Вы находитесь на странице: 1из 8

Edge Computing

By WEISONG SHI, Fellow IEEE


Guest Editor
GEORGE PALLIS
Guest Editor
ZHIWEI XU
Guest Editor

I n recent years, with the proliferation of the Internet of Things (IoT) and
the wide penetration of wireless networks, the number of edge devices
and the data generated from the edge have been growing rapidly.
According to International Data Corporation (IDC) prediction [20],
global data will reach 180 zettabytes (ZB), and 70% of the data generated by
IoT will be processed on the edge
of the network by 2025. IDC also
3) Availability: As more and more
Internet services are deployed
on the cloud, the availability
of these services has become
an integral part of daily life.
For example, smartphones users
who get used to voice-based
forecasts that more than 150 billion This special issue services, e.g., Siri, will feel frus-
trated if the service is unavailable
devices will be connected worldwide provides state-of-the- for a short period of time. There-
by 2025. In this case, the central-
ized processing mode based on cloud art coverage of edge fore, it is a big challenge for cloud
computing is not efficient enough computing topics and service providers to keep the 24 ×
to handle the data generated by 7 promise.
the edge. The centralized processing
highlights the current 4) Energy: Data centers consume a
model uploads all data to the cloud challenges and future lot of energy. According to Sverd-
lik’s research [2], the energy con-
data center through the network and
leverages its supercomputing power
opportunities in sumption of all data centers in
to solve the computing and storage this area. the United States will increase by
problems, which enables the cloud 4% by 2020, reaching 73 billion
services to create economic benefits. kilowatt-hours. With the increas-
However, in the context of IoT, traditional cloud computing has several ing amount of computation and
shortcomings. transmission, energy consumption
will become a bottleneck restrict-
1) Latency: Novel applications in the IoT scenario have high real-time ing the development of cloud com-
requirements. In the traditional cloud computing model, applications puting centers.
send data to the data center and obtain a response, which increases 5) Security and Privacy: Data in the
the system latency. For example, high-speed autonomous driving vehi- interconnection of thousands of
cles require milliseconds of response time. Serious consequences will households are closely related to
occur once the system latency exceeds expectations due to network users’ lives. For example, indoor
problems. cameras transmitting video data
2) Bandwidth: Transmitting large amounts of data generated by edge devices from the house to the cloud
to the cloud in a real-time manner will cause great pressure on network will increase the risk of leak-
bandwidth. For example, Boeing 787 generates more than 5 GB/s of data, ing users’ private information.
but the bandwidth between an aircraft and satellites is insufficient to With the enforcement of EU Gen-
support real-time transmission [10]. eral Data Protection Regulation
(GDPR) [18], data security and
privacy issues have become more
important for cloud computing
Digital Object Identifier 10.1109/JPROC.2019.2928287 companies.

0018-9219 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

1474 P ROCEEDINGS OF THE IEEE | Vol. 107, No. 8, August 2019


Scanning The Issue

offloading, data storage, caching,


and processing, as well as distribute
requests and deliver services from the
cloud to the user. With those tasks
along the data path, the edge itself
needs to be well designed to meet the
requirement efficiently, such as relia-
bility, security, and privacy protection.

3) Three-Tier Edge Computing Model:


