Вы находитесь на странице: 1из 3

1

Multi Component Application In Edge


Computing.
Rushikesh Walke Ms. S.H.Lokhande
Sinhgad Institute of Technology and Science Asst. Professor
rushikeshwalke77@gmail.com Sinhgad Institute of Technology and Science


Abstract— Mobile edge computing is a new cloud computing
paradigm, which makes use of small sized edge clouds to provide released with minimal management effort or service provider
real-time services to users. These mobile edge-clouds (MECs) are interaction .
located in close proximity to users, thus enabling users to
seamlessly access applications running on MECs. Due to the co- Although cloud computing has well-understood characteristics
existence of the core (centralized) cloud, users, and one or multiple
layers of MECs, an important problem is to decide where (on which
its security state is still complex and so need to be addressed
computational entity) to place different components of an properly to utilize the cloud services more efficiently
application. This problem ,known as the application or work load throughout the industry. In the past, much research has
placement problem , is notoriously hard, and therefore, heuristic focused on the security issues but because of the rapid growth
algorithms without performance guarantees are generally employed in this technology with lack of understanding about the core
in common practice, which may unknowingly suffer from poor problem, this technology is still in its infancy. Researchers
performance as compared with the optimal solution. In this paper, have been unable to provide competitive solutions in
we address the application placement problem and focus on accordance with the rapidly growing problems encountered in
developing algorithms with provable performance bounds. We this area. In Literature various threats and attacks have been
model the user application as an application graph and the physical
computing system as a physical graph, with resource
described with some solution directives as well. This work,
demands/availabilities annotated on these graphs. We first consider however, summarizes all the core security threats and security
the placement of a linear application graph and propose an attacks which exist in the cloud environment with proper
algorithm for finding its optimal solution. Using this result, we then explanation of mitigation techniques for each of them.
generalize the formulation and obtain online approximation
algorithms with polynomial-logarithmic (poly-log) competitive ratio BACKGROUND
for tree application graph placement. We jointly consider node and
link assignment, and incorporate multiple types of computational Mobile applications relying on cloud computing became
resources at nodes. increasingly popular in the recent years . Different from
Keywords— Cloud Computing, Mobile edge-clouds, Face traditional standalone applications that run solely on a
Recognition ,Image Processing and Feature Extraction Face mobile device, a cloud-based application has one or multiple
Detection. components running in the cloud, which are connected to
another component running on the hand held device
I. INTRODUCTION and they jointly constitute an application accessible to the
mobile user. Examples of cloud-based mobile applications
Cloud computing technology dates back to 1960s which were
include map, storage, and video streaming services .
available on mainframe systems only and with the passage of
They all require high data processing/storage capability that
time it evolved into the cloud. The term cloud has emerged
cannot be satisfied on hand held devices alone, thus it is
from network diagrams in which internet was being
necessary to run part of the application in the cloud.
represented as a cloud symbol . The technology itself is a
Traditionally, clouds are located in centralized data centers.
combination of different technologies such as Virtualization,
One problem with cloud based applications is users.
Clustering, and Grid computing etc. which not only offers low
Although MECs are promising, there are limitations. In
rates to business users but also eliminates the maintenance
particular, they have a significantly lower processing and
cost spent to maintain an internal data center . The most
storage capability compared to the core (centralized)
widely used definition of the cloud computing model is
cloud, thus it is usually in feasible to completely abandon the
introduced by NIST (National Institute of Standards and
core cloud and run every thing on MECs. An important
Technology) as a model for enabling ubiquitous, convenient,
problem is therefore to decide where (i.e., whether on
on-demand network access to a shared pool of configurable
the core cloud, MEC, or mobile device) to place different
computing resources (e.g., networks, servers, storage,
processing and storage com ponents of an application. This is
applications, and services) that can be rapidly provisioned and
referred to as the application placement problem,
2

which is a non-trivial problem as illustrated by the example and MEC. However, in cases where the mobile devices
below. Consider an application which recognizes faces from a processing capability is strictly limited but there is a
real time video stream captured by the camera of reasonably high bandwidth connection between the mobile
a hand-held device. As shown in Fig. 1.1, we can decompose device and MEC it can be good to place FD on the MEC..
this application into one storage component (the database) and Having the database in the core cloud can be benecial because
three different processing components including face detection it can contain large amount of data in feasible for the
(FD), image processing and feature extraction (IPFE), and MEC to store. In this case, FR should also be in the core cloud
face recognition(FR). because it needs to frequently query the database. However, if
the database is relatively small and has locally generated
contents, we may want to place the database and FR onto the
MEC instead of the core cloud, as this reduces the backhaul
network load.

