M. P. Konzen, A. Lorenzon, M. C. Luizelli, F. Rossi, J. C. Mattos
{"title":"边缘计算中任务卸载的综合综述","authors":"M. P. Konzen, A. Lorenzon, M. C. Luizelli, F. Rossi, J. C. Mattos","doi":"10.5753/sbesc_estendido.2022.228130","DOIUrl":null,"url":null,"abstract":"Nowadays, mobile applications are demanding compute-intensive use, in addition to the need for lower latency and lower computational costs. Thus, researchers are proposing to bring the computation of these applications closer to the users by offloading these applications to the Edge. In this work, we carried out a comprehensive literature review with the primary objective of investigating the offloading strategies used in the Edge Computing scenario, which restrictions are considered, and the security aspects considered by the strategies. From the selected works, we describe the main optimization objectives of the strategies, which models and algorithms were implemented, which computational constraints were considered, which types of applications, and the security requirements. Finally, we discussed some opportunities and open challenges.","PeriodicalId":305719,"journal":{"name":"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A comprehensive review of task offloading in edge computing\",\"authors\":\"M. P. Konzen, A. Lorenzon, M. C. Luizelli, F. Rossi, J. C. Mattos\",\"doi\":\"10.5753/sbesc_estendido.2022.228130\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, mobile applications are demanding compute-intensive use, in addition to the need for lower latency and lower computational costs. Thus, researchers are proposing to bring the computation of these applications closer to the users by offloading these applications to the Edge. In this work, we carried out a comprehensive literature review with the primary objective of investigating the offloading strategies used in the Edge Computing scenario, which restrictions are considered, and the security aspects considered by the strategies. From the selected works, we describe the main optimization objectives of the strategies, which models and algorithms were implemented, which computational constraints were considered, which types of applications, and the security requirements. Finally, we discussed some opportunities and open challenges.\",\"PeriodicalId\":305719,\"journal\":{\"name\":\"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5753/sbesc_estendido.2022.228130\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Anais Estendidos do XII Simpósio Brasileiro de Engenharia de Sistemas Computacionais (SBESC Estendido 2022)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5753/sbesc_estendido.2022.228130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comprehensive review of task offloading in edge computing
Nowadays, mobile applications are demanding compute-intensive use, in addition to the need for lower latency and lower computational costs. Thus, researchers are proposing to bring the computation of these applications closer to the users by offloading these applications to the Edge. In this work, we carried out a comprehensive literature review with the primary objective of investigating the offloading strategies used in the Edge Computing scenario, which restrictions are considered, and the security aspects considered by the strategies. From the selected works, we describe the main optimization objectives of the strategies, which models and algorithms were implemented, which computational constraints were considered, which types of applications, and the security requirements. Finally, we discussed some opportunities and open challenges.