By analyzing several representative
application scenarios of edge comput-
ing, in Fig. 2, we abstract a typical
three-tier edge computing model:
IoT, edge, and cloud. The first tier
is IoT, including drones, sensors in the
connected health area, devices and
appliances in the smart home, and
Fig. 1. Edge computing in a nutshell [15].
equipment in the industrial Internet.
Multiple communication protocols are
These challenges have pushed the and cloud data centers, and edge is a used to connect IoT and the second
horizon of edge computing, which continuum. tier, edge. For example, drones can
calls for processing the data at the The edge of the Internet is a connect to a cellular tower by 4G/LTE,
edge of the network. It has devel- unique place. Located usually just and sensors in the smart home can
oped rapidly since 2014 with the one hop away from associated end communicate with the home gateway
potential to reduce latency and band- devices, it offers ideal placement for through WiFi. Edge, including
width charges, address the limitation low-latency offload infrastructure to connected and autonomous vehicles,
of computing capability of the cloud support emerging applications such cellular tower, gateway, and edge
data center, and increase availability as augmented reality, public safety, servers, requires the huge computing
as well as protect data privacy and connected and autonomous driving, and storage capabilities of the cloud
security. smart manufacturing, and healthcare. to complete complex tasks. The proto-
It is an optimal site for aggregating, cols between IoT and the edge usually
A. Edge Computing Basics analyzing, and distilling bandwidth- have the characteristics of low power
hungry sensor data from devices such consumption and short distance,
1) Definition: Edge computing is a
as video cameras. New challenges and while the protocols between the edge
new paradigm in which the resources
opportunities arise as the consolida- and the cloud have large throughput
of an edge server are placed at
tion of cloud computing meets the and high speed. The Ethernet, optical
the edge of the Internet, in close
dispersion of edge computing. Next, fibers, and the coming 5G are the
proximity to mobile devices, sensors,
we describe what functions can be preferred communication protocols
end users, and the emerging IoT.
performed at the edges, and how edge between the edge and the cloud.
Terms such as “cloudlets,” “micro data
centers,” and “fog” have been used computing fits in today’s cloud com- 4) Edge Versus Cloud: Edge com-
in the literature to refer to these puting model by presenting a typical puting and cloud computing are not
types of small, edge-located com- three-tier edge computing model. substituted relationships; rather, they
puting hardware. They all represent are complementary. The ubiquity of
counterpoints to the theme of consoli- 2) Functions: As illustrated in Fig. 1 smart devices and rapid development
dation and massive data centers that [15], edge computing has a two-way of modern virtualization and cloud
have dominated discourse in cloud computing stream: one is from devices technologies have brought edge com-
computing. Shi et al. [15] defined to the cloud (upstream) and the other puting to the foreground, defining a
edge computing as follows. Edge com- is from the cloud to devices (down- new era in cloud computing. Edge
puting refers to the enabling technolo- stream). In the edge computing par- computing needs powerful computing
gies allowing computation to be per- adigm, end devices not only are data power and massive storage support
formed at the edge of the network, on consumers but they also serve as data of a cloud computing center, and the
downstream data on behalf of cloud producers. At the edge, things can cloud computing center also needs
services and upstream data on behalf not only request service and content the edge computing model to process
of IoT services. “Edge” is defined as from the cloud but they can also massive data and privacy data.
any computing and network resources perform computing tasks from the Edge computing has several obvi-
along the path between data sources cloud. Edge can perform computing ous advantages. First, a large amount

Vol. 107, No. 8, August 2019 | P ROCEEDINGS OF THE IEEE 1475


Scanning The Issue

Fig. 2. Three-tier edge computing model.

Fig. 3. Number of papers related to by “edge computing” on Google Scholar.

of temporary data are processed at technology preparation period, rapid events in the development process of
the edge of the network, but not growth period, and steady develop- edge computing.
all of it is uploaded to the cloud, ment period. We use “edge com-
which greatly reduces the pressure on puting” as the keyword to search A. Technology Preparation
the network bandwidth and data cen- the number of articles published per Period
ter power consumption. Second, data year in Google Scholar. As shown in During the technology prepara-
processing near the data producer Fig. 3, before 2015, edge comput- tion period, edge computing went
does not require the response of the ing was in the technology preparation through the development process of
cloud computing center through the period. Since 2015, the number of dormancy, presentation, definition,
network, which greatly reduces the papers related to “edge computing” and generalization. Edge computing
system latency and enhances the ser- has grown tenfold. Edge computing can be traced back to the con-
vice response capability. Finally, edge has entered the rapid growth period. tent delivery network (CDN) pro-
computing stores users’ private data Note that the number of papers in posed by Akamai in 1998 [17].
on edge devices instead of uploading 2019 is estimated based on the results CDN is an Internet-based caching
it, which reduces the risk of network of the first five months. We predict network, which relies on caching
data leakage and protects security and that edge computing will continue servers deployed in different places
privacy. to develop rapidly until 2020. After and points users’ access to the nearest
2020, edge computing will step into caching server through load balanc-
I. E D G E C O M P U T I N G the steady development period. In ing, content distribution, scheduling,
EVOLUTION this period, edge computing will real- and other functional modules of
The field of edge computing has ize the integration of academia and the central platform. Therefore, CDN
developed rapidly in recent years industry, bring the product into the can reduce network congestion and
since 2014. We categorize the devel- business, and finally facilitate peoples’ improve user access response speed
opment process into three stages: daily lives. Fig. 4 illustrates typical and hit rate. CDN emphasizes the

