首页 > 最新文献

2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)最新文献

英文 中文
Experimenting with a Fog-computing Architecture for Indoor Navigation 室内导航的雾计算体系结构试验
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795307
Pietro Battistoni, M. Sebillo, G. Vitiello
The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.
本文概述了用于雾和雾计算系统的应用不可知体系结构的框架设计。分析解释了所提议的体系结构如何通过使用低功耗和低成本组件来满足Fog和Mist计算范式的主要特征。它还介绍了一个室内导航系统和一个通知服务作为用例,以评估拟议的框架作为雾计算架构,同时展示它如何应对移动和物联网挑战。
{"title":"Experimenting with a Fog-computing Architecture for Indoor Navigation","authors":"Pietro Battistoni, M. Sebillo, G. Vitiello","doi":"10.1109/FMEC.2019.8795307","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795307","url":null,"abstract":"The present paper outlines the framework design of an Application Agnostic Architecture for Fog and Mist Computing systems. An analysis explains how the proposed architecture satisfies the primary characteristics of a Fog and Mist computing paradigm by using low power and low-cost components. It also introduces an Indoor Navigation System and a Notification service as a use-case, to assess the proposed framework as a Fog-Computing architecture while demonstrating how it can address Mobile and IoT challenges.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122421407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing 基于ECC的基于多接入移动边缘计算的物联网网络轻量级网络安全解决方案
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795315
Eric Gyamfi, J. A. Ansere, Lina Xu
The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.
由于物联网系统中网络威胁的增加,物联网的安全性最近受到了极大的关注。物联网技术有许多用例和现实应用,物联网设备已被工业广泛生产。然而,物联网设备的安全问题尚未完全解决,使这些设备暴露在网络威胁之下。物联网终端设备通常受到资源限制,这使得传统安全解决方案的实施即使不是不可能,也是极其困难的。物联网边缘计算技术的出现使物联网设备能够克服局部资源约束问题。当前的工业革命(工业4.0)要求物联网设备在其数据传输中得到保护,并防止网络入侵。由于许多物联网设备在不安全的互联网上进行应答作为数据传输的手段,因此迫切需要提供一种公钥加密技术来保护这些物联网设备之间的端到端传输。在本文中,我们基于椭圆曲线加密(ECC)技术,提出了一种轻量级的非对称安全解决方案,通过利用物联网边缘计算架构来增强数据的安全传输。我们还成功地在边缘和物联网设备上嵌入了轻量级加密技术。实验结果表明,提出的轻量级ECC安全系统在物联网边缘环境中实施时可以提供更好的实践。
{"title":"ECC Based Lightweight Cybersecurity Solution For IoT Networks Utilising Multi-Access Mobile Edge Computing","authors":"Eric Gyamfi, J. A. Ansere, Lina Xu","doi":"10.1109/FMEC.2019.8795315","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795315","url":null,"abstract":"The Security of the Internet of Things (IoT) has gained great attention recently due to the increased cyber-threats in those systems. IoT technologies have many use cases and real-life applications and the IoT devices have been widely produced by industries. However, the security issue of IoT devices has not been fully resolved, leaving those devices exposing to cyber-threats. IoT end devices are normally resource constraint, which makes the implementation of traditional security solutions extremely hard if not impossible. The emergence of IoT-Edge computing technologies can grant the IoT devices the ability to overcome the local resource constraint problem. The current industrial revolution (Industry 4.0) requires IoT devices to be secured in its data transmission, and protected from network Intrusions. Since many IoT devices reply on the unsecured Internet as a means for data transmission, there is an urgent need to provide a public key cryptographic technique to protect the end-to-end transmission between those IoT devices. In this paper, based on the Elliptic Curve Cryptographic (ECC) technique, we have proposed a lightweight asymmetric security solution to enhance secured transmission of data through utilising the IoT-Edge computing architecture. We also have successfully embedded our lightweight cryptography on the edge, and the IoT device. The experimental results has shown that the proposed lightweight ECC security system can provide better practice when implemented in the IoT-Edge environment.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending 蓝牙应用层包过滤防范蓝源攻击
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795354
Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi
In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.
