, and cost of remote execution. Finally, the Stochastic Gradient descent (SGD) algorithm based solution approach is proposed that jointly optimizes offloading probability and transmission power to find the optimal trade-off between the offloading objectives. Simulation results show the effectiveness and the efficiency of the proposed system validated by the results.
引用
收藏
页码:1509 / 1521
页数:13
相关论文
共 40 条
  • [1] On Protecting Data Storage in Mobile Cloud Computing Paradigm
    Abdalla, Al-kindy Athman
    Pathan, Al-Sakib Khan
    [J]. IETE TECHNICAL REVIEW, 2014, 31 (01) : 82 - 91
  • [2] Alam MGR, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), P285, DOI 10.1109/ICOIN.2016.7427078
  • [3] Cyber Foraging: Fifteen Years Later
    Balan, Rajesh Krishna
    Flinn, Jason
    [J]. IEEE PERVASIVE COMPUTING, 2017, 16 (03) : 24 - 30
  • [4] Banerjee A, 2018, CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), P78, DOI 10.1109/INFOCT.2018.8356844
  • [5] Bertsekas D. P., 1999, Athena Scientific Optimization and Computation Series, V2nd
  • [6] Large-Scale Machine Learning with Stochastic Gradient Descent
    Bottou, Leon
    [J]. COMPSTAT'2010: 19TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL STATISTICS, 2010, : 177 - 186
  • [7] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [8] A Survey of Big Data Security and Privacy Preserving
    Fang, Wei
    Wen, Xue Zhi
    Zheng, Yu
    Zhou, Ming
    [J]. IETE TECHNICAL REVIEW, 2017, 34 (05) : 544 - 560
  • [9] Complexity of gradient descent for multiobjective optimization
    Fliege, J.
    Vaz, A. I. F.
    Vicente, L. N.
    [J]. OPTIMIZATION METHODS & SOFTWARE, 2019, 34 (05) : 949 - 959
  • [10] Mobile Code Offloading: From Concept to Practice and Beyond
    Flores, Huber
    Hui, Pan
    Tarkoma, Sasu
    Li, Yong
    Srirama, Satish
    Buyya, Rajkumar
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (03) : 80 - 88