Author:
Huang Haifeng,Tan Hongmin,Xu Xianyang,Zhang Jianfei,Zhao Zhiwei
Abstract
With the explosive growth in personal mobile devices, offloading computation through nearby mobile user devices as opportunistic edge servers to support complex applications with limited computation resources is receiving increasing attention. In this paper, we first establish the optimal opportunistic offloading problem using the statistical properties of user movement speed and CPU load of mobile edge servers. We then determine the amount of computation to be offloaded to individual mobile edge servers. Moreover, we design an adaptive mechanism based on PID to realize the function of continuing large data packets from breakpoints, mainly used to adjust the size of data packets automatically. It efficiently avoids data loss and reduces the cost of resources through the latency deviation as the variable of the gain function to estimate the packet size. Finally, an access control system based on edge computing is designed and developed to make full use of the mobile phones of nearby users. It can address the shortcomings of traditional schemes with high latency to some extent, and it makes latency lower and data reliability higher.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Sichuan Province
National Key Research and Development Program of China
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference29 articles.
1. Belani, D., Makwana, A.H., Pitroda, J., and Vyas, C.M. (2014, January 17). Intelligent building new era of todays world. Proceedings of the Trends and Challenges of Civil Engineering in Todays Transforming World, Surat, India.
2. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage;Li;IEEE Trans. Parallel Distrib. Syst.,2016
3. Mon, E.E., and Naing, T.T. (2011, January 28–30). The privacy-aware access control system using attribute-and role-based access control in private cloud. Proceedings of the 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, Shenzhen, China.
4. Secure, efficient and revocable multi-authority access control system in cloud storage;Li;Comput. Secur.,2016
5. Loukatos, D., Lygkoura, K.A., Maraveas, C., and Arvanitis, K.G. (2022). Enriching IoT Modules with Edge AI Functionality to Detect Water Misuse Events in a Decentralized Manner. Sensors, 22.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献