近年来,蓝牙技术的应用一直是学术界争论的热点。通过蓝牙协议,蓝牙可以实现各种设备之间的短距离数据交换。然而,BlueBorne Attack使得看似稳定的蓝牙协议充满了漏洞。我们将从以下几个方面对BlueBorne攻击进行预测研究:BlueBorne的工作机制、工作方法和有效范围。本项目在综合回顾近年同行评审研究成果的基础上,提出了一种基于应用层的新模型来解决BlueBorne的安全问题。本文认为,与以往的研究相比,该独特模型具有较好的结果和较高的稳定性。
{"title":"Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending","authors":"Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi","doi":"10.1109/FMEC.2019.8795354","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795354","url":null,"abstract":"In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FMEC 2019 Message from the General Chairs FMEC 2019总主席致辞
Pub Date : 2019-06-01 DOI: 10.1109/fmec.2019.8795358
{"title":"FMEC 2019 Message from the General Chairs","authors":"","doi":"10.1109/fmec.2019.8795358","DOIUrl":"https://doi.org/10.1109/fmec.2019.8795358","url":null,"abstract":"","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"30 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lifestyle Risk Association Aggregation 生活方式风险关联汇总
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795326
E. Effiok, E. Liu, Jon Hitchcock
IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.
物联网在医疗保健中的应用,通过记录和分析长期数据,提供了监测和收集与健康相关的生物标志物,特别是与生活方式相关的数据的方法,以提供对患者状态的洞察。为了充分利用这一应用程序,将收集到的患者数据与疾病预测模型联系起来,将产生个性化的疾病进展和预测。人们对各种危险因素进行了广泛的研究,以找出对该疾病的影响。然而,风险因素在医学文献中是碎片化的,通常每个出版物都报告一个或几个风险因素,通常是来自不同研究的几个因素的组合。在本文中,我们提出了一种探索风险因素组合的方法。研究结果将为可用于许多卫生应用的完整风险预测模型奠定基础。
{"title":"Lifestyle Risk Association Aggregation","authors":"E. Effiok, E. Liu, Jon Hitchcock","doi":"10.1109/FMEC.2019.8795326","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795326","url":null,"abstract":"IoT application in health care provides ways to monitor and collect health related biomarkers, in particular, lifestyle related data, by recording and analyzing long-term data, to provide insight to patients’ status. In order to make most use of this application, linking the collected patients’ data with a disease predictive model will generate a personalized disease progression and predictions. Various risk factors have been researched extensively to find the effect on the disease. However, risk factors are fragmented all over medical literature, and often each publication reports on one or a few risk factors, a combination of several of those factors, often from different research. In this paper, we propose an approach to explore the combination of risk factors. The outcome will form a base for a complete risk prediction model that can be used for many health applications.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126451134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust 基于分布式信任的HSDN-GRA车载路由协议南向接口保护
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795333
Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah
The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.
近年来,无线技术的进步将汽车工业推向了数字化世界,多种通信系统形成了车联网(IoV)。由于车辆的无线和动态特性,这些通信系统受到干扰和改变。车联网旨在基于云计算的优势,整合新的信息服务、安全应用和互联网服务,试图提高道路的安全性和舒适性。这些服务的部署需要在车辆之间以安全的方式交换消息。因此,路由和安全主题对于提供高质量的服务和保持数据完整性至关重要。软件定义网络(SDN)体系结构可以保证这两个问题。本文的目的是,首先介绍SDN架构对车用网络的影响。此外,由于路由协议的鲁棒性取决于路由规则的完整性和真实性,本文还对HSDN-GRA车载路由协议进行了改进。这种改进开发了一种分布式信任模型,旨在保护控制平面和数据平面之间的通信。目标是确保所定义的半集中式控制器与其他车辆之间的南向接口,以及车对车(V2V)通信。
{"title":"Securing Southbound Interface of HSDN-GRA Vehicular Routing Protocol using a Distributed Trust","authors":"Lylia Alouache, M. Maachaoui, M. Aliouat, Rachid Chelouah","doi":"10.1109/FMEC.2019.8795333","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795333","url":null,"abstract":"The progress of wireless technologies in recent years has tipped the automotive industry towards the digital world with multiple communication systems forming Internet of Vehicles (IoV). These communication systems are subject to disturbances and alterations due to the wireless and dynamic characteristics of vehicles. IoV aims to integrate new information services, safety applications, and internet services, based on the benefits of cloud computing, It tries to improve safety and comfort on the road. The deployment of these services requires messages to be exchanged between the vehicles in a secure manner. Consequently, routing and security topics are crucial to provide a quality of services and to preserve the data integrity. The Software Defined Networking (SDN) architecture is the way that can guarantee these two issues. The purpose of this paper is, firstly, to present the impact of SDN architecture in a vehicular network. Besides, as the robustness of the routing protocols depends on the integrity and authenticity of the routing rules, an improvement of the HSDN-GRA vehicular routing protocol is also described. This improvement develops a distributed trust model and aims to secure the communication between the control plane and the data plane. The goal is to secure the southbound interface between the defined semi-centralized controller and the other vehicles, as well as the Vehicle to Vehicle (V2V) communication.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-awareness of Users in our Cloudy Smart World 云智能世界中用户的隐私意识
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795310
G. Varkonyi, A. Kertész, Szilvia Varadi
Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.
