Reducing your local footprint with anyrun computing

Computational offloading is the standard approach to running computationally intensive tasks on resource-limited smart devices, while reducing the local footprint, i.e., the local resource consumption. The natural candidate for computational offloading is the cloud, but recent results point out the hidden costs of cloud reliance in terms of latency and energy. Strategies that rely on local computing power have been proposed that enable fine-grained energy-aware code offloading from a mobile device to a nearby piece of infrastructure. Even state-of-the-art cloud-free solutions are centralized and suffer from a lack of flexibility, because computational offloading is tied to the presence of a specific piece of computing infrastructure. We propose AnyRun Computing?(ARC), a system to dynamically select the most adequate piece of local computing infrastructure. With ARC, code can run anywhere and be offloaded not only to nearby dedicated devices, as in existing approaches, but also to peer devices. We present a detailed system description and a thorough evaluation of ARC?under a wide variety of conditions. We show that ARC?matches the performance of the state-of-the-art solution (MAUI), in reducing the local footprint with stationary network topology conditions and outperforms it by up to one order of magnitude under more realistic topological conditions.

[1]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[2]  Mohan Kumar,et al.  Minimum-Delay Service Provisioning in Opportunistic Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[3]  Daniele Puccinelli,et al.  The human element as the key enabler of pervasiveness , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.

[4]  Mahadev Satyanarayanan,et al.  Self-tuned remote execution for pervasive computing , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[5]  Yi Yang,et al.  Achieving efficient and privacy-preserving multi-feature search for mobile sensing , 2015, Comput. Commun..

[6]  Harry Zhang,et al.  The Optimality of Naive Bayes , 2004, FLAIRS.

[7]  Arun Venkataramani,et al.  Augmenting mobile 3G using WiFi , 2010, MobiSys '10.

[8]  Jörg Ott,et al.  On search and content availability in opportunistic networks , 2016, Comput. Commun..

[9]  Matthias Hauswirth,et al.  Producing wrong data without doing anything obviously wrong! , 2009, ASPLOS.

[10]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[11]  Wen Hu,et al.  Preserving privacy in participatory sensing systems , 2010, Comput. Commun..

[12]  Muttukrishnan Rajarajan,et al.  Robust access control framework for mobile cloud computing network , 2015, Comput. Commun..

[13]  Daniele Puccinelli,et al.  Detecting energy leaks in Android app with POEM , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[14]  Guobin Shen,et al.  MobiUS: enable together-viewing video experience across two mobile devices , 2007, MobiSys '07.

[15]  Jukka K. Nurminen,et al.  Energy Efficiency of Mobile Clients in Cloud Computing , 2010, HotCloud.

[16]  Rodney S. Tucker,et al.  Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.

[17]  Jörg Ott,et al.  SCAMPI: service platform for social aware mobile and pervasive computing , 2012, MCC '12.

[18]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[19]  Tassos Dimitriou,et al.  A platform for privacy protection of data requesters and data providers in mobile sensing , 2015, Comput. Commun..

[20]  Ping Gui,et al.  Wireless Networking Testbed and Emulator (WiNeTestEr) , 2016, Comput. Commun..

[21]  Markus Peura,et al.  The Self-Organizing Map of Trees , 1998, Neural Processing Letters.

[22]  Finn V. Jensen,et al.  Bayesian Networks and Decision Graphs , 2001, Statistics for Engineering and Information Science.

[23]  Tristan Henderson,et al.  CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth , 2005, IEEE Pervasive Comput..

[24]  Silvia Giordano,et al.  Gesture-based soft authentication , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[25]  Takayuki Nishio,et al.  Adaptive resource discovery in mobile cloud computing , 2014, Comput. Commun..

[26]  Eleonora Borgia,et al.  The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..

[27]  Luigi Rizzo,et al.  An emulation tool for PlanetLab , 2011, Comput. Commun..

[28]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[29]  Donald A. Berry,et al.  Statistics: A Bayesian Perspective , 1995 .

[30]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[31]  Teuvo Kohonen,et al.  The self-organizing map , 1990 .

[32]  Byung-Gon Chun,et al.  Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.

[33]  Mohan Kumar,et al.  Opportunities in Opportunistic Computing , 2010, Computer.

[34]  Marco Dorigo,et al.  Ant system: optimization by a colony of cooperating agents , 1996, IEEE Trans. Syst. Man Cybern. Part B.

[35]  Prathima Agrawal,et al.  Realizing mobile wireless Internet telephony and streaming multimedia testbed , 2004, Comput. Commun..

[36]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[37]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[38]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[39]  Pan Hui,et al.  ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading , 2012, 2012 Proceedings IEEE INFOCOM.