Computation Infrastructure: Data Offloading, Processing, and Privacy

  • Chapter
  • First Online:
Recent Advancements in ICT Infrastructure and Applications

Abstract

This chapter elaborates the computation infrastructure, namely, cloud, fog, and edge computing. Various kinds of data offloading mechanisms and a general multi-layer computing framework addressing security aspects are presented. Presently, the smart Internet of Things (IoT) devices offload the large data aggregation and processing as well as storage to different computing platforms such as edge, fog, and cloud. In this chapter, various computing paradigms including their benefits and limitations are discussed. This chapter also discusses about the total cost in terms of latency and energy required to complete a task on user devices as well as remotely (on edge or cloud). Further, various necessary security and privacy issues are discussed that needs to be considered for large deployment of computing infrastructure for real-time ICT applications such as healthcare application. Finally, the chapter provides challenges and future directions for research in these computing paradigms, including security and privacy issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 103.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
GBP 129.99
Price includes VAT (United Kingdom)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://miracl.com/.

  2. 2.

    https://www.tinkercad.com/dashboard.

  3. 3.

    https://thingspeak.com/.

  4. 4.

    https://aws.amazon.com/.

  5. 5.

    https://www.ercim.eu/publication/Ercim\(\_\)News/enw64/armando.html.

References

  1. Mell P, Grance T (2011) The nist definition of cloud computing (draft), nist spec. Publ 800:145

    Google Scholar 

  2. Shaw SB, Singh AK (2014) A survey on cloud computing. In: 2014 international conference on green computing communication and electrical engineering (ICGCCEE), pp 1–6

    Google Scholar 

  3. Wang X, Han Y, Leung VCM, Niyato D, Yan X, Chen X (2020) Convergence of edge computing and deep learning: a comprehensive survey. IEEE Commun Surv Tutor 22(2):869–904

    Article  Google Scholar 

  4. Luo Q, Hu S, Li C, Li G, Shi W (2021) Resource scheduling in edge computing: a survey. IEEE Commun Surv Tutor

    Google Scholar 

  5. Lin L, Liao X, ** H, Li P (2019) Computation offloading toward edge computing. Proc IEEE 107(8):1584–1607

    Article  Google Scholar 

  6. Du J, Zhao L, Feng J, Chu X (2017) Computation offloading and resource allocation in mixed fog/cloud computing systems with min-max fairness guarantee. IEEE Trans Commun 66(4):1594–1608

    Article  Google Scholar 

  7. Yang Z, Pan C, Wang K, Shikh-Bahaei M (2019) Energy efficient resource allocation in UAV-enabled mobile edge computing networks. IEEE Trans Wirel Commun 18(9):4576–4589

    Article  Google Scholar 

  8. Peng G, Wu H, Wu H, Wolter K (2021) Constrained multiobjective optimization for IoT-enabled computation offloading in collaborative edge and cloud computing. IEEE Internet of Things J 8(17):13723–13736

    Article  Google Scholar 

  9. Sample AP, Smith JR (2013) The wireless identification and sensing platform. In: Wirelessly powered sensor networks and computational RFID. Springer, pp 33–56

    Google Scholar 

  10. Moura J, Hutchison D (2018) Game theory for multi-access edge computing: survey, use cases, and future trends. IEEE Commun Surv Tutor 21(1):260–288

    Article  Google Scholar 

  11. Mamman M, Hanapi ZM, Abdullah A, Muhammed A (2019) Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink. PloS One 14(1):e0210310

    Article  Google Scholar 

  12. Lin W, Xu M, He J, Zhang W (2021) Privacy, security and resilience in mobile healthcare applications. Enterprise Inf Syst 1–15

    Google Scholar 

  13. Shabbir M, Shabbir A, Iwendi C, Javed AR, Rizwan M, Herencsar N, Lin JC-W (2021) Enhancing security of health information using modular encryption standard in mobile cloud computing. IEEE Access 9:8820–8834

    Article  Google Scholar 

  14. Satar SDM, Hussin M, Hanapi ZM, Mohamed MA (2021) Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme. Int J Adv Comput Sci Appl 12:393–399

    Google Scholar 

  15. Kara M, Laouid A, Yagoub MA, Euler R, Medileh S, Hammoudeh M, Eleyan A, Bounceur A (2021) A fully homomorphic encryption based on magic number fragmentation and el-gamal encryption: smart healthcare use case. Expert Syst e12767

    Google Scholar 

  16. Wang Q, Lai C, Lu R, Zheng D (2021) Searchable encryption with autonomous path delegation function and its application in healthcare cloud. IEEE Trans Cloud Comput

    Google Scholar 

  17. Nayak SK, Tripathy S (2021) SEMKC: secure and efficient computation over outsourced data encrypted under multiple keys. IEEE Trans Emerg Topics Comput 9(1):414–428

    Article  Google Scholar 

  18. Yang X, Yi X, Nepal S, Khalil I, Huang X, Shen J (2021) Efficient and anonymous authentication for healthcare service with cloud based WBANs. IEEE Trans Serv Comput

