38 results on '"Edge clouds"'
Search Results
2. Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
- Author
-
Javad Forough, Hamed Haddadi, Monowar Bhuyan, and Erik Elmroth
- Subjects
Anomaly detection ,data constraints ,edge clouds ,knowledge distillation ,resource constraints ,transfer learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. However, the unique challenges of limited computing power and lack of edge-related labeled training data pose significant obstacles to effective supervised anomaly detection. In this paper, we propose an innovative approach that leverages transfer learning to address the lack of relevant labeled data and knowledge distillation to increase computational efficiency and achieve accurate anomaly detection on edge clouds. Our approach exploits transfer learning by utilizing knowledge from a pre-trained model and adapting it for anomaly detection on edge clouds. This enables the model to benefit from the learned features and patterns from related tasks such as network intrusion detection, resulting in improved detection accuracy. Additionally, we utilize knowledge distillation to distill the knowledge from the previously mentioned high-capacity model, known as the teacher model, into a more compact student model. This distillation process enhances the student model’s computational efficiency while retaining its detection power. Evaluations conducted on our developed real-world edge cloud testbed show that, with the same amount of edge cloud’s labeled dataset, our approach maintains high accuracy while significantly reducing the model’s detection time to almost half for non-sequential models, from $81.11~\mu s$ to $44.34~\mu s$ on average. For sequential models, it reduces the detection time to nearly a third of the baseline model’s, from $331.54~\mu s$ to $113.86~\mu s$ on average. These improvements make our approach exceptionally practical for real-time anomaly detection on edge clouds.
- Published
- 2024
- Full Text
- View/download PDF
3. Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds
- Author
-
Adil Bin Bhutto, Xuan Son Vu, Erik Elmroth, Wee Peng Tay, and Monowar Bhuyan
- Subjects
Reinforced transformer learning ,VSI-DDoS ,edge clouds ,QoS/QoE ,cloud applications ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Edge-driven software applications often deployed as online services in the cloud-to-edge continuum lack significant protection for services and infrastructures against emerging cyberattacks. Very-Short Intermittent Distributed Denial of Service (VSI-DDoS) attack is one of the biggest factors for diminishing the Quality of Services (QoS) and Quality of Experiences (QoE) for users on edge. Unlike conventional DDoS attacks, these attacks live for a very short time (on the order of a few milliseconds) in the traffic to deceive users with a legitimate service experience. To provide protection, we propose a novel and efficient approach for detecting VSI-DDoS attacks using reinforced transformer learning that mitigates the tail latency and service availability problems in edge clouds. In the presence of attacks, the users’ demand for availing ultra-low latency and high throughput services deployed on the edge, can never be met. Moreover, these attacks send very-short intermittent requests towards the target services that enforce longer delays in users’ responses. The assimilation of transformer with deep reinforcement learning accelerates detection performance under adverse conditions by adapting the dynamic and the most discernible patterns of attacks (e.g., multiplicative temporal dependency, attack dynamism). The extensive experiments with testbed and benchmark datasets demonstrate that the proposed approach is suitable, effective, and efficient for detecting VSI-DDoS attacks in edge clouds. The results outperform state-of-the-art methods with $0.9\%-3.2\%$ higher accuracy in both datasets.
- Published
- 2022
- Full Text
- View/download PDF
4. Resource sharing of mobile edge computing networks based on auction game and blockchain
- Author
-
Xiuxian Zhang, Xiaorong Zhu, M.A.M Chikuvanyanga, and Meijuan Chen
- Subjects
Blockchain ,Auction game ,Edge clouds ,Resource sharing ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Abstract The edge clouds in mobile edge computing networks are isolate which may belong to different companies or organizations, and hence the communication, computation, and storage resources are not efficiently utilized. To solve this problem, we propose the resource-sharing model of edge clouds which is based on blockchain technology and auction game. In this model, the blockchain platform is regarded as the bridge of the resource sharing, composed of edge clouds, clouds, third-party spectrum and computation management, identity authentication institutions, etc. It is used to record the users’ transaction information and broadcast the intelligent terminals’ resource requirements to all edge clouds in the blockchain platform through smart contracts. Then, an optimization problem of the joint allocation of communication and computation resources is formulated to maximize the utility of intelligent terminals. And an efficient improved sealed second-price auction game is proposed to allocate communication and computation resources and determine the optimal price of resources under the intelligent terminals’ QoS constraints. Simulation results show that the model can effectively improve the system resources utilization and the successful transaction rate.
- Published
- 2021
- Full Text
- View/download PDF
5. Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm
- Author
-
Abdi, Somayeh, Ashjaei, Seyed Mohammad Hossein, Mubeen, Saad, Abdi, Somayeh, Ashjaei, Seyed Mohammad Hossein, and Mubeen, Saad
- Abstract
The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge devices cannot meet those requirements. This paper focuses on the workflow offloading problem in edge-cloud computing and formulates this problem as a nonlinear mathematical programming model. The objective function is to minimize the monetary cost of executing a workflow while satisfying constraints related to data dependency among tasks and QoS requirements, including security and deadlines. Additionally, it presents a genetic algorithm for the workflow offloading problem to find near-optimal solutions with the cost minimization objective. The performance of the proposed mathematical model and genetic algorithm is evaluated on several real-world workflows. Experimental results demonstrate that the proposed genetic algorithm can find admissible solutions comparable to the mathematical model and outperforms particle swarm optimization, bee life algorithm, and a hybrid heuristic-genetic algorithm in terms of workflow execution costs.
- Published
- 2024
- Full Text
- View/download PDF
6. Machine learning for anomaly detection in edge clouds
- Author
-
Forough, Javad and Forough, Javad
- Abstract
Edge clouds have emerged as an essential architecture, revolutionizing data processing and analysis by bringing computational capabilities closer to data sources and end-users at the edge of the network. Anomaly detection is crucial in these settings to maintain the reliability and security of edge-based systems and applications despite limited computational resources. It plays a vital role in identifying unexpected patterns, which could indicate security threats or performance issues within the decentralized and real-time nature of edge cloud environments. For example, in critical edge applications like autonomous vehicles, augmented reality, and smart healthcare, anomaly detection ensures the consistent and secure operation of these systems, promptly detecting anomalies that might compromise safety, performance, or user experience. However, the adoption of anomaly detection within edge cloud environments poses numerous challenges. This thesis aims to contribute by addressing the problem of anomaly detection in edge cloud environments. Through a comprehensive exploration of anomaly detection methods, leveraging machine learning techniques and innovative approaches, this research aims to enhance the efficiency and accuracy of detecting anomalies in edge cloud environments. The proposed methods intend to overcome the challenges posed by resource limitations, the lack of labeled data specific to edge clouds, and the need for accurate detection of anomalies. By focusing on machine learning approaches like transfer learning, knowledge distillation, reinforcement learning, deep sequential models, and deep ensemble learning, this thesis endeavors to establish efficient and accurate anomaly detection systems specific for edge cloud environments. The results demonstrate the improvements achieved by employing machine learning methods for anomaly detection in edge clouds. Extensive testing and evaluation in real-world edge environments show how machine learning-driven anomaly
