Workload management for dynamic mobile device clusters in edge femtoclouds

Edge computing offers an alternative to centralized, in-the-cloud compute services. Among the potential advantages of edge computing are lower latency that improves responsiveness, reduced wide-area network congestion, and possibly greater privacy by keeping data more local. In our previous work on Femtoclouds, we proposed taking advantage of clusters of devices that tend to be co-located in places such as public transit, classrooms or coffee shops. These clusters can perform computations for jobs generated from within or outside of the cluster. In this paper, we address the full requirements of workload management in Femtoclouds. These functions enable a Femtocloud to provide a service to job initiators that is similar to that provided by a centralized cloud service. We develop a system architecture that relies on the cloud to efficiently control and manage a Femtocloud. Within this architecture, we develop adaptive workload management mechanisms and algorithms to manage resources and effectively mask churn. We implement a prototype of our Femtocloud system on Android devices and utilize it to evaluate the overall system performance. We use simulation to isolate and study the impact of our workload management mechanisms and test the system at scale. Our prototype and simulation results demonstrate the efficiency of the Femtocloud workload management mechanisms especially in situations with potentially high churn. For instance, our mechanisms can reduce the average job completion time by up to 26% compared to similar mechanisms used in traditional cloud computing systems when used in situations that suggest high churn.

[1]  Ishfaq Ahmad,et al.  Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors , 1996, IEEE Trans. Parallel Distributed Syst..

[2]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[3]  Khaled A. Harras,et al.  Towards Computational Offloading in Mobile Device Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[4]  Ivan Stojmenovic,et al.  Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[5]  Khaled A. Harras,et al.  Femto Clouds: Leveraging Mobile Devices to Provide Cloud Service at the Edge , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[6]  Xingming Sun,et al.  Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.

[7]  Rajkumar Buyya,et al.  A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments , 2017, Concurr. Comput. Pract. Exp..

[8]  Khaled A. Harras,et al.  Elastic Mobile Device Clouds , 2017 .

[9]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[10]  Byung-Gon Chun,et al.  CloneCloud: elastic execution between mobile device and cloud , 2011, EuroSys '11.

[11]  Carlo Curino,et al.  Apache Hadoop YARN: yet another resource negotiator , 2013, SoCC.

[12]  Khaled A. Harras,et al.  Cumulus: A distributed and flexible computing testbed for edge cloud computational offloading , 2016, 2016 Cloudification of the Internet of Things (CIoT).

[13]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[14]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[15]  Karim Habak,et al.  COSMOS: computation offloading as a service for mobile devices , 2014, MobiHoc '14.

[16]  Rajeev Gandhi,et al.  The Case for Mobile Edge-Clouds , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[17]  Xu Chen,et al.  COMET: Code Offload by Migrating Execution Transparently , 2012, OSDI.

[18]  John A. Sharp,et al.  Data flow computing: theory and practice , 1992 .

[19]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[20]  Khaled A. Harras,et al.  Vision: The Case for Symbiosis in the Internet of Things , 2015, MCS '15.

[21]  Vitaly Shmatikov,et al.  Rethinking Security of Web-Based System Applications , 2015, WWW.

[22]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[23]  Yung-Hsiang Lu,et al.  Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.

[24]  D Chitra Devi,et al.  Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks , 2016, TheScientificWorldJournal.

[25]  Salim Hariri,et al.  Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing , 2002, IEEE Trans. Parallel Distributed Syst..

[26]  Aakanksha Chowdhery,et al.  The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.

[27]  Takayuki Nishio,et al.  Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud , 2013, MobileCloud '13.

[28]  Ellen W. Zegura,et al.  Serendipity: enabling remote computing among intermittently connected mobile devices , 2012, MobiHoc '12.

[29]  Qingbo Wu,et al.  Workflow scheduling in cloud: a survey , 2015, The Journal of Supercomputing.

[30]  Mahadev Satyanarayanan,et al.  The case for cyber foraging , 2002, EW 10.

[31]  Mahadev Satyanarayanan,et al.  Just-in-time provisioning for cyber foraging , 2013, MobiSys '13.

[32]  Samuel Madden,et al.  Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..

[33]  Elaine Shi,et al.  TRUESET: Faster Verifiable Set Computations , 2014, USENIX Security Symposium.

[34]  Min Chen,et al.  On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.

[35]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[36]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.