1476 P ROCEEDINGS OF THE IEEE | Vol. 107, No. 8, August 2019


Scanning The Issue

Fig. 4. Typical events in the development process of edge computing.

backup and caching of data, while an explosive growth in the context of main links by reducing the number of
the core idea of edge computing IoT. In order to address the challenges communications between cloud com-
focuses more on function caching. of computing offload and data trans- puting centers and mobile users. Fog
Ravi et al. [13] first proposed the mission, researchers began to explore computing and edge computing have
concept of function cache at the how to increase data processing capa- great similarities, but fog computing
first time and applied it to personal- bility near the data producer. The focuses more on communication opti-
ized mailbox management services to representative computing models are mization at the infrastructure level,
save latency and bandwidth. Satya- mobile edge computing (MEC), fog while edge computing pays atten-
narayanan et al. [14] put forward the computing, and cloud-sea computing. tion to computing needs and net-
concept of Cloudlet, which is a trusted MEC [11] is a network structure work demand of both end devices and
and resource-rich host, deployed on that provides information services infrastructure, including the collabo-
the edge of the network, connected and cloud computing capabilities ration among end devices, edges, and
to the Internet, and can be accessed within the wireless access network clouds.
by mobile devices to provide ser- near mobile users. Since MEC is Meanwhile, in 2012, the Chinese
vices. Cloudlet is also known as “small located in a wireless access network Academy of Sciences launched a
cloud” as it can provide services for and close to mobile users, it can ten-year strategic priority research
users, similar to the cloud server. At achieve lower latency and higher initiative called the Next Genera-
this point, edge computing empha- bandwidth to improve the quality tion Information and Communication
sized downstream, that is, it down- of service and user experience. MEC Technology (NICT) initiative. Its main
streamed the functions from cloud emphasizes the establishment of edge purpose is to carry out research of
servers to edge servers to reduce servers between the cloud server the “Cloud-Sea Computing System
bandwidth and delay. and edge devices to do computing, Project” [19]. It aims to augment
The rationale of edge computing which is similar to the architecture cloud computing by cooperation and
is that computing should happen at and hierarchy of an edge computing integration of the “cloud computing”
the proximity of the data source with server, so MEC is regarded as an system and the “sea computing” sys-
the “edge” constituting any comput- important part of edge computing. tem. “Sea” refers to an augmented
ing and network resources along the Cisco introduced fog computing in client side consisting of human fac-
path between data sources and the 2012 and defined fog computing as a ing and physical world facing devices
cloud [16]. In this context, sensory highly virtualized computing platform and subsystems. Cloud-sea comput-
data are converted from raw signals for migrating cloud computing cen- ing focuses on the two ends “sea”
to contextually relevant information ter tasks to network edge devices and “cloud,” while edge computing
in the proximity of the data source. [8]. It relieves the bandwidth load focuses on the data path between
Subsequently, edge data ushered in and energy consumption pressure of “sea” and “cloud.”

