Computation Offloading Scheme Classification Using Cloud-Edge Computing for Internet of Vehicles (IoV)

被引:0
作者
Gourav, Kumar [1 ]
Kaur, Amanpreet [2 ]
机构
[1] Chandigarh Univ, Univ Inst Comp, Chandigarh, India
[2] Chitkara Univ, Inst Engn & Technol, Rajpura, Punjab, India
来源
INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 1 | 2023年 / 473卷
关键词
Internet of Things (IoT); Edge computing; Cloud computing; Computation offloading; Internet of Vehicles (IoV); ARCHITECTURE; NETWORKING; DELAY; MODEL;
D O I
10.1007/978-981-19-2821-5_39
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, there is development in the field of computing devices; Internet of Things (IoT) becomes the latest trend. IoT comprises ubiquitous things that are associated with day-to-day life of individuals like smartphones, smart TV, laptops, and now vehicles too. Internet of Vehicles (IoV) has become the latest area of research used to develop applications in the field of traffic management and road safety. A collaborative approach of cloud and edge computing is termed cloud-edge computing. To manage the enormous amount of IoT devices and the coordination among IoT, the cloud and edge concept of computation offloading is required. In the process of computation offloading, tasks are computationally offloaded to the cloud data center that enhances the resource utilization of the cloud server and minimizes the energy utilization for the tasks. This paper represents the literature review related to various computational offloading schemes in cloud-edge computing proposed as part of the study. The resources comprise of related book chapters and research papers from different publishers of international and national reputes. The study is carried out with the analysis of various computation offloading schemes in cloud-edge computing for the Internet of Vehicles. In addition, computing technologies like cloud computing, edge computing, and computation offloading for the Internet of Vehicles (IoV) were also discussed.
引用
收藏
页码:459 / 485
页数:27
相关论文
共 67 条
[1]  
Akherfi Khadija, 2018, Applied Computing and Informatics, V14, P1, DOI 10.1016/j.aci.2016.11.002
[2]  
[Anonymous], 2013, SYNCHRONIZATION TELE
[3]  
ArunaraniAR ManjulaD, 2019, FUTUR GENER COMPUT S, VFuturGenerComputSyst91, P407
[4]   How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions [J].
Baktir, Ahmet Cihat ;
Ozgovde, Atay ;
Ersoy, Cem .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04) :2359-2391
[5]   Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory [J].
Cheang, Chak Fong ;
Wang, Yiqin ;
Cai, Zhiping ;
Xu, Gen .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 57 (02) :297-306
[6]   Delay-Optimized V2V-Based Computation Offloading in Urban Vehicular Edge Computing and Networks [J].
Chen, Chen ;
Chen, Lanlan ;
Liu, Lei ;
He, Shunfan ;
Yuan, Xiaoming ;
Lan, Dapeng ;
Chen, Zhuang .
IEEE ACCESS, 2020, 8 :18863-18873
[7]  
Contreras-Castillo J, 2017, J INFORM TELECOMMUN, V1, P4, DOI 10.1080/24751839.2017.1295601
[8]  
Dai Y., 2018, 2018 IEEE GLOB COMM, P1, DOI DOI 10.1109/GLOCOM.2018.8648004
[9]   A survey on device-to-device (D2D) communication: Architecture and security issues [J].
Gandotra, Pimmy ;
Jha, Rakesh Kumar ;
Jain, Sanjeev .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 78 :9-29
[10]   Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition [J].
Gao, Zan ;
Xuan, Hai-Zhen ;
Zhang, Hua ;
Wan, Shaohua ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06) :9280-9293