- Published
- 2024
7. Resource sharing of mobile edge computing networks based on auction game and blockchain.
- Author
-
Zhang, Xiuxian, Zhu, Xiaorong, Chikuvanyanga, M.A.M, and Chen, Meijuan
- Subjects
MOBILE computing ,EDGE computing ,BLOCKCHAINS ,PROBLEM solving ,SPECTRUM allocation - Abstract
The edge clouds in mobile edge computing networks are isolate which may belong to different companies or organizations, and hence the communication, computation, and storage resources are not efficiently utilized. To solve this problem, we propose the resource-sharing model of edge clouds which is based on blockchain technology and auction game. In this model, the blockchain platform is regarded as the bridge of the resource sharing, composed of edge clouds, clouds, third-party spectrum and computation management, identity authentication institutions, etc. It is used to record the users' transaction information and broadcast the intelligent terminals' resource requirements to all edge clouds in the blockchain platform through smart contracts. Then, an optimization problem of the joint allocation of communication and computation resources is formulated to maximize the utility of intelligent terminals. And an efficient improved sealed second-price auction game is proposed to allocate communication and computation resources and determine the optimal price of resources under the intelligent terminals' QoS constraints. Simulation results show that the model can effectively improve the system resources utilization and the successful transaction rate. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
8. Secure Transmission of Compressed Sampling Data Using Edge Clouds.
- Author
-
Zhang, Yushu, Wang, Ping, Fang, Liming, He, Xing, Han, Hao, and Chen, Bing
- Abstract
Cloud capability is considered to be extended to the edge of the Internet for improving the security of data transmission. Compressive sensing (CS) has been widely studied as a built-in privacy-preserving layer to provide some cryptographic features while sampling and compressing, including data confidentiality guarantees and data integrity guarantees. Unfortunately, most existing CS-based ciphers are too lightweight or highly complex to meet the requirements of both high security of transmitting the captured data over the Internet and low energy consumption of sensing devices in the Internet of Things (IoT). In this article, a secure transmission framework for CS data by combining CS-based cipher and edge computing is proposed. From the perspective of security, the double-layer encryption mechanism and double-layer authentication mechanism are rooted in it by performing some privacy-preserving operations, including CS-based encryption, CS-based hash, information splitting, strong encryption, and feature extraction. Most significantly, the proposed framework is very useful for resource-limited IoT applications. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
9. Innovative soft computing-enabled cloud optimization for next-generation IoT in digital twins
- Author
-
Feng, Hailin, Qiao, Liang, Lv, Zhihan, Feng, Hailin, Qiao, Liang, and Lv, Zhihan
- Abstract
The research aims to reduce the network resource pressure on cloud centers (CC) and edge nodes, to improve the service quality and to optimize the network performance. In addition, it studies and designs a kind of edge–cloud collaboration framework based on the Internet of Things (IoT). First, raspberry pi (RP) card working machines are utilized as the working nodes, and a kind of edge–cloud collaboration framework is designed for edge computing. The framework consists mainly of three layers, including edge RP (ERP), monitoring & scheduling RP (MSRP), and CC. Among the three layers, collaborative communication can be realized between RPs and between RPs and CCs. Second, a kind of edge–cloud matching algorithm is proposed in the time delay constraint scenario. The research results obtained by actual task assignments demonstrate that the task time delay in face recognition on edge–cloud collaboration mode is the least among the three working modes, including edge only, CC only, and edge–CC collaboration modes, reaching only 12 s. Compared with that of CC running alone, the identification results of the framework rates on edge–cloud collaboration and CC modes are both more fluent than those on edge mode only, and real-time object detection can be realized. The total energy consumption of the unloading execution by system users continuously decreases with the increase in the number of users. It is assumed that the number of pieces of equipment in systems is 150, and the energy-saving rate of systems is affected by the frequency of task generation. The frequency of task generation increases with the corresponding reduction in the energy-saving rate of systems. Based on object detection as an example, the system energy consumption is decreased from 18 W to 16 W after the assignment of algorithms. The included framework improves the resource utility rate and reduces system energy consumption. In addition, it provides theoretical and practical references for the implem
- Published
- 2023
- Full Text
- View/download PDF
10. MetaVSID : a robust meta-reinforced learning approach for VSI-DDoS detection on the edge
- Author
-
Vu, Xuan-Son, Ma, Maode, Bhuyan, Monowar H., Vu, Xuan-Son, Ma, Maode, and Bhuyan, Monowar H.
- Abstract
The explosive growth of end devices that generate massive amounts of data requires close-proximity computing resources for processing at the network’s edge. Having geographic distributions and limited resources of edge nodes or servers opens several doors for attackers to exploit them primarily to the detriment of deployed services; one of the recent attacks is Very Short Intermittent Distributed Denial of Services (VSI-DDoS). Deep learning-based models have been developed to detect and mitigate such attacks but cause the degrading quality of models due to covariate shifts when deployed in real-world environments. Therefore, we propose a new approach, called MetaVSID, to detect VSI-DDoS attacks in edge clouds using meta-reinforcement learning followed by ensemble learning to increase the robustness of the model in detecting VSI-DDoS attacks early. The proposed model can capture dynamic patterns of VSI-DDoS attacks, from which it identifies manipulated services and increase service availability when covariate shifts at deployment time. We carry out extensive experiments to validate the MetaVSID using both testbed and benchmark datasets. Via the meta-reinforced downsampling process, the proposed method improves sample efficiency, leading to cost-effective policies. Moreover, the optimized policies are generalized to adapt to dynamic changes in the training distribution. Our experimental results demonstrate that MetaVSID stably achieves better performance in multiple evaluation settings with the difference from baseline models from 1.5% to 7.5% in terms of AUC for both VSI-DDoS and DDoS detection, especially under covariate shift settings.
- Published
- 2023
- Full Text
- View/download PDF
11. A Cost-effective High-throughput Testbed for Supporting AI-enabled DevSecOps Services
- Author
-
Khamdamov, Ulugbek, Usman, Muhammad, Kim, JongWon, Khamdamov, Ulugbek, Usman, Muhammad, and Kim, JongWon
- Abstract
OF@TEIN Playground is a multi-site cloud with distributed edge nodes, which, while offering reduced application latency by processing data at the edge of the network, also introduces new security challenges. To ensure the continuous and secure operation of these nodes, the SmartX Multi-View Visibility and SmartX MultiSec frameworks were introduced. However, these frameworks have limitations regarding AI-powered security mechanisms. The recent surge in data and AI technologies has amplified the need for AI-based and data-driven smart services that can process large amounts of real-time data and provide actionable insights to users. In particular, AI-inspired DevSecOps services can be highly effective in enhancing cybersecurity of the OF@TEIN Playground. However, developing and deploying these services at scale can be a challenge, due to the high costs associated with procuring and maintaining the necessary hardware and software resources. Therefore, this work aims to upgrade the OF@TEIN Playground to flexibly support cloud based AI-inspired DevSecOps services and to adequately meet the current and future demands of playground users. The results show that our effort has resulted in a more reliable, cost-effective, and flexible edge computing research and experimentation testbed.