信息和通信技术(ICT)的最新进展正在通过在互联智能设备上运行的智能应用程序扩展互联网服务的世界。云计算已经开始主导互联网,随着物联网(IoT)、雾和边缘计算的出现,形成了IoT-Fog-Cloud系统。除了这些架构上的发展,人工智能(AI)方法通过管理来自这些复杂、异构系统的大数据而获得了新的兴趣。2018年5月,《通用数据保护条例》(GDPR)在欧盟生效,以加强用户对其个人数据的影响。尽管该法规的倡议早在两年前就已为人所知,但2018年5月25日仍令许多ICT行动者感到震惊。互联网服务终端用户的隐私意识也不强,加之该领域新技术的出现,使得数据保护责任的识别变得更加复杂。本文总结了影响雾和云中物联网应用设计和运行的GDPR新颖性,并介绍了最近一项关于国际学生对与使用物联网-雾云系统和人工智能解决方案相关的隐私问题的GDPR意识的调查结果。根据调查结果,我们还陈述了我们对未来更安全地利用这些复杂的ICT系统的影响。
{"title":"Privacy-awareness of Users in our Cloudy Smart World","authors":"G. Varkonyi, A. Kertész, Szilvia Varadi","doi":"10.1109/FMEC.2019.8795310","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795310","url":null,"abstract":"Recent advances in Information and Communications Technology (ICT) are expanding the world of Internet services with smart applications running on interconnected smart devices. Cloud computing already started to dominate the Internet, and with the appearance of Internet of Things (IoT), and Fog and Edge computing IoT-Fog-Cloud systems are formed. Beside such architectural developments, Artificial Intelligence (AI) methods receive new interests by managing Big Data coming from these complex, heterogeneous systems. In May 2018, the General Data Protection Regulation (GDPR) came into force in the European Union (EU) to strengthen users’ influence on their personal data. Though the initiative of the regulation was known two years before, the 25th May, 2018 was a shock for many ICT actors. The privacy awareness of end-users of the Internet of Services is also wanting, and the emergence of new technologies in this field further complicates the identification of data protection responsibilities. In this paper summarize the GDPR novelties affecting the design and operation of IoT applications in fogs and clouds, we present the results of a recent survey on the GDPR awareness of international students on privacy issues related to the usage of IoT-Fog-Cloud systems and AI solutions. Based on the results of the survey, we also state our implications for safer utilization of these complex ICT systems in the future.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models 基于隐马尔可夫模型的容器化集群结构自适应修复
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795322
Areeg Samir, C. Pahl
Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. In the emerging of cluster platforms like Kubernetes or Docker Swarm, scalability is based on resource utilization. Resource utilization has been used for capacity planning and for forecasting resource demand. However, due to the large scale and complex structure of these architectures, analyzing large amount of monitoring data may cause a huge resource overhead that affects the performance of anomaly detection and the accuracy of anomaly location. To address such challenges, we propose a self-adaptive healing approach that detects, identifies, predicts and recovers anomalies in clustered architectures. The approach will be evaluated to assess the accuracy of the mechanism.
