A Comprehensive Survey on Architecture for Big Data Processing in Mobile Edge Computing Environments

With the exponential growth of smartphones, the growth of mobile traffic has also increased dramatically. With this, there has been also increase in the data involved – which is big data. A large part of big data is most valuable when it is analyzed quickly as it is generated. There is a need for processing continuous data streams under very short delays. Recently, frameworks and architectures have been proposed for carrying out data stream processing at the edge of the network using constrained resources. This chapter aims to present a comprehensive survey of the framework, architecture, and applications areas in the area of mobile edge computing. It also discusses some of the challenges and related existing solutions as well. It also provides a survey of the state-of-the-art mobile edge computing research with the focus on deep learning as a technique used for reliable and secure deployment of MEC.

[1]  Fadi Al-Turjman,et al.  Confidential smart-sensing framework in the IoT era , 2018, The Journal of Supercomputing.

[2]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[3]  Imre G. Csizmadia,et al.  Big data reduction by fitting mathematical functions: A search for appropriate functions to fit Ramachandran surfaces , 2015 .

[4]  Christian Platzer,et al.  MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[5]  Jian Sun,et al.  Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).

[6]  Yonggang Wen,et al.  Cloud radio access network (C-RAN): a primer , 2015, IEEE Network.

[7]  Albert J. Höglund,et al.  Utilization of advanced analysis methods in UMTS networks , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).

[8]  Romit Roy Choudhury,et al.  Tapprints: your finger taps have fingerprints , 2012, MobiSys '12.

[9]  Jürgen Schmidhuber,et al.  LSTM: A Search Space Odyssey , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[10]  Mahmoud Al-Ayyoub,et al.  SDMEC: Software Defined System for Mobile Edge Computing , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[11]  Nitish Srivastava,et al.  Multimodal learning with deep Boltzmann machines , 2012, J. Mach. Learn. Res..

[12]  Vladimir Stantchev,et al.  Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare , 2015 .

[13]  Shaohan Hu,et al.  DeepSense: A Unified Deep Learning Framework for Time-Series Mobile Sensing Data Processing , 2016, WWW.

[14]  Marta Wlodarczyk-Sielicka,et al.  Self-organizing Artificial Neural Networks into Hydrographic Big Data Reduction Process , 2014, RSEISP.

[15]  K. Hatonen,et al.  Advanced analysis methods for 3G cellular networks , 2005, IEEE Transactions on Wireless Communications.

[16]  Joel Stein,et al.  Executive summary: heart disease and stroke statistics--2014 update: a report from the American Heart Association. , 2014, Circulation.

[17]  Songqing Chen,et al.  FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[18]  Diogo R. Ferreira,et al.  Preprocessing techniques for context recognition from accelerometer data , 2010, Personal and Ubiquitous Computing.

[19]  Mahesh K. Marina,et al.  Towards multimodal deep learning for activity recognition on mobile devices , 2016, UbiComp Adjunct.

[20]  Christian Bonnet,et al.  Fog Computing architecture to enable consumer centric Internet of Things services , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[21]  Wendy D. Fisher,et al.  Machine learning for the automatic detection of anomalous events , 2017 .

[22]  Paris A. Mastorocostas,et al.  An application of supervised and unsupervised learning approaches to telecommunications fraud detection , 2008, Knowl. Based Syst..

[23]  Chun-Kwan Park Performance for Radio Access Network in mobile backhaul network , 2012 .

[24]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[25]  Alex Graves,et al.  Generating Sequences With Recurrent Neural Networks , 2013, ArXiv.

[26]  Stefan Decker,et al.  Real time analysis of sensor data for the Internet of Things by means of clustering and event processing , 2015, 2015 IEEE International Conference on Communications (ICC).

[27]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[28]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[29]  Myung J. Lee,et al.  Adaptive Multi-Resource Allocation for Cloudlet-Based Mobile Cloud Computing System , 2016, IEEE Transactions on Mobile Computing.

[30]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[31]  Xin Zhang,et al.  End to End Learning for Self-Driving Cars , 2016, ArXiv.

[32]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[33]  Mugen Peng,et al.  Recent Advances in Fog Radio Access Networks: Performance Analysis and Radio Resource Allocation , 2016, IEEE Access.

[34]  Martin Pielot,et al.  Practical Processing of Mobile Sensor Data for Continual Deep Learning Predictions , 2017, EMDL '17.

[35]  Victor I. Chang,et al.  Distributed behavior model orchestration in cognitive internet of things solution , 2016, Enterp. Inf. Syst..

[36]  Mohammed A. Qadeer,et al.  4G as a Next Generation Wireless Network , 2009, 2009 International Conference on Future Computer and Communication.

[37]  Rajkumar Buyya,et al.  Fog Computing: Principles, Architectures, and Applications , 2016, ArXiv.

[38]  Konrad Rieck,et al.  DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.

[39]  Prem Prakash Jayaraman,et al.  RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments , 2017, J. Sens. Actuator Networks.

[40]  Mike Schuster,et al.  Speech Recognition for Mobile Devices at Google , 2010, PRICAI.

[41]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[42]  Carson Kai-Sang Leung,et al.  Reducing the Search Space for Big Data Mining for Interesting Patterns from Uncertain Data , 2014, 2014 IEEE International Congress on Big Data.

[43]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[44]  Polly Huang,et al.  BioScope: an extensible bandage system for facilitating data collection in nursing assessments , 2014, UbiComp.

[45]  Franco Callegati,et al.  Clouds of virtual machines in edge networks , 2013, IEEE Communications Magazine.

[46]  Antonio Iera,et al.  LTE for vehicular networking: a survey , 2013, IEEE Communications Magazine.

[47]  Kimmo Hätönen,et al.  A computer host-based user anomaly detection system using the self-organizing map , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.

[48]  Seungjoon Lee,et al.  Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.

[49]  Victor Chang,et al.  TEMPORARY REMOVAL: Adoption of cloud based Internet of Things in India: A multiple theory perspective , 2016 .

[50]  A. Khera,et al.  Forecasting the Future of Cardiovascular Disease in the United States: A Policy Statement From the American Heart Association , 2011, Circulation.

[51]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[52]  Wenzhong Li,et al.  Mechanisms and challenges on mobility-augmented service provisioning for mobile cloud computing , 2015, IEEE Communications Magazine.

[53]  Gianluca Dini,et al.  MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.

[54]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[55]  Nicholas D. Lane,et al.  From smart to deep: Robust activity recognition on smartwatches using deep learning , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[56]  Michael Q. Zhang,et al.  Evaluation and comparison of clustering algorithms in analyzing es cell gene expression data , 2002 .

[57]  J. H. Ward Hierarchical Grouping to Optimize an Objective Function , 1963 .

[58]  Victor I. Chang,et al.  Outlook on moving of computing services towards the data sources , 2016, Int. J. Inf. Manag..

[59]  Junhui You,et al.  Research of Wireless Network Fault Diagnosis Based on Bayesian Networks , 2009, 2009 Second International Symposium on Knowledge Acquisition and Modeling.

[60]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[61]  Kimmo Raivio,et al.  A SOM Based Approach for Visualization of GSM Network Performance Data , 2005, IEA/AIE.