- Published
- 2023
- Full Text
- View/download PDF
12. Cost-effective resource segmentation in hierarchical mobile edge clouds.
- Author
-
Jin, Ming-shuang, Gao, Shuai, Luo, Hong-bin, and Zhang, Hong-ke
- Abstract
The fifth-generation (5G) network cloudification enables third parties to deploy their applications (e.g., edge caching and edge computing) at the network edge. Many previous works have focused on specific service strategies (e.g., cache placement strategy and vCPU provision strategy) for edge applications from the perspective of a certain third party by maximizing its benefit. However, there is no literature that focuses on how to efficiently allocate resources from the perspective of a mobile network operator, taking the different deployment requirements of all third parties into consideration. In this paper, we address the problem by formulating an optimization problem, which minimizes the total deployment cost of all third parties. To capture the deployment requirements of the third parties, the applications that they want to deploy are classified into two types, namely, computation-intensive ones and storage-intensive ones, whose requirements are considered as input parameters or constraints in the optimization. Due to the NP-hardness and non-convexity of the formulated problem, we have designed an elitist genetic algorithm that converges to the global optimum to solve it. Extensive simulations have been conducted to illustrate the feasibility and effectiveness of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
13. Reputation based approach for improved fairness and robustness in P2P protocols.
- Author
-
Nwebonyi, Francis N., Martins, Rolando, and Correia, Manuel E.
- Subjects
COMPUTER network architectures ,PEER-to-peer architecture (Computer networks) ,REPUTATION ,FAIRNESS ,LITERATURE reviews ,SOCIAL interaction - Abstract
Peer-to-Peer (P2P) overlay networks have gained popularity due to their robustness, cost advantage, network efficiency and openness. Unfortunately, the same properties that foster their success, also make them prone to several attacks. To mitigate these attacks, several scalable security mechanisms which are based on the concepts of trust and reputation have been proposed. These proposed methods tend to ignore some core practical requirements that are essential to make them more useful in the real world. Some of such requirements include efficient bootstrapping of each newcomer's reputation, and mitigating seeder(s) exploitation. Additionally, although interaction among participating peers is usually the bases for reputation, the importance given to the frequency of interaction between the peers is often minimized or ignored. This can result in situations where barely known peers end-up having similar trust scores to the well-known and consistently cooperative nodes. After a careful review of the literature, this work proposes a novel and scalable reputation based security mechanism that addresses the aforementioned problems. The new method offers more efficient reputation bootstrapping, mitigation of bandwidth attack and better management of interaction rate, which further leads to improved fairness. To evaluate its performance, the new reputation model has been implemented as an extension of the BitTorrent protocol. Its robustness was tested by exposing it to popular malicious behaviors in a series of extensive PeerSim simulations. Results show that the proposed method is very robust and can efficiently mitigate popular attacks on P2P overlay networks. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
14. Innovative soft computing-enabled cloud optimization for next-generation IoT in digital twins
- Author
-
Hailin Feng, Liang Qiao, and Zhihan Lv
- Subjects
Energy utilization ,Soft computing ,Internet of things ,Object detection ,Unloading ,Computer Sciences ,Edge–cloud collaboration ,Edge computing ,Energy conservation ,Collaboration modes ,Collaboration framework ,Datorsystem ,Datavetenskap (datalogi) ,Cloud optimization ,Computer Systems ,Objects detection ,Face recognition ,Optimisations ,Software ,Time delay ,Time-delays ,Edge clouds ,Three-layer - Abstract
The research aims to reduce the network resource pressure on cloud centers (CC) and edge nodes, to improve the service quality and to optimize the network performance. In addition, it studies and designs a kind of edge–cloud collaboration framework based on the Internet of Things (IoT). First, raspberry pi (RP) card working machines are utilized as the working nodes, and a kind of edge–cloud collaboration framework is designed for edge computing. The framework consists mainly of three layers, including edge RP (ERP), monitoring & scheduling RP (MSRP), and CC. Among the three layers, collaborative communication can be realized between RPs and between RPs and CCs. Second, a kind of edge–cloud matching algorithm is proposed in the time delay constraint scenario. The research results obtained by actual task assignments demonstrate that the task time delay in face recognition on edge–cloud collaboration mode is the least among the three working modes, including edge only, CC only, and edge–CC collaboration modes, reaching only 12 s. Compared with that of CC running alone, the identification results of the framework rates on edge–cloud collaboration and CC modes are both more fluent than those on edge mode only, and real-time object detection can be realized. The total energy consumption of the unloading execution by system users continuously decreases with the increase in the number of users. It is assumed that the number of pieces of equipment in systems is 150, and the energy-saving rate of systems is affected by the frequency of task generation. The frequency of task generation increases with the corresponding reduction in the energy-saving rate of systems. Based on object detection as an example, the system energy consumption is decreased from 18 W to 16 W after the assignment of algorithms. The included framework improves the resource utility rate and reduces system energy consumption. In addition, it provides theoretical and practical references for the implementation of the edge–cloud collaboration framework.
- Published
- 2023
15. Opportunistic computing offloading in edge clouds.
- Author
-
Li, Wei, You, Xinghui, Jiang, Yingying, Yang, Jun, and Hu, Long
- Subjects
- *
CLOUD computing , *AD hoc computer networks , *COMPUTER networks , *MESH networks , *WIRELESS mesh networks , *QUALITY of service - Abstract
Abstract Nowadays, the advanced mobile devices provide considerable computation capacity. However, due to the instinct limitation of resources, mobile devices have to offload computation by Mobile Cloud Computing (MCC) and Ad-Hoc Cloudlet for improving the performance and prolonging the battery life. However, efficient model for ad-hoc cloudlet-assisted computation offloading is remaining open issues. In this article, we provide an overview of existing computation offloading modes, e.g. remote cloud service mode and ad-hoc cloudlet-assisted service mode, and propose an opportunistic computation offloading (OPPOCO) to enable a more energy-efficient and intelligent strategy for computation offloading. Moreover, the simulation by OPNET verifies that our proposal is available and practical to improve mobile users' Quality of Service (QoS) and Quality of Experience (QoE). Highlights • Propose an opportunistic computation offloading to enable a more energy-efficient and intelligent strategy for computation offloading. • Introduce an OPPOCO strategy with a mobility-aware energy consumption optimization to solve the problem of the file placements and the computational task assignments. • Implement the proposed OPPOCO in OPNET 16.1 and evaluate over 12 real Internet service provider networks. The simulation by OPNET verifies that our proposal is available and practical to improve mobile users' Quality of Service (QoS) and Quality of Experience (QoE) [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
16. Resource sharing of mobile edge computing networks based on auction game and blockchain
- Author
-
Meijuan Chen, M.A.M Chikuvanyanga, Xiaorong Zhu, and Xiuxian Zhang
- Subjects
Authentication ,Optimization problem ,Mobile edge computing ,TK7800-8360 ,Computer science ,business.industry ,Quality of service ,Resource sharing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,TK5101-6720 ,Auction game ,Shared resource ,Resource (project management) ,Blockchain ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Telecommunication ,Enhanced Data Rates for GSM Evolution ,Electronics ,business ,Database transaction ,Computer network ,Edge clouds - Abstract
The edge clouds in mobile edge computing networks are isolate which may belong to different companies or organizations, and hence the communication, computation, and storage resources are not efficiently utilized. To solve this problem, we propose the resource-sharing model of edge clouds which is based on blockchain technology and auction game. In this model, the blockchain platform is regarded as the bridge of the resource sharing, composed of edge clouds, clouds, third-party spectrum and computation management, identity authentication institutions, etc. It is used to record the users’ transaction information and broadcast the intelligent terminals’ resource requirements to all edge clouds in the blockchain platform through smart contracts. Then, an optimization problem of the joint allocation of communication and computation resources is formulated to maximize the utility of intelligent terminals. And an efficient improved sealed second-price auction game is proposed to allocate communication and computation resources and determine the optimal price of resources under the intelligent terminals’ QoS constraints. Simulation results show that the model can effectively improve the system resources utilization and the successful transaction rate.