Figure 1.2: Application Placement Problem

We see that even with this simple application, it is non straight


Figure 1.1: Placement Of Multi-Component In forward to conceptually nd the best placement, while many
Edge Computing realistic applications such as streaming, multi casting, and data
aggregation are much more complex. We also note that
The concept of MEC is similar to cloud net , fog computing MECscan be attached to devices at different cellular network
and small cell cloud. layers , yielding a hierarchical cloud structure with more than
Although MECs are promising, there are limitations. In three layers. Mean while,there usually exist multiple
particular, they have a significantly lower processing and applications that are instantiated at the cloud system over time.
storage capability compared to the core (centralized) All these aspects motivate us to consider the application
cloud, thus it is usually in feasible to completely abandon the placement problem in a rigorous optimization
core cloud and run everything on MECs .An important framework where applications arrive in an online manner, i.e.,
problem is therefore to decide where (i.e., whether on they arrive sequentially over time and we do not have
the core cloud, MEC, or mobile device) to place different knowledge on the characteristics of future applications at any
processing and storage components of an application. This is point of time.
referred to as the application placement problem,
which is a non-trivial problem as illustrated by the example
below. Consider an application which recognizes faces from a II. SCOPE/FEATURE REQUIREMENTS
real time video stream captured by the camera of a hand-held Edge computing is killing the cloud. Edge computing is
device. another use case for the cloud. Industry experts are lining up
As shown in Fig. 1.1, we can decompose this application on both sides of the aisle to argue their case. Many
into one storage component (the database) and three different think that edge computing is driven by the emerging needs of
processing components including IoT networks, but edge computing has far greater implications
face detection (FD), image processing and feature extraction than just IoT. Edge computing, or simply the ”edge”, can
(IPFE), and face recognition(FR).and heat. The FD provide significantly improved through put, better
component nds areas of an image (a frame of the video performance and real-time experience by moving both
stream) that contains faces. This part of image is sent to IPFE computing and data closer to the user, and by personalizing
for further processing. The main job of IPFE the processing that needs to happen for each user. Here are a
is to lter out noise in the image and extract useful feature of few examples:
recognizing the person from its face. These features are sent to
FR for matching with a large set of known features 1] By ensuring all app traffic first traverses an edge platform,
of different persons faces stored in the database. Fig.1.1 shows only traffic that must absolutely be sent to the cloud or data
one possible placement of FD ,IPFE , FR ,and the database on center gets forwarded. As a result, developers can significantly
to the hierarchical cloud architecture. This can be a good reduce an apps attack surface, so bad guys have fewer
placement in some cases, but may not be a good placement in opportunities to mount attacks against the core app stack.
other cases.
For example, the benet of running FD on the mobile device 2]Developers can significantly improve application
instead of MEC is that it reduces the amount of data that need performance and deliver a much better end-user experience by
to be transferred between the mobile device
3

allowing for dynamic content to be generated for each end this paper can be regarded as an initial step towards a more
user at the edge. comprehensive study in this direction. Many constraints in the
problem formulation are for ease of presentation ,and can be
3]By validating end-user identities and enforcing API routing readily relaxed for a more general problem. For example, as
policies at the edge, legitimate end-user traffic can be routed discussed in Section VI, the tree-topology restriction is not
via the best path to the right cloud environment ,making the absolutely essential for the applicability of our proposed
edge an ideal platform for the enablement of a multi-region, algorithms. The algorithms also work for class of more
multi-cloud app footprint. general graphs as long as the cycle-free constraint is satisfied.
While we have not considered applications leaving at
A)Practical Implementation: sometime after their arrival, our algorithm can be extended to
incorporate such cases, for example using the idea in [41]. The
Besides the proposed algorithms themselves, the results of this algorithm for cases with unplaced junction nodes is essentially
paper also reveal the following insights that may guide future considering the scenario where there exists some low-level
implementation: placement (for each of the branches) followed by some high
1) The placement is easier when the junction nodes are placed level placement (for the junction nodes). Such ideas may also
beforehand. This is obvious when comparing the time- be useful in developing practical distributed algorithms with
complexities and competitive ratios for cases with and without provable performance guarantees.
unplaced junction nodes
REFERENCES
2) There is a trade-off between instantaneously satisfying the [1 ]Danish Rafique,Luis Velasco,"Machine Learning for [1 ]
objective function and leaving more available resources for S. Wang, Dynamic service placement in mobile micro-clouds,
future applications. Leaving more available resource may Ph.D. dissertation,
cause the system to operate in a suboptimal state for short- Imperial College London, London, U.K., 2015.
term, but future applications may benet from it. This trade-off
can be controlled by dening an alternative objective function [2]M.Armbrustetal.,Aviewofcloudcomputing,Commun.ACM,
which is different from (but related to) the overall objective vol.53, no. 4, pp. 5058,
that the system tries to achieve. Apr. 2010.
B) Tightness of Competitive Ratio [3 ] P. Bahl, R. Y. Han, L. E. Li, and M. Satyanarayanan,
Advancing the state of
By comparing the competitive ratio result of our approach to mobile cloud computing, in Proc. 3rd ACM Workshop Mobile
that in , we see that both approaches provide poly-log Cloud Comput.
competitive ratios for the general case. It is however Services, 2012, pp. 2128.
unclear whether this is the best performance bound one can
achieve for the application placement problem. This is an [4 ] Y. Abe, R. Geambasu, K. Joshi, H. A. Lagar-Cavilla, and
interesting but difficult aspect worth studying in the M. Satyanarayanan,
future. vTube: efcient streaming of virtual appliances over last-mile
networks, in Proc.
4th Annu. Symp. Cloud Comput., 2013, p. 16.
III. SUMMARY
[5 ] K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M.
In this paper, the placement of an incoming stream of Satyanarayanan, Towards
application graphs onto a physical graph has been studied wearable cognitive assistance, in Proc. ACM MobiSys, 2014,
under the MEC context. We have rst proposed an exact opti pp. 6881.
mal algorithm for placing one linear application graph onto a
tree physical graph which works for a variety of objective
functions. Then, with the goal of minimizing the maximum
resource utilization at physical nodes and links, we have
proposed online approximation algorithms for placing tree
application graphs onto tree physical graphs. When the
maximum number of unplaced junction nodes on any path
from the root to a leaf (in the application graph) is a constant,
the proposed algorithm has polynomial time and space
complexity and provides poly-log worst-case optimality bound
(i.e., competitive ratio). Besides the theoretical evaluation of
worst-case performance, we have also shown the average
performance via simulation. A combination of these results
implies that the proposed method performs reasonably well on
average and it is also robust in extreme cases. The results in

Вам также может понравиться