Vol. 107, No. 8, August 2019 | P ROCEEDINGS OF THE IEEE 1477


Scanning The Issue

In 2013, Ryan LaMothe from the edge computing track and/or work- Subsequently, KubeEdge, a Kuber-
Pacific Northwest National Laboratory shops to their main conferences. In netes native edge computing frame-
proposed the term “edge computing” January 2018, the world’s first text- work, was accepted into the CNCF
in a two-page internal report, which book on edge computing was pub- sandbox in March 2019 [7]. In April
is the first time modern “edge com- lished by Science Press. 2019, Bio-World Conference and
puting” [12] was formulated. At this At the same time, multiple industry Expos added the Edge track [6],
time, the concept of edge comput- sectors have actively promoted the which means that edge comput-
ing includes both the downstream of development of edge computing. ing is important to the health
cloud services and the upstream of In September 2015, the European domain as well.
IoT. Telecommunications Standards Insti-
tute (ETSI) published a white paper
B. Rapid Growth Period on MEC [11]. In November 2015, II. A B O U T T H E S P E C I A L
Since 2015, edge computing has Cisco, ARM, Dell, Intel, Microsoft, ISSUE
been in a rapid growth period, attract- and Princeton University jointly Although edge computing is very
ing intensive close attention from established the OpenFog Consortium, promising, there are still many
academia and industry. which is dedicated to the development challenges faced by the community,
At the government level, in May of Fog Reference Architecture [4]. ranging from fundamental technolo-
2016, the National Science Founda- The OpenFog Consortium merged gies to novel application scenarios
tion (NSF) of the United States listed into the Industrial Internet-of-Things and potential business models. To
edge computing as one of the high- (IIoT) in January 2019. In November help the computing community get
lighted areas in the research of com- 2016, Huawei, Shenyang Institute of a better understanding of where
puter systems. In August 2016, NSF Automation of Chinese Academy of we are and how to leverage edge
and Intel formed a partnership in Sciences, China Academy of Informa- computing in their own fields, we
information center networks in wire- tion and Communications Technology think it is important to develop a
less edge networks (ICN-WEN) [3]. (CAICT), Intel, ARM, and iSoftStone special section presenting the state
In October 2016, the NSF held the established the Edge Computing of the art of edge computing. We
NSF Workshop on Grand Challenges Consortium (ECC) in Beijing, which have witnessed a wide range of
in edge computing [9]. The work- is dedicated to advancing cooperation progress, particularly in the past five
shop focused on three topics: the among industry resources from gov- years, spanning the following topics:
vision of edge computing in the next ernment, vendor, academic, research, systems and tools, which provide
five to ten years; the grand chal- and customer sectors, and pushing the basis for the edge computing;
lenges to achieving the vision; and the forward the sustainable development innovative edge networks; edge
best mechanisms for academia, indus- of the edge computing industry [1]. computing applications in multiple
try, and the government to attack In March 2017, the MEC Industry domains, such as smart cities, public
these challenges in a cooperative way. Specification Working Group was safety, and autonomous driving,
This indicates that the development formally renamed as multiaccess edge industry IoT, and so on; and new
of edge computing has attracted great computing, aiming to better meet security and privacy threats. We have
attention at the government level. the requirement of edge computing formed an international team of Guest
In academia, Shi et al. [15] gave and related standards. Linux EdgeX Co-Editors, and assembled 13 papers
a formal definition of edge comput- Foundry was also built in 2017; it is a from North America, Europe, and
ing in the paper “Edge computing: vendor-neutral open-source project China, covering edge computing
Vision and challenges.” They defined hosted by The Linux Foundation. foundations, technologies, security
edge computing as enabling technolo- It aims to build a common open and privacy, applications, and case
gies allowing computation to be per- framework for IoT edge computing. studies.
formed at the edge of the network, In January 2018, Automotive ECC This special issue contains 13
on downstream data on behalf of (AECC) was established to drive the invited papers from prominent sci-
cloud services and on upstream data network and computing infrastructure entists relating to edge computing,
on behalf of IoT services. This paper needs of automotive big data [5], which witnesses the rapid devel-
pointed out the challenges of edge which indicates that edge computing opment of relevant core technolo-
computing and has been cited more is valued in the vehicle domain. In the gies, including virtualization and
than 1000 times in three years. In same year, Cloud Native Computing migration, software-defined network-
October 2016, ACM and IEEE jointly Foundation (CNCF) Foundation and ing (SDN), computing offloading,
organized the first ACM/IEEE Sym- Eclipse Foundation cooperated to programming models and operating
posium on Edge Computing (SEC). bring Kubernetes, which has been systems, security, privacy, systems and
Since then, ICDCS, INFOCOM, Mid- widely used in the ultralarge-scale tools, and fast penetration of edge
dleWare, and other important inter- cloud computing environment, into computing in several applications sce-
national conferences have added an the edge computing scene of the IoT. narios, including video analytics for