- Published
- 2021
17. Reinforced Transformer Learning for VSI-DDoS Detection in Edge Clouds
- Author
-
Bhutto, Adil B., Vu, Xuan-Son, Elmroth, Erik, Tay, Wee Peng, Bhuyan, Monowar H., Bhutto, Adil B., Vu, Xuan-Son, Elmroth, Erik, Tay, Wee Peng, and Bhuyan, Monowar H.
- Abstract
Edge-driven software applications often deployed as online services in the cloud-to-edge continuum lack significant protection for services and infrastructures against emerging cyberattacks. Very-Short Intermittent Distributed Denial of Service (VSI-DDoS) attack is one of the biggest factor for diminishing the Quality of Services (QoS) and Quality of Experiences (QoE) for users on edge. Unlike conventional DDoS attacks, these attacks live for a very short time (on the order of a few milliseconds) in the traffic to deceive users with a legitimate service experience. To provide protection, we propose a novel and efficient approach for detecting VSI-DDoS attacks using reinforced transformer learning that mitigates the tail latency and service availability problems in edge clouds. In the presence of attacks, the users’ demand for availing ultra-low latency and high throughput services deployed on the edge, can never be met. Moreover, these attacks send very-short intermittent requests towards the target services that enforce longer delays in users’ responses. The assimilation of transformer with deep reinforcement learning accelerates detection performance under adverse conditions by adapting the dynamic and the most discernible patterns of attacks (e.g., multiplicative temporal dependency, attack dynamism). The extensive experiments with testbed and benchmark datasets demonstrate that the proposed approach is suitable, effective, and efficient for detecting VSI-DDoS attacks in edge clouds. The results outperform state-of-the-art methods with 0.9%-3.2% higher accuracy in both datasets.
- Published
- 2022
- Full Text
- View/download PDF
18. Microsplit : efficient splitting of microservices on edge clouds
- Author
-
Rahmanian, Ali, Ali-Eldin, Ahmed, Skubic, Björn, Elmroth, Erik, Rahmanian, Ali, Ali-Eldin, Ahmed, Skubic, Björn, and Elmroth, Erik
- Abstract
Edge cloud systems reduce the latency between users and applications by offloading computations to a set of small-scale computing resources deployed at the edge of the network. However, since edge resources are constrained, they can become saturated and bottlenecked due to increased load, resulting in an exponential increase in response times or failures. In this paper, we argue that an application can be split between the edge and the cloud, allowing for better performance compared to full migration to the cloud, releasing precious resources at the edge. We model an application's internal call-Graph as a Directed-Acyclic-Graph. We use this model to develop MicroSplit, a tool for efficient splitting of microservices between constrained edge resources and large-scale distant backend clouds. MicroSplit analyzes the dependencies between the microservices of an application, and using the Louvain method for community detection---a popular algorithm from Network Science---decides how to split the microservices between the constrained edge and distant data centers. We test MicroSplit with four microservice based applications in various realistic cloud-edge settings. Our results show that Microsplit migrates up to 60% of the microservices of an application with a slight increase in the mean-response time compared to running on the edge, and a latency reduction of up to 800% compared to migrating the entire application to the cloud. Compared to other methods from the State-of-the-Art, MicroSplit reduces the total number of services on the edge by up to five times, with minimal reduction in response times.
- Published
- 2022
- Full Text
- View/download PDF
19. Dela : a deep ensemble learning approach for cross-layer VSI-DDoS detection on the edge
- Author
-
Forough, Javad, Bhuyan, Monowar H., Elmroth, Erik, Forough, Javad, Bhuyan, Monowar H., and Elmroth, Erik
- Abstract
Web application services and networks become a major target of low-rate Distributed Denial of Service (DDoS) attacks such as Very Short Intermittent DDoS (VSI-DDoS). These threats exploit the TCP congestion control mechanism to cause transient resource outage and impute delays for legitimate users’ requests, while they bypass the secure systems. Besides that, cross-layer VSI-DDoS attacks, where the performed attacks are towards the different layers of the edge cloud infrastructures, are able to cause violation of customers’ Service-Level Agreements (SLAs) with less visible behavioral patterns. In this work, we propose a novel Deep Ensemble Learning Approach named DELA for detection of cross-layer VSI-DDoS on the edge cloud. This approach is developed based on Long Short-Term Memory (LSTM), ensemble learning, and a new voting mechanism based on Feed-Forward Neural Network (FFNN). In addition, it employs a novel training and detection algorithm to combat such attacks in web services and networks. The model shows improved results due to the utilization of historical information in decision- making and also the usage of neural network as aggregator instead of a static threshold-based aggregation. Moreover, we propose a novel overlapped data chunking algorithm that is able to ameliorate the detection performance. Furthermore, the evaluation of DELA shows its superior performance over our testbed and benchmark datasets. Accordingly, DELA achieves on average 4.88% higher F 1 score compared to state-of-the-art methods.
- Published
- 2022
- Full Text
- View/download PDF
20. EHGA : A Genetic Algorithm Based Approach for Scheduling Tasks on Distributed Edge-Cloud Infrastructures
- Author
-
Mahjoubi, Ayeh, Grinnemo, Karl-Johan, Taheri, Javid, Mahjoubi, Ayeh, Grinnemo, Karl-Johan, and Taheri, Javid
- Abstract
Due to cloud computing’s limitations, edge computing has emerged to address computation-intensive and time-sensitive applications. In edge computing, users can offload their tasks to edge servers. However, the edge servers’ resources are limited, making task scheduling everything but easy. In this paper, we formulate the scheduling of tasks between the user equipment, the edge, and the cloud as a Mixed-Integer Linear Programming (MILP) problem that aims to minimize the total system delay. To solve this MILP problem, we propose an Enhanced Healed Genetic Algorithm solution (EHGA). The results with EHGA are compared with those of CPLEX and a few heuristics previously proposed by us. The results indicate that EHGA is more accurate and reliable than the heuristics and Quicker than CPLEX at solving the MILP problem.
