M. P. Konzen, A. Lorenzon, M. C. Luizelli, F. Rossi, J. C. Mattos
{"title":"A comprehensive review of task offloading in edge computing","authors":"M. P. Konzen, A. Lorenzon, M. C. Luizelli, F. Rossi, J. C. Mattos","doi":"10.5753/sbesc_estendido.2022.228130","DOIUrl":null,"url":null,"abstract":"Nowadays, mobile applications are demanding compute-intensive use, in addition to the need for lower latency and lower computational costs. Thus, researchers are proposing to bring the computation of these applications closer to the users by offloading these applications to the Edge. In this work, we carried out a comprehensive literature review with the primary objective of investigating the offloading strategies used in the Edge Computing scenario, which restrictions are considered, and the security aspects considered by the strategies. From the selected works, we describe the main optimization objectives of the strategies, which models and algorithms were implemented, which computational constraints were considered, which types of applications, and the security requirements. Finally, we discussed some opportunities and open challenges.","PeriodicalId":305719,"journal":{"name":"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/sbesc_estendido.2022.228130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, mobile applications are demanding compute-intensive use, in addition to the need for lower latency and lower computational costs. Thus, researchers are proposing to bring the computation of these applications closer to the users by offloading these applications to the Edge. In this work, we carried out a comprehensive literature review with the primary objective of investigating the offloading strategies used in the Edge Computing scenario, which restrictions are considered, and the security aspects considered by the strategies. From the selected works, we describe the main optimization objectives of the strategies, which models and algorithms were implemented, which computational constraints were considered, which types of applications, and the security requirements. Finally, we discussed some opportunities and open challenges.