Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading

Abstract The rapid growth of mobile applications requires enhanced computational resources in order to ensure better performance, security, and usability. In recent years, the proliferation of the Internet-of-Things (IoT) devices has caused a paradigm shift in computing and communication. IoT devices are making our physical environment and infrastructures smarter, bringing pervasive computing to the mainstream. Given numerous predictions that we will have billions of such devices deployed in the next five years, we have the opportunity to utilize such IoT devices in converting our physical environment into interactive, smart, and intelligent computing infrastructures. In this paper, we present Aura – a highly localized IoT based cloud computing model. Aura allows mobile clients to create ad hoc and flexible clouds using the IoT and other computing devices in the nearby physical environment. Aura provides localized computational capability from untapped computing resources using a task-offloading model for mobile devices. Computations done in Aura are highly flexible, giving clients full control to start, stop, migrate, and restart computations in localized IoT devices as the mobile users move between different physical locations. As an example application of Aura, we have ported a lightweight version of MapReduce to run on IoT devices powered by Contiki OS. The prototype application was utilized to conduct various experimental measurements to evaluate different performance metrics of the proposed system. The paper presents a detailed comparative analysis of Aura with traditional clouds and applications running natively on mobile phones to assert the benefits and feasibility of the model.

[1]  Alexis Olivereau,et al.  HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things , 2012, Third International Conference on Communications and Networking.

[2]  Ragib Hasan,et al.  HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).

[3]  Michael Luck,et al.  A Protocol for Recording Provenance in Service-Oriented Grids , 2004, OPODIS.

[4]  Roberto Baldoni,et al.  On-line failure prediction in safety-critical systems , 2015, Future Gener. Comput. Syst..

[5]  Jörg Henkel,et al.  Computation offloading and resource allocation for low-power IoT edge devices , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[6]  Tony Q. S. Quek,et al.  Offloading in Mobile Edge Computing: Task Allocation and Computational Frequency Scaling , 2017, IEEE Transactions on Communications.

[7]  Marisol García-Valls,et al.  Integration of Data Distribution Service and Raspberry Pi , 2017, GPC.

[8]  Long Bao Le,et al.  Computation offloading leveraging computing resources from edge cloud and mobile peers , 2017, 2017 IEEE International Conference on Communications (ICC).

[9]  Ragib Hasan,et al.  MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services , 2015, 2015 IEEE International Conference on Services Computing.

[10]  Mojtaba Alizadeh,et al.  Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[11]  Emiliano Miluzzo,et al.  Vision: mClouds - computing on clouds of mobile devices , 2012, MCS '12.

[12]  Kyung Sup Kwak,et al.  The IoT: Exciting Possibilities for Bettering Lives: Special application scenarios , 2016, IEEE Consumer Electronics Magazine.

[13]  Douglas Thain,et al.  Distributed computing in practice: the Condor experience , 2005, Concurr. Pract. Exp..

[14]  Guohong Cao,et al.  Energy-Efficient Computation Offloading in Cellular Networks , 2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP).

[15]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[16]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[17]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[18]  John L. Romkey,et al.  Nonstandard for transmission of IP datagrams over serial lines: SLIP , 1988, RFC.

[19]  Kyoungho An,et al.  A cloud middleware for assuring performance and high availability of soft real-time applications , 2014, J. Syst. Archit..

[20]  Ragib Hasan,et al.  Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).

[21]  Ragib Hasan,et al.  Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[22]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[23]  Anis Koubaa,et al.  RPL in a nutshell: A survey , 2012, Comput. Networks.

[24]  Rajkumar Buyya,et al.  Outsourcing Resource-Intensive Tasks from Mobile Apps to Clouds: Android and Aneka Integration , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[25]  Timothy Grance,et al.  Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .

[26]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[27]  Marten van Dijk,et al.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.

[28]  Majid Sarrafzadeh,et al.  Dynamic Computation Offloading for Low-Power Wearable Health Monitoring Systems , 2017, IEEE Transactions on Biomedical Engineering.

[29]  Óscar García-Morchón,et al.  Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.

[30]  Carsten Bormann Constrained Application Protocol (CoAP) over IEEE 802.15.4 Information Element for IETF , 2016 .

[31]  Feng Xia,et al.  Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.

[32]  Bharat K. Bhargava,et al.  A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.

[33]  Soe-Tsyr Yuan,et al.  A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom , 2007, International Conference on Computational Science.

[34]  Ragib Hasan,et al.  CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[35]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[36]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[37]  Vijay S. Pande,et al.  Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[38]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[39]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[40]  Alexis Olivereau,et al.  D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[41]  Ragib Hasan,et al.  Interaction provenance model for unified authentication factors in service oriented computing , 2014, CODASPY '14.

[42]  Eui-Nam Huh,et al.  Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.

[43]  Namhi Kang,et al.  Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).

[44]  Tommaso Cucinotta,et al.  Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..

[45]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[46]  Seng Wai Loke,et al.  Computing with Nearby Mobile Devices: A Work Sharing Algorithm for Mobile Edge-Clouds , 2019, IEEE Transactions on Cloud Computing.

[47]  Alagan Anpalagan,et al.  Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization , 2017, IEEE Network.

[48]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[49]  Ragib Hasan,et al.  Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing , 2015, 2015 IEEE International Conference on Services Computing.

[50]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[51]  Vinod Ganapathy,et al.  Privacy-aware identity management for client-side mashup applications , 2009, DIM '09.

[52]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[53]  Marisol Garcia Valls,et al.  iLAND: An Enhanced Middleware for Real-Time Reconfiguration of Service Oriented Distributed Real-Time Systems , 2013 .

[54]  Sanjay Ghemawat,et al.  MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.

[55]  Vijayaraghavan Soundararajan,et al.  Challenges in building scalable virtualized datacenter management , 2010, OPSR.

[56]  Thiemo Voigt,et al.  Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.

[57]  Klaus Wehrle,et al.  Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[58]  Kun-Lung Wu,et al.  Dynamic Load Balancing for Ordered Data-Parallel Regions in Distributed Streaming Systems , 2016, Middleware.

[59]  Mohamed Ayoub Messous,et al.  Computation offloading game for an UAV network in mobile edge computing , 2017, 2017 IEEE International Conference on Communications (ICC).

[60]  Wei Liu,et al.  Computation offloading strategy for multi user mobile data streaming applications , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[61]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[62]  Ragib Hasan,et al.  A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[63]  László Bokor,et al.  Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer , 2014, Int. J. Wirel. Networks Broadband Technol..

[64]  Doan B. Hoang,et al.  Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[65]  Hai Jin,et al.  Container-Based Cloud Platform for Mobile Computation Offloading , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[66]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[67]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[68]  Stefano Secci,et al.  Cloud-based computation offloading for mobile devices: State of the art, challenges and opportunities , 2013, 2013 Future Network & Mobile Summit.

[69]  Ke Zhang,et al.  Energy-Efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks , 2016, IEEE Access.

[70]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[71]  Athanasios V. Vasilakos,et al.  Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.