- Published
- 2022
- Full Text
- View/download PDF
21. TOLERANCER : A fault tolerance approach for cloud manufacturing environments
- Author
-
Al-Dulaimy, Auday, Sicari, Christian, Papadopoulos, Alessandro, Galletta, Antonino, Villari, Massimo, Ashjaei, Seyed Mohammad Hossein, Al-Dulaimy, Auday, Sicari, Christian, Papadopoulos, Alessandro, Galletta, Antonino, Villari, Massimo, and Ashjaei, Seyed Mohammad Hossein
- Abstract
The paper presents an approach to solve the software and hardware related failures in edge-cloud environments, more precisely, in cloud manufacturing environments. The proposed approach, called TOLERANCER, is composed of distributed components that continuously interact in a peer to peer fashion. Such interaction aims to detect stress situations or node failures, and accordingly, TOLERANCER makes decisions to avoid or solve any potential system failures. The efficacy of the proposed approach is validated through a set of experiments, and the performance evaluation shows that it responds effectively to different faults scenarios.
- Published
- 2022
- Full Text
- View/download PDF
22. Cognitive and Time Predictable Task Scheduling in Edge-cloud Federation
- Author
-
Abdi, Somayeh, Ashjaei, Seyed Mohammad Hossein, Mubeen, Saad, Abdi, Somayeh, Ashjaei, Seyed Mohammad Hossein, and Mubeen, Saad
- Abstract
In this paper, we present a hierarchical model for time predictable task scheduling in edge-cloud computing architecture for industrial cyber-physical systems. Regarding the scheduling problem, we also investigate the common problem-solving approaches and discuss our preliminary plan to realize the proposed architecture. Furthermore, an Integer linear programming (ILP) model is proposed for task scheduling problem in the cloud layer. The model considers timing and security requirements of applications and the objective is to minimize the financial cost of their execution.
- Published
- 2022
- Full Text
- View/download PDF
23. Redesigning MPTCP for Edge Clouds.
- Author
-
Mohan, Nitinder, Shreedhar, Tanya, Zavodavoski, Aleksandr, Waltari, Otto, Kangasharju, Jussi, and Kaul, Sanjit K.
- Subjects
CLOUD computing ,COMPUTATIONAL complexity ,COMPUTER users ,SOFTWARE reliability ,WIRELESS sensor networks - Abstract
Edge clouds are an attractive platform to support latency-sensitive applications by providing computations on servers deployed close to end-users. These servers aim to employ MPTCP to leverage multiple connections including wireless over a public network. In this paper, we show that the default MPTCP design does not adequately support reliability in these environments, which makes it unfit for use in edge clouds. We propose RAMPTCP, an extension to MPTCP which focuses on adding reliability over network paths. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
24. Toward Zero-Touch Management and Orchestration of Massive Deployment of Network Slices in 6G
- Author
-
Hatim Chergui, A. Ksentini, Luis Blanco, C. Verikoukis, Centre Tecnològic de Telecomunicacions de Catalunya = Telecommunications Technological Centre of Catalonia (CTTC), Eurecom [Sophia Antipolis], University of Patras, and European Project: 871780,H2020-EU.2.1.1. - INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT),MonB5G(2019)
- Subjects
Intelligent network management ,Centralized managemen ,Heterogeneous networks ,Distributed management ,[INFO.INFO-IA]Computer Science [cs]/Computer Aided Engineering ,Electrical and Electronic Engineering ,Intelligent management ,Massive deployment ,Service management ,Computer Science Applications ,Edge clouds - Abstract
6G systems are expected to serve a massive number of extremely heterogeneous network slices that cross multiple technological domains (i.e., RAN, edge, cloud, and core), posing significant challenges to classical centralized management and orchestration approaches in terms of scalability and sustainability. Within this context, a distributed and intelligent management and orchestration system is mandatory. This article proposes a novel framework featuring a distributed and AI-driven management and orchestration system for massive deployment of network slices in 6G. The proposed framework is compliant with both ETSI standards focusing on autonomous and intelligent network management and orchestration, that is, Zero touch Service Management (ZSM) and Experimental Networked Intelligent (ENI), leveraging their visions to enable autonomous as well as scalable management and orchestration of network slices and their dedicated resources. © 2002-2012 IEEE.
- Published
- 2022
- Full Text
- View/download PDF
25. Toward Zero-Touch Management and Orchestration of Massive Deployment of Network Slices in 6G
- Author
-
Chergui H., Ksentini A., Blanco L., and Verikoukis C.
- Subjects
Intelligent network management ,Centralized management ,Heterogeneous networks ,Distributed management ,Intelligent management ,Massive deployment ,Service management ,Edge clouds - Abstract
6G systems are expected to serve a massive number of extremely heterogeneous network slices that cross multiple technological domains (i.e., RAN, edge, cloud, and core), posing significant challenges to classical centralized management and orchestration approaches in terms of scalability and sustainability. Within this context, a distributed and intelligent management and orchestration system is mandatory. This article proposes a novel framework featuring a distributed and AI-driven management and orchestration system for massive deployment of network slices in 6G. The proposed framework is compliant with both ETSI standards focusing on autonomous and intelligent network management and orchestration, that is, Zero touch Service Management (ZSM) and Experimental Networked Intelligent (ENI), leveraging their visions to enable autonomous as well as scalable management and orchestration of network slices and their dedicated resources. © 2002-2012 IEEE.
- Published
- 2022
26. Evolving 5G: ANIARA, an Edge-Cloud perspective
- Author
-
Jonas Gustafsson, Andreas Johnsson, Jim Dowling, Melina Vruna, Ian Marsh, Pontus Skoldstrom, Nicolae Paladi, Mohsen Amiribesheli, Paolo Monti, Johan Sjöberg, and Henrik Abrahamsson
- Subjects
I.2 ,FOS: Computer and information sciences ,Service (systems architecture) ,Telecom systems ,Edge device ,Computer science ,C.4 ,container tech ,Smart manufacturing ,Cloud computing ,computer.software_genre ,Containers ,Computer Science - Networking and Internet Architecture ,Network edges ,C.2.1 ,5G mobile communication systems ,B.0 ,orchestration ,Telecom operators ,Orchestration (computing) ,EDGE architectures ,Efficient power ,Edge clouds ,Flexibility (engineering) ,Networking and Internet Architecture (cs.NI) ,business.industry ,Communication Systems ,energy metering ,Service flexibility ,Manufacture ,Virtualization ,Automation ,AI ,Enhanced Data Rates for GSM Evolution ,Telecommunications ,business ,edge comp ,computer ,Kommunikationssystem - Abstract
Emerging use-cases like smart manufacturing and smart cities pose challenges in terms of latency, which cannot be satisfied by traditional centralized networks. Edge networks, which bring computational capacity closer to the users/clients, are a promising solution for supporting these critical low latency services. Different from traditional centralized networks, the edge is distributed by nature and is usually equipped with limited connectivity and compute capacity. This creates a complex network to handle, subject to failures of different natures, that requires novel solutions to work in practice. To reduce complexity, more lightweight solutions are needed for containerization as well as smart monitoring strategies with reduced overhead. Orchestration strategies should provide reliable resource slicing with limited resources, and intelligent scaling while preserving data privacy in a distributed fashion. Power management is also critical, as providing and managing a large amount of power at the edge is unprecedented., Comment: 4 pages, 1 figure
- Published
- 2022
- Full Text
- View/download PDF
27. EdgeTrust: A Lightweight Data-Centric Trust Management Approach for IoT-Based Healthcare 4.0
- Author
-
Ikram Ud Din, Kamran Ahmad, Joel Rodrigues, Hasan Ali Khattak, and Ahmad Almogren
- Subjects
Internet of Things ,trust management ,healthcare ,digital revolution ,edge clouds ,security ,privacy preservation ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering - Abstract
Internet of Things (IoT) is bringing a revolution in today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous, providing autonomy to nodes so that they can communicate with other nodes and exchange information at any time. IoT and healthcare together provide notable facilities for patient monitoring. However, one of the most critical challenges is the identification of malicious and compromised nodes. In this article, we propose a machine learning-based trust management approach for edge nodes to identify nodes with malicious behavior. The proposed mechanism utilizes knowledge and experience components of trust, where knowledge is further based on several parameters. To prevent the successful execution of good and bad-mouthing attacks, the proposed approach utilizes edge clouds, i.e., local data centers, to collect recommendations to evaluate indirect and aggregated trust. The trustworthiness of nodes is ranked between a certain limit, and only those nodes that satisfy the threshold value can participate in the network. To validate the performance of the proposed approach, we have performed extensive simulations in comparison with existing approaches. The results show the effectiveness of the proposed approach against several potential attacks.