边缘云环境通常构建为可能异构设备的虚拟化协调集群。在Kubernetes或Docker Swarm等集群平台的出现中,可伸缩性是基于资源利用率的。资源利用率已用于能力规划和预测资源需求。但由于这些体系结构规模大、结构复杂,分析大量的监测数据可能会造成巨大的资源开销,影响异常检测的性能和异常定位的准确性。为了应对这些挑战,我们提出了一种自适应修复方法,用于检测、识别、预测和恢复集群架构中的异常。将对该方法进行评估,以评估该机制的准确性。
{"title":"Self-Adaptive Healing for Containerized Cluster Architectures with Hidden Markov Models","authors":"Areeg Samir, C. Pahl","doi":"10.1109/FMEC.2019.8795322","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795322","url":null,"abstract":"Edge cloud environments are often build as virtualized coordinated clusters of possibly heterogeneous devices. In the emerging of cluster platforms like Kubernetes or Docker Swarm, scalability is based on resource utilization. Resource utilization has been used for capacity planning and for forecasting resource demand. However, due to the large scale and complex structure of these architectures, analyzing large amount of monitoring data may cause a huge resource overhead that affects the performance of anomaly detection and the accuracy of anomaly location. To address such challenges, we propose a self-adaptive healing approach that detects, identifies, predicts and recovers anomalies in clustered architectures. The approach will be evaluated to assess the accuracy of the mechanism.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exploiting Digital Identity for Mobility in Fog Computing 利用数字身份实现雾计算中的移动性
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795342
F. Buccafurri, G. Lax, A. Russo
Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.
雾计算是新兴的移动支持需求的答案,主要是由于物联网的部署。在本文中,由于在雾计算中处理设备切换时发现的许多安全和隐私问题,我们提出了一种基于最近欧盟法规eIDAS提供的可能性的新方法,用于在需要数据移动性时提高用户识别的安全性。
{"title":"Exploiting Digital Identity for Mobility in Fog Computing","authors":"F. Buccafurri, G. Lax, A. Russo","doi":"10.1109/FMEC.2019.8795342","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795342","url":null,"abstract":"Fog computing is the answer to the emerging need of mobility support, mostly due to the deployment of the Internet of Things. In this paper, motivated by the many security and privacy issues found in handling device’s handover in Fog computing, we propose a new approach based on the possibilities offered by the recent EU regulation eIDAS, for improving the security in the identification of users, when they require data mobility.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128489740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Caching System Under Uncertainty for Mobile Edge Computing 移动边缘计算不确定条件下新的缓存系统
Pub Date : 2019-06-01 DOI: 10.1109/FMEC.2019.8795356
Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui
Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.
边缘缓存是网络边缘内容检索解决方案中最新兴的技术之一。它也被认为是移动边缘计算(MEC)的使能技术,为执行缓存服务提供了一个有趣的机会。特别是,MEC服务器直接在基站(BSs)上实现,从而启用边缘缓存并确保在靠近移动用户的地方部署。然而,在移动边缘计算环境(基站)中集成服务器使节能问题复杂化,因为移动边缘计算服务器(MECS)消耗的功率非常昂贵,特别是当负载随时间动态变化时。此外,拥有移动设备的用户提出了他们的需求,除了有限的缓存大小之外,还引入了处理此类移动内容请求的挑战。因此,缓存机制考虑上述因素是必要和关键的,而现有的研究大多集中在缓存分配、内容流行度和缓存设计上。在本文中,我们提出了一种针对边缘设备的节能模糊缓存策略,该策略考虑了移动环境的四个影响特征,同时引入了一种使用现场可编程门阵列(FPGA)的硬件实现,以降低总体能源需求。
{"title":"New Caching System Under Uncertainty for Mobile Edge Computing","authors":"Sarra Mehamel, S. Bouzefrane, K. Slimani, M. Daoui","doi":"10.1109/FMEC.2019.8795356","DOIUrl":"https://doi.org/10.1109/FMEC.2019.8795356","url":null,"abstract":"Edge caching is one of the most emerging technologies recognized as a content retrieval solution in the edge of the network. It has been also considered as enabling technology of mobile edge computing (MEC) that presents an interesting opportunity to perform caching services. Particularly, the MEC servers are implemented directly at the base stations (BSs) which enable edge caching and ensure deployment in close-proximity to the mobile users. However, the integration of servers in mobile edge computing environment (base stations) complicates the energy saving issue because the power consumed by mobile edge computing servers (MECS) is costly especially when the load changes dynamically over time. Furthermore, users with mobile devices arise their demands, introducing the challenge of handling such mobile content requests beside the limited caching size. Thus, it is necessary and crucial for caching mechanisms to consider the mentioned factors, meanwhile most existing studies focus on cache allocation, content popularity and cache design. In this paper, we present an energy-efficient fuzzy caching strategy for edge devices that takes into consideration four influencing features of mobile environment, while introducing a hardware implementation using Field-Programmable Gate Array (FPGA) to cut the overall energy requirements.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1