Energy-saved data transfer model for mobile devices in cloudlet computing environment

Author(s):  
Rubing Liang ◽  
Yangjing Zhong ◽  
Qiang Xia
Author(s):  
Xiaohan Tao ◽  
Jianmin Pang ◽  
Jinlong Xu ◽  
Yu Zhu

AbstractThe heterogeneous many-core architecture plays an important role in the fields of high-performance computing and scientific computing. It uses accelerator cores with on-chip memories to improve performance and reduce energy consumption. Scratchpad memory (SPM) is a kind of fast on-chip memory with lower energy consumption compared with a hardware cache. However, data transfer between SPM and off-chip memory can be managed only by a programmer or compiler. In this paper, we propose a compiler-directed multithreaded SPM data transfer model (MSDTM) to optimize the process of data transfer in a heterogeneous many-core architecture. We use compile-time analysis to classify data accesses, check dependences and determine the allocation of data transfer operations. We further present the data transfer performance model to derive the optimal granularity of data transfer and select the most profitable data transfer strategy. We implement the proposed MSDTM on the GCC complier and evaluate it on Sunway TaihuLight with selected test cases from benchmarks and scientific computing applications. The experimental result shows that the proposed MSDTM improves the application execution time by 5.49$$\times$$ × and achieves an energy saving of 5.16$$\times$$ × on average.


2019 ◽  
Vol 42 (2) ◽  
Author(s):  
Alan Toy ◽  
Gehan Gunasekara

The data transfer model and the accountability model, which are the dominant models for protecting the data privacy rights of citizens, have begun to present significant difficulties in regulating the online and increasingly transnational business environment. Global organisations take advantage of forum selection clauses and choice of law clauses and attention is diverted toward the data transfer model and the accountability model as a means of data privacy protection but it is impossible to have confidence that the data privacy rights of citizens are adequately protected given well known revelations regarding surveillance and the rise of technologies such as cloud computing. But forum selection and choice of law clauses no longer have the force they once seemed to have and this opens the possibility that extraterritorial jurisdiction may provide a supplementary conceptual basis for championing data privacy in the globalised context of the Internet. This article examines the current basis for extraterritorial application of data privacy laws and suggests a test for increasing their relevance.


2020 ◽  
Vol 77 ◽  
pp. 103174
Author(s):  
Zhangqin Huang ◽  
Shuo Zhang ◽  
Han Gao ◽  
Xiaobo Zhang ◽  
Shengqi Yang

Author(s):  
Michael Hölzl ◽  
Endalkachew Asnake ◽  
Rene Mayrhofer ◽  
Michael Roland

Purpose – The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever. Design/methodology/approach – A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications. Findings – To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time. Originality/value – By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.


Author(s):  
Hesham A. Ali ◽  
Tamer Ahmed Farrag

Due to the rapidly increasing of the mobile devices connected to the internet, a lot of researches are being conducted to maximize the benefit of such integration. The main objective of this paper is to enhance the performance of the scheduling mechanism of the mobile computing environment by distributing some of the responsibilities of the access point among the available attached mobile devices. To this aim we investigate a scheduling mechanism framework that comprises an algorithm provides the mobile device with the authority to evaluate itself as a resource. The proposed mechanism is based on the proposing of “self ranking algorithm (SRA)” which provides a lifetime opportunity to reach a proper solution. This mechanism depends on event-based programming approach to start its execution in a pervasive computing environment. Using such mechanism will simplify the scheduling process by grouping the mobile devices according to their self -ranking value and assign tasks to these groups. Moreover, it will maximize the benefit of the mobile devices incorporated with the already existing grid systems by using their computational power as a subordinate value to the overall power of the system. Furthermore, we evaluate the performance of the investigated algorithm extensively, to show how it overcomes the connection stability problem of the mobile devices. Experimental results emphasized that, the proposed SRA has a great impact in reducing the total error and link utilization compared with the traditional mechanism.


2015 ◽  
pp. 1456-1492
Author(s):  
Muhammad H. Aboelfotoh ◽  
Patrick Martin ◽  
Hossam Hassanein

Advances in Information and Communication Technology (ICT) have enabled the provisioning of more cost-efficient means of delivering healthcare services through electronic healthcare systems (e-health). However, these solutions have constrained the mobility of medical professionals as well as patients. Mobile devices have been sought as a potential solution to free medical professionals and patients from mobility constraints. This chapter discusses the literature proposed in multimedia data transfer and retrieval, utilizing mobile devices and a multitude of wireless access technologies. A background section presents the different software technologies utilized by the proposed work, as well as a literature review. Following that, the authors compare these proposed systems and discuss issues and controversies found in these proposed systems, as well as propose means to address some of these issues. They conclude with an overall conclusion and outline future directions in this field.


2019 ◽  
Vol 2019 ◽  
pp. 1-20 ◽  
Author(s):  
Binbin Huang ◽  
Yangyang Li ◽  
Zhongjin Li ◽  
Linxuan Pan ◽  
Shangguang Wang ◽  
...  

With the explosive growth of mobile applications, mobile devices need to be equipped with abundant resources to process massive and complex mobile applications. However, mobile devices are usually resource-constrained due to their physical size. Fortunately, mobile edge computing, which enables mobile devices to offload computation tasks to edge servers with abundant computing resources, can significantly meet the ever-increasing computation demands from mobile applications. Nevertheless, offloading tasks to the edge servers are liable to suffer from external security threats (e.g., snooping and alteration). Aiming at this problem, we propose a security and cost-aware computation offloading (SCACO) strategy for mobile users in mobile edge computing environment, the goal of which is to minimize the overall cost (including mobile device’s energy consumption, processing delay, and task loss probability) under the risk probability constraints. Specifically, we first formulate the computation offloading problem as a Markov decision process (MDP). Then, based on the popular deep reinforcement learning approach, deep Q-network (DQN), the optimal offloading policy for the proposed problem is derived. Finally, extensive experimental results demonstrate that SCACO can achieve the security and cost efficiency for the mobile user in the mobile edge computing environment.


Sign in / Sign up

Export Citation Format

Share Document