1478 P ROCEEDINGS OF THE IEEE | Vol. 107, No. 8, August 2019


Scanning The Issue

public safety, autonomous driving, checking as the key technique ited processing power of connected
deep learning, wireless communica- to compute coordination plans, devices can restrict the use of secu-
tion, and edge intelligence. which satisfy device, edge, and rity measures making them especially
Although edge computing brings system goals. vulnerable to both cyber and physical
the computation closer to delay- 4) “A survey on edge computing attacks, while mobility and the rapid
sensitive services, challenges that systems and tools” reviews ex- provisioning of edge nodes require
restrict the cloud model still remain as isting systems and open-source efficient mechanisms for establishing
the pace of generated data continues projects for edge computing by and attesting trust in the edge. The
to rise. Edge nodes can be mobile, categorizing them according to next two articles deal with security
and the rapid changes can occur their design demands and inno- and privacy issues in edge computing:
anytime in dynamic networks (e.g., vations. In addition, topics that 1) “Edge computing security: State
connectivity failure and bandwidth are related to energy efficiency of the art and challenges”
fluctuation); therefore, the orchestra- and deep learning optimization reviews the most influential and
tion of edge services becomes more of edge computing systems basic attacks as well as the
challenging. Specifically, service dis- are discussed. corresponding defense mecha-
covery, resource coordination, coping 5) “Ecosystem of things: Hard- nisms that can be practically
with resource heterogeneity, lifecy- ware, software, and architec- applied to edge computing sys-
cle management, and task offloading ture” surveys the state of the tems. Moreover, the article out-
are open research challenges. More- art in supporting smart edge lines the challenges and future
over, scheduling data management computing and makes some directions toward securing edge
and processing tasks to derive analyt- concluding observations with computing systems.
ics insights requires “intelligent” con- respect to hardware, system 2) “Privacy techniques for edge
sideration. The following six articles software, and ecosystem archi- computing systems” discusses
present state-of-the-art studies that tecture. Within this survey, the approaches for privacy-
address these challenges. paper deals with the following preserving data aggregation at
research challenges: how much the edge. The article focuses on
1) “A survey of virtual machine raw computing capability techniques by which the edge
(VM) management in edge and energy efficiency the can provide services to users
computing” provides an hardware of things provides, while assuring user privacy
overview on the industrial what abstractions the system as well as privacy-preserving
and research projects on VM software supports to utilize crowd-sourcing techniques.
management in edge com- the hardware capabilities, and
puting. The paper focuses on what ecosystem architectures Edge computing brings together
the virtualization frameworks are proposed to harmonize IoT, big data, and mobile computing
and virtualization techniques, innovation and fragmentation. into an integrated and ubiquitous
serverless management, and 6) “Computation offloading tow- computing platform. The capability
security advantages and issues ard edge computing” surv- offered to deliver on-demand com-
that virtualization brings to eys recent research efforts puting power at the edge and the
edge computing. made on exploring com- ability to process the vast amount of
2) “Software-defined networking putation offloading toward data coming from an abundance of
(SDN) enhanced edge comput- edge computing. The authors devices/sensors provide a huge impe-
ing: A network-centric survey” highlight the challenges of tus to artificial intelligence (AI) tech-
discusses how SDN and related computation offloading with nologies. The following five articles
technologies are integrated respect to task partitioning, focus on these topics.
to facilitate the management allocation, and execution over 1) “Deep learning with edge
and the operations of edge the new architecture of edge computing: A review” provides
servers and various IoT devices. computing and investigate an overview of applications
The authors discuss the disruptive application scenar- where deep learning is used at
current status and present new ios, such as real-time video the network edge. Computer
perspectives on this topic. analytics, autonomous driving, vision, natural language
3) “Dependable resource coordi- smart home, and cloud gaming. processing, network functions,
nation on the edge at runtime” and virtual and augmented
introduces a methodology and Along with the benefits that edge reality are discussed as example
technical framework for engi- computing brings, there are numer- application drivers. The authors
neering resource coordination ous challenges we should take into discuss different architectures
for the edge-enabled IoT. The account, especially with respect to and methods to speed up deep
authors use bounded model data security and privacy. The lim- learning inference and training

Vol. 107, No. 8, August 2019 | P ROCEEDINGS OF THE IEEE 1479


Scanning The Issue

deep learning models on edge 4) “Wireless edge computing with technology for a deep learning
devices, with an emphasis latency and reliability guaran- model toward training and
on distributed training across tees” discusses the feasibility inference at the network edge.
devices and privacy. and potential of providing We hope that through this spe-
2) “Edge video analytics for public edge computing services with cial section, we have delivered a
safety: A review” provides a latency and reliability guar- state-of-the-art glimpse of current
survey of applications, algo- antees. The article proceeds edge computing topics, bringing novel
rithms, and platforms that have by presenting selected use problems that must be investigated
been proposed to facilitate edge cases that reflect the interplay to the attention of the community.
video analytics for public safety. between edge computing We also hope that it will serve as
3) “Edge computing for autonom- and ultrareliable low-latency a valuable reference for researchers
ous driving: Opportunities and communication (URLLC). and practitioners working in the edge
challenges” surveys the designs 5) “Edge intelligence: Paving computing domain and its emerging
of autonomous driving edge the last mile of AI with applications. Furthermore, we envi-
computing systems. In addi- edge computing” conducts a sion this special section will help to
tion, this article presents the comprehensive survey of the establish a pathway toward a smart
security issues in autonomous research efforts on edge intelli- edge computing continuum. Finally,
driving as well as how edge gence. This article provides an we would like to express our gratitude
computing designs can address overview of the architectures, to the invited authors and reviewers
these issues. frameworks, and emerging key for their contributions.