- Published
- 2022
- Full Text
- View/download PDF
28. Evolving 5G : ANIARA, an edge-cloud perspective
- Author
-
Marsh, Ian, Paladi, Nicolae, Abrahamsson, Henrik, Gustafsson, Jonas, Sjöberg, Johan, Johnsson, Andreas, Sköldström, Pontus, Dowling, Jim, Monti, Paolo, Vruna, Melina, Amiribesheli, Mohsen, Marsh, Ian, Paladi, Nicolae, Abrahamsson, Henrik, Gustafsson, Jonas, Sjöberg, Johan, Johnsson, Andreas, Sköldström, Pontus, Dowling, Jim, Monti, Paolo, Vruna, Melina, and Amiribesheli, Mohsen
- Abstract
ANIARA (https://www.celticnext.eu/project-ai-net) attempts to enhance edge architectures for smart manufacturing and cities. AI automation, orchestrated lightweight containers, and efficient power usage are key components of this three-year project. Edge infrastructure, virtualization, and containerization in future telecom systems enable new and more demanding use cases for telecom operators and industrial verticals. Increased service flexibility adds complexity that must be addressed with novel management and orchestration systems. To address this, ANIARA will provide en-ablers and solutions for services in the domains of smart cities and manufacturing deployed and operated at the network edge(s). © 2021 Owner/Author.
- Published
- 2021
- Full Text
- View/download PDF
29. Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach
- Author
-
Forough, Javad, Bhuyan, Monowar H., Elmroth, Erik, Forough, Javad, Bhuyan, Monowar H., and Elmroth, Erik
- Abstract
The advent of crucial areas such as smart healthcare and autonomous transportation, bring in new requirements on the computing infrastructure, including higher demand for real-time processing capability with minimized latency and maximized availability. The traditional cloud infrastructure has several deficiencies when meeting such requirements due to its centralization. Edge clouds seems to be the solution for the aforementioned requirements, in which the resources are much closer to the edge devices and provides local computing power and high Quality of Service (QoS). However, there are still security issues that endanger the functionality of edge clouds. One of the recent types of such issues is Very Short Intermittent Distributed Denial of Service (VSI-DDoS) which is a new category of low-rate DDoS attacks that targets both small and large-scale web services. This attack generates very short bursts of HTTP request intermittently towards target services to encounter unexpected degradation of QoS at edge clouds. In this paper, we formulate the problem with a sequence modeling approach to address short intermittent intervals of DDoS attacks during the rendering of services on edge clouds using Long Short-Term Memory (LSTM) with local attention. The proposed approach ameliorates the detection performance by learning from the most important discernible patterns of the sequence data rather than considering complete historical information and hence achieves a more sophisticated model approximation. Experimental results confirm the feasibility of the proposed approach for VSI-DDoS detection on edge clouds and it achieves 2% more accuracy when compared with baseline methods.
- Published
- 2021
- Full Text
- View/download PDF
30. Joint Management of Wireless and Computing Resources for Computation Offloading in Mobile Edge Clouds
- Author
-
Josilo, Sladana, Dán, György, Josilo, Sladana, and Dán, György
- Abstract
We consider the computation offloading problem in an edge computing system in which an operator jointly manages wireless and computing resources across devices that make their offloading decisions autonomously with the objective to minimize their own completion times. We develop a game theoretical model of the interaction between the devices and an operator that can implement one of two resource allocation policies, a cost minimizing or a time fair resource allocation policy. We express the optimal cost minimizing resource allocation policy in closed form and prove the existence of Stackelberg equilibria for both resource allocation policies. We propose two efficient decentralized algorithms that devices can use for computing equilibria of offloading decisions under the cost minimizing and the time fair resource allocation policies. We establish bounds on the price of anarchy of the games played by the devices and by doing so we show that the proposed algorithms have bounded approximation ratios. Our simulation results show that the cost minimizing resource allocation policy can achieve significantly lower completion times than the time fair allocation policy. At the same time, the convergence time of the proposed algorithms is approximately linear in the number of devices, and thus they could be effectively implemented for edge computing resource management. ., QC 20220613
- Published
- 2021
- Full Text
- View/download PDF
31. Energy-effective IoT Services in Balanced Edge-Cloud Collaboration Systems
- Author
-
Xiang, Zhengzhe, Deng, Shuiguang, Zheng, Yuhang, Wang, Dongjing, Taheri, Javid, Zheng, Zengwei, Xiang, Zhengzhe, Deng, Shuiguang, Zheng, Yuhang, Wang, Dongjing, Taheri, Javid, and Zheng, Zengwei
- Abstract
The rapid development of the Internet-of-Things (IoT) makes it convenient to sense and collect real-world information with different kinds of widely distributed sensors. With plenty of web services providing diverse functions on the cloud, the collected information can be sufficiently used to complete complex tasks after being uploaded. However, the latency brought by long-distance communication and network congestion limits the development of IoT platforms. A feasible approach to solve this problem is to establish an edge-cloud collaboration (ECC) system based on the multi-access edge computing (MEC) paradigm where the collected information can be refined with the services deployed on nearby edge servers. However, as the edge servers are resource-limited, we should be more careful in allocating the edge resource to services, as well as designing the traffic scheduling strategy. In this paper, we investigated the edge-cloud cooperation mechanism of service provisioning in ECC systems, and to that end, proposed an energy-consumption model for it; we also proposed a performance model and balancing model to quantify the running state of ECC systems. Based on these, we further formulated the energy-effective ECC system optimization problem as a joint optimization problem whose decision variables are the resource allocation strategy and traffic scheduling strategy. With the convexity of this problem proved, we proposed an algorithm to solve it and conducted a series of experiments to evaluate its performance. The results showed that our approach can improve at least 4.3 % of the performance compared with representative baselines.
- Published
- 2021
- Full Text
- View/download PDF
32. REDEMON: Resilient Decentralized Monitoring System for Edge Infrastructures
- Author
-
Felix Freitag, Mennan Selimi, Leandro Navarro, Roger Pueyo Centelles, Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, and Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts
- Subjects
business.product_category ,Computació en núvol ,Edge device ,Computer science ,Cloud computing ,02 engineering and technology ,Telecomunicació -- Tràfic -- Gestió ,Server ,0502 economics and business ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Distributed monitoring ,Edge clouds ,Informàtica::Arquitectura de computadors::Arquitectures distribuïdes [Àrees temàtiques de la UPC] ,050210 logistics & transportation ,business.industry ,05 social sciences ,020206 networking & telecommunications ,Telecommunication -- Traffic -- Management ,Networking hardware ,System requirements ,CRDT ,Enhanced Data Rates for GSM Evolution ,Single point of failure ,business ,Computer network - Abstract
The Guifi.net community network has evolved during the past 15 years into a telecommunications infrastructure that offers Internet access to more than 80.000 people. The monitoring system currently in place for this network is lagging behind the growth of the infrastructure, requiring manual intervention and counting several single points of failure. In this paper we present REDEMON, a resilient decentralized monitoring system, hosted on distributed and interconnected edge devices, for a reliable, eventually-consistent monitoring of the Guifi.net network, leveraging CRDT-based data structures implemented on AntidoteDB. We developed the REDEMON system as a prototype featuring resilience, decentralization and automation, in order to replace the legacy monitoring system. To assess the system, this prototype was deployed on resource-constraint edge nodes in the Guifi.net production network and evaluated under realistic conditions. The decentralized assignment mechanism successfully achieves setting the minimum number of monitoring servers per network device that satisfies the established system requirements. Besides, by concentrating the workload on the minimum required number of servers running at their maximum capacity, the remaining devices can idle away, reducing the consumption footprint of the system. With regard to computing resources, we measure a moderate CPU and RAM usage by the monitoring system on low-capacity devices, while we observe that a considerable network traffic is required for achieving a resilient and consistent data storage layer. This resilient and decentralized architecture could lay the basis for other edge applications in the cloud computing domain that need to coordinate over distributed and consistent shared data. This work was supported by the European H2020 framework programme project LightKone (H2020-732505), by the Spanish State Research Agency (AEI) under contracts PCI2019- 111850-2 and PCI2019-111851-2, and the Catalan government AGAUR SGR 990.
- Published
- 2020
- Full Text
- View/download PDF
33. REDEMON: Resilient Decentralized Monitoring system for edge Infrastructures
- Author
-
Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts, Pueyo Centelles, Roger, Selimi, Mennan, Freitag, Fèlix, Navarro Moldes, Leandro, Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts, Pueyo Centelles, Roger, Selimi, Mennan, Freitag, Fèlix, and Navarro Moldes, Leandro
- Abstract
The Guifi.net community network has evolved during the past 15 years into a telecommunications infrastructure that offers Internet access to more than 80.000 people. The monitoring system currently in place for this network is lagging behind the growth of the infrastructure, requiring manual intervention and counting several single points of failure. In this paper we present REDEMON, a resilient decentralized monitoring system, hosted on distributed and interconnected edge devices, for a reliable, eventually-consistent monitoring of the Guifi.net network, leveraging CRDT-based data structures implemented on AntidoteDB. We developed the REDEMON system as a prototype featuring resilience, decentralization and automation, in order to replace the legacy monitoring system. To assess the system, this prototype was deployed on resource-constraint edge nodes in the Guifi.net production network and evaluated under realistic conditions. The decentralized assignment mechanism successfully achieves setting the minimum number of monitoring servers per network device that satisfies the established system requirements. Besides, by concentrating the workload on the minimum required number of servers running at their maximum capacity, the remaining devices can idle away, reducing the consumption footprint of the system. With regard to computing resources, we measure a moderate CPU and RAM usage by the monitoring system on low-capacity devices, while we observe that a considerable network traffic is required for achieving a resilient and consistent data storage layer. This resilient and decentralized architecture could lay the basis for other edge applications in the cloud computing domain that need to coordinate over distributed and consistent shared data., This work was supported by the European H2020 framework programme project LightKone (H2020-732505), by the Spanish State Research Agency (AEI) under contracts PCI2019- 111850-2 and PCI2019-111851-2, and the Catalan government AGAUR SGR 990., Peer Reviewed, Postprint (author's final draft)
- Published
- 2020
34. Cybersecurity of multi-cloud healthcare systems: A hierarchical deep learning approach.
- Author
-
Gupta, Lav, Salman, Tara, Ghubaish, Ali, Unal, Devrim, Al-Ali, Abdulla Khalid, and Jain, Raj
- Subjects
DEEP learning ,NEXT generation networks ,COMPUTER network security ,INTERNET security ,INTRUSION detection systems (Computer security) - Abstract
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients' health and life by stealing or altering data as it flows among the multiple domains of healthcare networks. The problem is likely to exacerbate with the increasing use of IoT devices, edge, and core clouds in the next generation healthcare networks. Presented in this paper is MUSE, a system of deep hierarchical stacked neural networks for timely and accurate detection of malicious activity that leads to alteration of meta-information or payload of the dataflow between the IoT gateway, edge and core clouds. Smaller models at the edge clouds take substantially less time to train as compared to the large models in the core cloud. To improve the speed of training and accuracy of detection of large core cloud models, the MUSE system uses a novel method of merging and aggregating layers of trained edge cloud models to construct a partly pre-trained core cloud model. As a result, the model in the core cloud takes substantially smaller number of epochs (6 to 8) and, consequently, less time, compared to those in the edge clouds, training of which take 35 to 40 epochs to converge. With the help of extensive evaluations, it is shown that with the MUSE system, large, merged models can be trained in significantly less time than the unmerged models that are created independently in the core cloud. Through several runs it is seen that the merged models give on an average 26.2% reduction in training times. From the experimental evaluation we demonstrate that along with fast training speeds the merged MUSE model gives high training and test accuracies, ranging from 95% to 100%, in detection of unknown attacks on dataflows. The merged model thus generalizes very well on the test data. This is a marked improvement when compared with the accuracy given by un-merged model as well as accuracy reported by other researchers with newer datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
35. EmcFIS: Evolutionary multi-criteria Fuzzy Inference System for virtual network function placement and routing.
- Author
-
Zahedi, Seyed Reza, Jamali, Shahram, and Bayat, Peyman
- Subjects
FUZZY logic ,FUZZY systems ,METAHEURISTIC algorithms ,MOBILE computing ,GENETIC algorithms ,VIRTUAL networks - Abstract
With the increasing demands for low-delay network services, mobile edge computing (MEC) has emerged as an appealing solution to provide computing resources in close to the end users. Network function virtualization (NFV) is a new network architecture which replaces dedicated hardware middleboxes with software instances to run network functions via software virtualization on general-purpose servers deployed at edge clouds. Because of the resource limitation at network edges, efficient placement and routing for online virtual network function requests (VNF-PRO) is a challenging task. The VNF-PRO has proven to be NP-hard, and thus, metaheuristic algorithms are the best choice in term of the solution quality. However, metaheuristics suffer from high computational complexity, and cannot be performed for online requests in the VNF-PRO. In this paper, a combined model based on fuzzy logic and genetic algorithm is proposed to achieve proper solution quality-speed trade-off in the VNF-PRO. In this method, a multi-criteria fuzzy inference system (named mcFIS) is used for the online VNF placement and routing. To achieve the best performance, a multi-objective evolutionary algorithm based on genetic algorithm (GA) is utilized in an offline procedure for automatic rule tuning of the mcFIS, once before applying it for online applications. Simulation results on two NFV benchmark instances demonstrate the efficiency of the proposed model against the existing techniques. • Introducing an evolutionary fuzzy model (named EmcFIS) for VNF-PRO in edge clouds. • EmcFIS is a tunable fuzzy inference system for VNF placement and routing in online requests. • Proposing a multi-criteria fuzzy inference system (mcFIS) for online VNF-PRO. • Proposing a GA for automatically rule tuning of the mcFIS in an offline procedure. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
36. DIMON: Distributed Monitoring System for decentralized edge clouds in Guifi.net
- Author
-
Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts, Pueyo Centelles, Roger, Selimi, Mennan, Freitag, Fèlix, Navarro Moldes, Leandro, Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts, Pueyo Centelles, Roger, Selimi, Mennan, Freitag, Fèlix, and Navarro Moldes, Leandro
- Abstract
Community-built telecommunication networks such as Guifi.net demonstrate how end users can actively collaborate in the self-provision of network services, for instance by operating a self-organized distributed monitoring system. Network monitoring is performed by many small servers at the users' premises but data are only accessible via a centralized interface. Besides, due to network partitions and churn of the monitoring servers, failures in the monitoring system are frequent, leaving parts of the network unmonitored. Distributed databases are a promising solution for data replication under network partition condition, but they suffer from a trade-off between data consistency and availability. Furthermore, these databases are used in data centers with abundant computing resources, not in light edge networks. In this work we present DIMON, a reliable edge-based, eventually-consistent monitoring system that leverages CRDT-based data structures implemented in AntidoteDB. Conflict-free replicated data types (CRDTs) are able to converge to a consistent state in environments with network partitions as those found in edge networks. Our results give insights on the load of AntidoteDB on edge devices under different scenarios of read and write operations. The experiments carried out in a production network with a real system implemented contribute to the research community's knowledge about the available technologies for a consistent replicated data storage layer to support edge computing clouds., This work was supported by the European H2020 framework programme project LightKone (H2020-732505), by the Spanish government under contract TIN2016-77836-C2-2-R and the Catalan government AGAUR SGR 990., Peer Reviewed, Postprint (author's final draft)
- Published
- 2019
37. DIMON: Distributed Monitoring System for decentralized edge clouds in Guifi.net
- Author
-
Mennan Selimi, Roger Pueyo Centelles, Leandro Navarro, Felix Freitag, Universitat Politècnica de Catalunya. Doctorat en Arquitectura de Computadors, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, and Universitat Politècnica de Catalunya. CNDS - Xarxes de Computadors i Sistemes Distribuïts
- Subjects
Distributed databases ,Informàtica::Arquitectura de computadors::Arquitectures distribuïdes [Àrees temàtiques de la UPC] ,Distributed database ,Edge device ,Computació en núvol ,Computer science ,Distributed computing ,Network partition ,020206 networking & telecommunications ,02 engineering and technology ,Network monitoring ,Data structure ,Bases de dades distribuïdes ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Cloud computing ,020201 artificial intelligence & image processing ,CRDT ,Enhanced Data Rates for GSM Evolution ,Edge computing ,Distributed monitoring ,Edge clouds - Abstract
Community-built telecommunication networks such as Guifi.net demonstrate how end users can actively collaborate in the self-provision of network services, for instance by operating a self-organized distributed monitoring system. Network monitoring is performed by many small servers at the users' premises but data are only accessible via a centralized interface. Besides, due to network partitions and churn of the monitoring servers, failures in the monitoring system are frequent, leaving parts of the network unmonitored. Distributed databases are a promising solution for data replication under network partition condition, but they suffer from a trade-off between data consistency and availability. Furthermore, these databases are used in data centers with abundant computing resources, not in light edge networks. In this work we present DIMON, a reliable edge-based, eventually-consistent monitoring system that leverages CRDT-based data structures implemented in AntidoteDB. Conflict-free replicated data types (CRDTs) are able to converge to a consistent state in environments with network partitions as those found in edge networks. Our results give insights on the load of AntidoteDB on edge devices under different scenarios of read and write operations. The experiments carried out in a production network with a real system implemented contribute to the research community's knowledge about the available technologies for a consistent replicated data storage layer to support edge computing clouds. This work was supported by the European H2020 framework programme project LightKone (H2020-732505), by the Spanish government under contract TIN2016-77836-C2-2-R and the Catalan government AGAUR SGR 990.
- Published
- 2019
- Full Text
- View/download PDF
38. Partial Replication Policies for Dynamic Distributed Transactional Memory in Edge Clouds
- Author
-
Diogo Lima, Hugo Miranda, François Taïani, LaSIGE [Lisboa], Universidade de Lisboa = University of Lisbon (ULISBOA)-Faculdade de Ciências, Escola Superior de Hotelaria e Turismo do Estoril, As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Universidade de Lisboa (ULISBOA)-Faculdade de Ciências, SYSTÈMES LARGE ÉCHELLE (IRISA-D1), CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Inria Rennes – Bretagne Atlantique, and Institut National de Recherche en Informatique et en Automatique (Inria)
- Subjects
Self-organization ,010302 applied physics ,Scheme (programming language) ,Service (systems architecture) ,Computer science ,Node (networking) ,Distributed computing ,Concurrency ,Geographical Distribution ,02 engineering and technology ,Parallel computing ,01 natural sciences ,Replication (computing) ,Edge Clouds ,020204 information systems ,0103 physical sciences ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,CCS Concepts •Computing methodologies → Distributed computing methodologies ,Enhanced Data Rates for GSM Evolution ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,computer ,Partial Replication ,computer.programming_language - Abstract
International audience; Distributed Transactional Memory (DTM) can play a fundamental role in the coordination of participants in edge clouds as a support for mobile distributed applications. DTM emerges as a concurrency mechanism aimed at simplifying distributed programming by allowing groups of operations to execute atomically, mirroring the well-known transaction model of relational databases. In spite of recent studies showing that partial replication approaches can present gains in the scalability of DTMs by reducing the amount of data stored at each node, most DTM solutions follow a full replication scheme. The few partial replicated DTM frameworks either follow a random or round-robin algorithm for distributing data onto partial replication groups. In order to overcome the poor performance of these schemes, this paper investigates policies to extend the DTM to efficiently and dynamically map resources on partial replication groups. The goal is to understand if a dynamic service that constantly evaluates the data mapped into partial replicated groups can contribute to improve DTM based systems performance.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.