163
Views
7
CrossRef citations to date
0
Altmetric
Articles

Computation Offloading for Smart Devices in Fog-Cloud Queuing System

ORCID Icon &

References

  • D. M. Mena, I. Papapanagiotou, and B. Yang, “Internet of things: survey on security,” Inf. Sec. J. Global Persp., Vol. 27, no. 3, pp. 162–182, Apr. 2018.
  • E. T. Tan, and Z. A. Halim, “Health care monitoring system and analytics based on internet of things framework,” IETE J. Res., Vol. 65, no. 5, pp. 653–660, Sep. 2019.
  • O. Said, and Y. Albagory, “Internet of things-based free learning system: performance evaluation and communication perspective,” IETE J. Res., Vol. 63, no. 1, pp. 31–44, Jan. 2017.
  • A. Banerjee, F. Sufyanf, M. S. Nayel, and S. Sagar. “Centralized framework for controlling heterogeneous appliances in a smart home environment,” in International Conference on Information and Computer Technologies (ICICT), DeKalb, IL, 2018, pp. 78–82.
  • A.-K. A. Abdalla, and A.-S. K. Pathan, “On protecting data storage in mobile cloud computing paradigm,” IETE Tech. Rev., Vol. 31, no. 1, pp. 82–91, Jan. 2014.
  • F.-H. Tseng, H.-H. Cho, K.-D. Chang, J.-C. Li, and T. K. Shih, “Application-oriented offloading in heterogeneous networks for mobile cloud computing,” Enterpr. Inf. Syst., Vol. 12, no. 4, pp. 398–413, Apr. 2018.
  • B. N. Silva, M. Khan, and K. Han, “Internet of things: a comprehensive review of enabling technologies, architecture, and challenges,” IETE Tech. Rev., Vol. 35, no. 2, pp. 205–220, Mar 2018.
  • W. Fang, X. Z. Wen, Y. Zheng, and M. Zhou, “A survey of big data security and privacy preserving,” IETE Tech. Rev., Vol. 34, no. 5, pp. 544–560, Sep. 2017.
  • H. Sun, H. Yu, G. Fan, and L. Chen, “Energy and time efficient task offloading and resource allocation on the generic iot-fog-cloud architecture,” Peer-to-Peer Netw. Appl., Vol. 13, no. 2, pp. 548–563, Mar. 2020.
  • J. Kharel, H. T. Reda, and S. Y. Shin, “Fog computing-based smart health monitoring system deploying lora wireless communication,” IETE Tech. Rev., Vol. 36, no. 1, pp. 69–82, Jan. 2019.
  • C.-M. Chen, Y. Huang, K.-H. Wang, S. Kumari, and M.-E. Wu, “A secure authenticated and key exchange scheme for fog computing,” Enterprise Information Systems, Vol. 0, no. 0, pp. 1–16, Jan. 2020.
  • R. Somula, and R. Sasikala. “A research review on energy consumption of different frameworks in mobile cloud computing,” in Innovations in computer science and engineering (ICICSE), Singapore, 2019, pp. 129–142.
  • Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,” IEEE Commun. Surveys Tutor., Vol. 19, no. 4, pp. 2322–2358, Aug. 2017.
  • Z. Ning, P. Dong, X. Kong, and F. Xia, “A cooperative partial computation offloading scheme for mobile edge computing enabled internet of things,” IEEE Internet Things J., Vol. 6, no. 3, pp. 4804–4814, Sep. 2019.
  • R. K. Balan, and J. Flinn, “Cyber foraging: Fifteen years later,” IEEE Pervas. Comput., Vol. 16, no. 3, pp. 24–30, Jul. 2017.
  • E. Meskar, T. D. Todd, D. Zhao, and G. Karakostas, “Energy aware offloading for competing users on a shared communication channel,” IEEE Trans. Mob. Comput., Vol. 16, no. 1, pp. 87–96, Jan. 2017.
  • H. Wu, “Multi-objective decision-making for mobile cloud offloading: a survey,” IEEE. Access., Vol. 6, pp. 3962–3976, Jan. 2018.
  • H. Flores, P. Hui, S. Tarkoma, Y. Li, S. Srirama, and R. Buyya, “Mobile code offloading: from concept to practice and beyond,” IEEE Commun. Mag., Vol. 53, pp. 80–88, March 2015.
  • F. Sufyan, and A. Banerjee, “Comparative analysis of network libraries for offloading efficiency in mobile cloud environment,” Int. J. Adv. Comp. Sci. Appl., Vol. 10, no. 2, pp. 574–584, Feb. 2019.
  • Y. Wang, X. Lin, and M. Pedram. “A nested two stage game-based optimization framework in mobile cloud computing system,” in IEEE Seventh International Symposium on Service-Oriented System Engineering (SOSE ‘13), Washington, 2013, pp. 494–502.
  • T. Zhao, S. Zhou, X. Guo, Y. Zhao, and Z. Niu. “A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing,” in 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, 2015, pp. 1–6.
  • Q. Wang, and B. Rengarajan. “Recouping opportunistic gain in dense base station layouts through energy-aware user cooperation,” in 2013 IEEE 14th international symposium on “a world of wireless, mobile and multimedia networks” (wowmom), Madrid, 2013, pp. 1–9.
  • J. Vilaplana, F. Solsona, I. Teixidó, J. Mateo, F. Abella, and J. Rius, “A queuing theory model for cloud computing,” J. Supercomput., Vol. 69, no. 1, pp. 492–507, Jul. 2014.
  • R. Maršanić, Z. Zenzerović, and E. Mrnjavac, “Application of the queuing theory in the planning of optimal number of servers (ramps) in closed parking systems,” Econ. Res. Ekonomska Istraživanja, Vol. 24, no. 2, pp. 26–43, Jan. 2011.
  • K.-K. Tse, “Some applications of the poisson process,” Appl. Math., Vol. 5, no. 19, pp. 3011–3017, Oct. 2014.
  • Z. Kuang, L. Li, J. Gao, L. Zhao, and A. Liu, “Partial offloading scheduling and power allocation for mobile edge computing systems,” IEEE Internet Things J., Vol. 6, no. 4, pp. 6774–6785, Aug. 2019.
  • L. Liu, Z. Chang, X. Guo, S. Mao, and T. Ristaniemi, “Multiobjective optimization for computation offloading in fog computing,” IEEE Internet Things J., Vol. 5, no. 1, pp. 283–294, Feb. 2018.
  • D. Gross. Fundamentals of queueing theory. Hoboken, New Jersey: John Wiley & Sons, 2008.
  • L. Liu, X. Guo, Z. Chang, and T. Ristaniemi, “Joint optimization of energy and delay for computation offloading in cloudlet-assisted mobile cloud computing,” Wirel. Netw., Vol. 25, no. 4, pp. 2027–2040, May 2019.
  • C. E. Shannon, “A mathematical theory of communication,” Bell Syst. Tech. J. Vol. 27, no. 3, pp. 379–423, Jul. 1948.
  • Z. Liu, T. Zhou, and H. Liao, “Energy-efficient association mechanism designed for uplink CDMA-based HCNS,” Int. J. Electron., Vol. 106, no. 7, pp. 1041–1059, May. 2019.
  • D. P. Bertsekas. Network optimization: continuous and discrete models. Belmont, Massachusetts: Athena Scientific, 1998.
  • I. A. Moschakis, and H. D. Karatza, “Towards scheduling for internet-of-things applications on clouds: A simulated annealing approach,” Concurr. Comput. Pract. Exper., Vol. 27, no. 8, pp. 1886–1899, Jun. 2015.
  • M. G. R. Alam, Y. K. Tun, and C. S. Hong. “Multi-agent and reinforcement learning based code offloading in mobile fog,” in 2016 International Conference on Information Networking (ICOIN), Kota Kinabalu, 2016, pp. 285–290.
  • L. Li, Q. Guan, L. Jin, and M. Guo, “Resource allocation and task offloading for heterogeneous real-time tasks with uncertain duration time in a fog queueing system,” IEEE Access., Vol. 7, pp. 9912–9925, Jan. 2019.
  • X.-Q. Pham, N. D. Man, N. D. T. Tri, N. Q. Thai, and E.-N. Huh, “A cost- and performance-effective approach for task scheduling based on collaboration between cloud and fog computing,” Int. J. Distrib. Sens. Netw., Vol. 13, no. 11, pp. 1–16, Nov. 2017.
  • N. Gunantara, “A review of multi-objective optimization: Methods and its applications,” Cogent Eng., Vol. 5, no. 1, pp. 1–16, Aug. 2018.
  • S. Koziel. Computational optimization, methods and algorithms. Berlin Heidelberg: Springer, 2016.
  • H. Robbins, and S. Monro, “A stochastic approximation method,” Ann. Math. Stat., Vol. 22, pp. 400–407, Sep. 1951.
  • L. Bottou. “Large-scale machine learning with stochastic gradient descent,” in Proceedings of compstat’2010, Paris, 2010, pp. 177–186.
  • J. Fliege, A. I. F. Vaz, and L. N. Vicente, “Complexity of gradient descent for multiobjective optimization,” Optim. Methods Softw., Vol. 34, no. 5, pp. 949–959, Sep. 2019.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.