REFERENCES
[1] (2016). Introduction of Edge Computing Consortium. [9] M. Chiang and W. Shi, “NSF workshop report on mobile computing,” IEEE Pervasive Comput., vol. 8.
[Online]. Available: http://en.ecconsortium.org/ grand challenges in edge computing,” Tech. Rep., no. 4, pp. 14–23, Oct./Dec. 2009.
[2] Here’s How Much Energy All US Data Centers Oct. 2016. [Online]. Available: [15] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge
Consume, Data Center Knowl., San Francisco, CA, http://iot.eng.wayne.edu/edge/NSF%20Edge% computing: Vision and challenges,” IEEE Internet
USA, 2016. 20Workshop%20Report.pdf Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016.
[3] NSF/Intel Partnership on ICN in Wireless Edge [10] M. Finnegan, “Boeing 787s to create half a terabyte [16] M. Symeonides, D. Trihinas, Z. Georgiou, G. Pallis,
Networks, Nat. Sci. Found., Alexandria, VA, of data per flight, says Virgin Atlantic,” and M. Dikaiakos, “Query-driven descriptive
USA, 2016. Computerworld UK, Mar. 6, 2013. analytics for IoT and edge computing,” in Proc. IEEE
[4] (2016). Introduction of OpenFog Consortium. [11] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and Int. Conf. Cloud Eng. (IC2E), Jun. 2019, pp. 1–11.
[Online]. Available: V. Young, “Mobile edge computing—A key [17] A. Vakali and G. Pallis, “Content delivery networks:
https://www.openfogconsortium.org/ technology towards 5G,” ETSI, Sophia Antipolis, Status and trends,” IEEE Internet Comput., vol. 7,
[5] (2018). Automotive Edge Computing Consortium. France, ETSI, White Paper 11, 2015, pp. 1–16, no. 6, pp. 68–74, Nov. 2003, doi: 10.1109/
[Online]. Available: https://aecc.org vol. 11, no. 11. MIC.2003.1250586.
[6] (2019). Bio-IT World Edge Track. [Online]. [12] R. LaMothe, “Edge computing,” Pacific Northwest [18] P. Voigt and A. von dem Bussche, “The EU general
Available: Nat. Lab., Richland, WA, USA, Tech. Rep., 2013. data protection regulation (GDPR),” in A Practical
https://www.bio-itworldexpo.com/edge# Accessed: Mar. 2014. [Online]. Available: Guide, 1st ed. Cham, Switzerland: Springer, 2017.
https://mafiadoc.com/edge-computing-pacific- [19] Z.-W. Xu, “Cloud-sea computing systems: Towards
[7] (2019). KubeEdge—A Kubernetes Native Edge
northwest-national-laboratory_ thousand-fold improvement in performance per
Computing Framework. [Online]. Available:
59d648481723dd08e35b7b77.html watt for the coming zettabyte era,” J. Comput. Sci.
https://kubeedge.io/en/blog/cncf-sandbox-
announcement/ [13] J. Ravi, W. Shi, and C.-Z. Xu, “Personalized email Technol., vol. 29, no. 2, pp. 177–181, Jan. 2014.
management at network edges,” IEEE Internet [20] M. Zwolenski and L. Weatherill, “The digital
[8] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog
Comput., vol. 9, no. 2, pp. 54–60, Mar. 2005. universe: Rich data and the increasing value of the
computing and its role in the Internet of Things,” in
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., [14] M. Satyanarayanan, P. Bahl, R. Caceres, and Internet of Things,” Austral. J. Telecommun. Digit.
2012, pp. 13–16. N. Davies, “The case for VM-based cloudlets in Econ., vol. 2, no. 3, p. 47, 2014.