    Google Scholar 

  19. Nayak SK, Tripathy S (2016) Privacy preserving provable data possession for cloud based electronic health record system. In: 2016 IEEE Trustcom/BigDataSE/ISPA, IEEE, pp 860–867

    Google Scholar 

  20. Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things 15:100422

    Article  Google Scholar 

  21. Nayak SK, Mohanty S, Majhi B (2017) CLB-ECC: certificateless blind signature using ECC. J Inf Process Syst 13(4):970–986

    Google Scholar 

  22. Fang J, Shi J, Lu S, Zhang M, Ye Z (2021) An efficient computation offloading strategy with mobile edge computing for IoT. Micromachines 12(2):204

    Article  Google Scholar 

  23. Gu B, Zhou Z, Mumtaz S, Frascolla V, Bashir AK (2018) Context-aware task offloading for multi-access edge computing: matching with externalities. In: 2018 IEEE Global Communications Conference (GLOBECOM), IEEE, pp 1–6

    Google Scholar 

  24. Yang L, Zhang H, Li M, Guo J, Ji H (2018) Mobile edge computing empowered energy efficient task offloading in 5G. IEEE Trans Vehic Technol 67(7):6398–6409

    Article  Google Scholar 

  25. Liu B, Cao Y, Zhang Y, Jiang T (2020) A distributed framework for task offloading in edge computing networks of arbitrary topology. IEEE Trans Wirel Commun 19(4):2855–2867

    Article  Google Scholar 

  26. Chen W, Wang D, Li K (2018) Multi-user multi-task computation offloading in green mobile edge cloud computing. IEEE Trans Serv Comput 12(5):726–738

    Article  Google Scholar 

  27. Ning Z, Dong P, Kong X, **a F (2018) A cooperative partial computation offloading scheme for mobile edge computing enabled internet of things. IEEE Internet of Things J 6(3):4804–4814

    Article  Google Scholar 

  28. Shu C, Zhao Z, Han Y, Min G, Duan H (2019) Multi-user offloading for edge computing networks: a dependency-aware and latency-optimal approach. IEEE Internet of Things J 7(3):1678–1689

    Article  Google Scholar 

  29. Li L, Zhang X, Liu K, Jiang F, Peng J (2018) An energy-aware task offloading mechanism in multiuser mobile-edge cloud computing. Mob Inf Syst

    Google Scholar 

  30. Xu X, Liu Q, Luo Y, Peng K, Zhang X, Meng S, Qi L (2019) A computation offloading method over big data for IoT-enabled cloud-edge computing. Future Gener Comput Syst 95:522–533

    Article  Google Scholar 

  31. Yu S, Langar R, Fu X, Wang L, Han Z (2018) Computation offloading with data caching enhancement for mobile edge computing. IEEE Trans Vehic Technol 67(11):11098–11112

    Article  Google Scholar 

  32. Qian LP, Shi B, Wu Y, Sun B, Tsang DH (2019) Noma-enabled mobile edge computing for internet of things via joint communication and computation resource allocations. IEEE Internet of Things J 7(1):718–733

    Article  Google Scholar 

  33. Wang Y, Tao X, Hou YT, Zhang P (2019) Effective capacity-based resource allocation in mobile edge computing with two-stage tandem queues. IEEE Trans Commun 67(9):6221–6233

    Article  Google Scholar 

  34. Zhou Y, Yu FR, Chen J, Kuo Y (2017) Resource allocation for information-centric virtualized heterogeneous networks with in-network caching and mobile edge computing. IEEE Trans Vehic Technol 66(12):11339–11351

    Article  Google Scholar 

  35. Gupta H, Vahid Dastjerdi A, Ghosh SK, Buyya R (2017) iFogSim: a toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments. In: Software: practice and experience, vol 47, no 9, pp 1275–1296

    Google Scholar 

  36. Sonmez C, Ozgovde A, Ersoy C (2018) Edgecloudsim: an environment for performance evaluation of edge computing systems. Trans Emer Telecommun Technol 29(11):e3493

    Article  Google Scholar 

  37. Lopes MM, Higashino WA, Capretz MA, Bittencourt LF (2017) Myifogsim: a simulator for virtual machine migration in fog computing. In: Companion proceedings of the10th international conference on utility and cloud computing, pp 47–52

    Google Scholar 

  38. Lynn B (2006) PBC library manual 0.5. 11

    Google Scholar 

Download references

Acknowledgements

This work was supported by the SERB-DST, Government of India under Grant SRG/2020/000575.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yasasvitha Koganti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Koganti, Y., Yadav, R., Nayak, S.K., Chaturvedi, M. (2022). Computation Infrastructure: Data Offloading, Processing, and Privacy. In: Chaturvedi, M., Patel, P., Yadav, R. (eds) Recent Advancements in ICT Infrastructure and Applications. Studies in Infrastructure and Control. Springer, Singapore. https://doi.org/10.1007/978-981-19-2374-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-2374-6_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-2373-9

  • Online ISBN: 978-981-19-2374-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation