A Locality Sensitive Hashing Based Collaborative Service Offloading Method in Cloud-Edge Computing

Benefiting by the big data produced by ever increasing IoT devices, big data services are gaining popular attention in many areas. However, general IoT terminals are unable to execute these services due to the exponentially growing data and the limited computing resources. And a possible solution is to execute the services on remote cloud data centers. However, transferring all data to remote cloud for process brings huge energy consumption and congestion on the backends under high load conditions. The development of edge servers makes it possible to handle some simple tasks on edge servers. Towards this end, it is imperative to design a collaborative service offloading scheme to process data of complex big data services on both edge servers and clouds. In this paper, to protect user’s privacy and quickly decide offloading destination for big data services, we propose a locality sensitive hashing based allocating strategy called Loyal. Loyal relies on E2LSH technique to hash and encrypt the sensitive data information. In addition, Loyal is able to retrieve suitable service that can be offloaded to the ES in a short time. Finally, the performance of Loyal is presented by simulation experiment.

[1]  Ki-Sook Chung,et al.  Multi-tier multi-access edge computing: The role for the fourth industrial revolution , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).

[2]  K. Tanaka,et al.  A Scalable Localization Algorithm for High Dimensional Features and Multi Robot Systems , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[3]  Jiajia Liu,et al.  Collaborative Computation Offloading for Multiaccess Edge Computing Over Fiber–Wireless Networks , 2018, IEEE Transactions on Vehicular Technology.

[4]  Chadi Assi,et al.  Joint Optimization of Computational Cost and Devices Energy for Task Offloading in Multi-Tier Edge-Clouds , 2019, IEEE Transactions on Communications.

[5]  John Fox,et al.  The deployment of an IoT network infrastructure, as a localised regional service , 2019, 2019 IEEE 5th World Forum on Internet of Things (WF-IoT).

[6]  Mansoor Alam,et al.  Reliability and Utilization Evaluation of a Cloud Computing System Allowing Partial Failures , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[7]  Feng Zhang,et al.  An Adult Image Recognition Method Facing Practical Application , 2013, 2013 Sixth International Symposium on Computational Intelligence and Design.

[8]  Kan Siew Leong,et al.  A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[9]  Alberto Ceselli,et al.  Mobile Edge Cloud Network Design Optimization , 2017, IEEE/ACM Transactions on Networking.

[10]  Ricard Vilalta,et al.  Integration of IoT, Transport SDN, and Edge/Cloud Computing for Dynamic Distribution of IoT Analytics and Efficient Use of Network Resources , 2018, Journal of Lightwave Technology.

[11]  Una-May O'Reilly,et al.  Analysis of locality-sensitive hashing for fast critical event prediction on physiological time series , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

[12]  Yunlong Cai,et al.  Latency Optimization for Resource Allocation in Mobile-Edge Computation Offloading , 2017, IEEE Transactions on Wireless Communications.

[13]  Mehdi Bahrami,et al.  Cloud Computing for Emerging Mobile Cloud Apps , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[14]  Li Miao,et al.  Research on analysis system of city price based on big data , 2016, 2016 IEEE International Conference on Big Data Analysis (ICBDA).

[15]  Gang Chen,et al.  Large-scale documents reduction based on domain ontology and E2LSH , 2014, Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control.

[16]  Deming Zhong,et al.  Integrating Model Checking With SysML in Complex System Safety Analysis , 2019, IEEE Access.

[17]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[18]  Michael D. Norman Complex Systems engineering in a federal IT environment: Lessons learned from traditional enterprise-scale system design and change , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.

[19]  Liang Tong,et al.  A hierarchical edge cloud architecture for mobile computing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[20]  Bernadette Dorizzi,et al.  Locality sensitive hashing for content based image retrieval: A comparative experimental study , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).