ABOUT THE GUEST EDITORS

Weisong Shi (Fellow, IEEE) was on leave in the edge computing research community, and published the first
with the National Science Foundation as book on edge computing.
a Program Director in the Division of Prof. Shi has been actively involved in the activities of the IEEE
Computer and Network Systems and the Computer Society. He served as Chair of the Technical Committee
Directorate of computer and information on the Internet (TCI) from 2012 to 2016. He is the Founding Steering
science and engineering from 2013 to 2015. Committee Chair of the ACM/IEEE Symposium on Edge Computing
He is currently a Charles H. Gershenson (SEC) and the IEEE/ACM Connected Health: Applications, Systems
Distinguished Faculty Fellow and a Professor and Engineering (CHASE). He is an ACM Distinguished Scientist.
of computer science with Wayne State He currently serves on the Research Advisory Board of the IEEE
University, Detroit, MI, USA, where he directs the Mobile and Inter- Computer Society. He is the Inaugural Editor-in-Chief of Smart
net SysTems Laboratory (MIST) and Connected and Autonomous Health (Elsevier), an Associate Editor-In-Chief of the IEEE Internet
dRiving Laboratory (CAR), investigating performance, reliability, Computing Magazine, and an Associate Editor of several journals,
power- and energy-efficiency, trust and privacy issues of networked including the IEEE TRANSACTIONS ON SERVICES COMPUTING, and the ACM
computer systems, and applications. He is one of the world leaders Transactions on Internet of Things, to name a few.

1480 P ROCEEDINGS OF THE IEEE | Vol. 107, No. 8, August 2019


Scanning The Issue

George Pallis received the B.Sc. and Zhiwei Xu received the B.S. degree from
Ph.D. degrees from the Department of Infor- the University of Electronic Science and
matics, Aristotle University of Thessaloniki, Technology of China, Chengdu, China,
Thessaloniki, Greece, in 2001 and 2006, in 1982, the M.S. degree from Purdue
respectively. University, West Lafayette, IN, USA, in 1984,
He was a Lecturer and a Marie-Curie Fel- and the Ph.D. degree from the University of
low with the Computer Science Department, Southern California, Los Angeles, CA, USA,
University of Cyprus, Nicosia, Cyprus, where in 1987.
he is currently an Assistant Professor. He He was a Chief Engineer with Sugon,
is also the Principal Institutional Investigator in several research Beijing, China (listed in the Shanghai Stock Exchange), a leading
projects funded by the European Commission, Research Promo- high-performance computer vendor. His research work has
tion Foundation, Cyprus, and industry (e.g., Google). He has received the MICRO Best Paper Award and some have been used
authored or coauthored more than 70 papers in international jour- worldwide via open-source software. He is currently a Professor and
nals [e.g., the IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING Chief Technology Officer with the Institute of Computing Technology
(TKDE), the IEEE TRANSACTIONS ON CLOUD COMPUTING (TCC), the IEEE (ICT), Chinese Academy of Sciences (CAS), Beijing. He currently
TRANSACTIONS ON SERVICES COMPUTING (TSC), the ACM TRANSACTIONS ON leads Software-Defined Cloud Computing Systems, a priority basic
INTERNET TECHNOLOGY (TOIT), etc.], magazines (e.g., CACM and the research project supported by the Ministry of Science and Tech-
IEEE Internet Computing) and conferences (e.g., INFOCOM, IPDPS, nology of China. His current research interests include distributed
ICDCS, IEEE BIG DATA, etc.). He is a contributor to two international computing systems and high-performance computer architecture.
DIN (German Institute for Standardization) standards. His current Dr. Xu has served on the editorial boards of several international
research interests include cloud computing, especially on cloud journals, such as the IEEE TRANSACTIONS ON COMPUTERS, the IEEE
elasticity and monitoring, edge computing, and big data analytics. TRANSACTIONS ON SERVICES COMPUTING, Parallel Computing, and the
Dr. Pallis has served as the PC-Co-Chair for CloudCom 2018 Journal of Parallel and Distributed Computing. He has also served
and CCGrid 2019. He has also served in numerous program and on program committees for international conferences such as
organization committees for international conferences. He was a HPCA, HPDC, and Supercomputing.
recipient of the Best Paper Awards in the IEEE Big Data Conference
(IEEE BIG DATA 2016) and the International Conference on Service-
Oriented Computing (ICSOC 2014). He is the Editor-in-Chief of the
IEEE Internet Computing Magazine, an Associate Editor of the IEEE
TRANSACTIONS ON CLOUD COMPUTING, and an Associate Editor of the
Computing Journal.

Vol. 107, No. 8, August 2019 | P ROCEEDINGS OF THE IEEE 1481

Вам также может понравиться