Probabilistic Data Allocation in Pervasive Computing Applications

被引:0
|
作者
Kolomvatsos, Kostas [1 ]
机构
[1] Univ Thessaly, Dept Informat & Telecommun, Papasiopoulou 2-4, Lamia 35131, Greece
关键词
Pervasive Computing; Internet of Things; Edge Computing; Data Storage; Accuracy; Probabilistic Model;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00152
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive Computing (PC) deals with the placement of services and applications around end users for facilitating their everyday activities. Current advances on the Internet of Things (IoT) and the Edge Computing (EC) provide the room for adopting their infrastructures and hosting the desired services for supporting PC applications. Numerous devices present in IoT and EC infrastructures give the opportunity to record and process data through the interaction with users and their environment. Upon these data, the appropriate processing should be realized as requested by end users or applications. It is efficient to process such requests as close as possible to end users to limit the latency in the provision of responses. The research community, identifying this need, proposes the use of the EC as the appropriate place to perform the discussed processing which has the form of tasks or queries. Tasks/queries set specific conditions for data they desire imposing a number of requirements for the dataset upon which the desired processing should be executed. It is wise to pre-process the data and detect their statistics to know beforehand if it is profitable to have any dataset as part of the requested processing. This paper focuses on a model that is responsible to efficiently distribute the collected data to the appropriate datasets. We store similar data to the same datasets and keep their statistics solid (i.e., we meet a low deviation) through the use of a probabilistic approach. The second part of the proposed approach is related to an aggregation scheme upon multiple outlier detection methods. We decide to transfer outliers to Cloud avoiding to store them locally as they will jeopardize the solidity of datasets. If data are going to be locally stored, we provide a mechanism for selecting the most appropriate dataset to host them while we perform a controlled replication to support a fault tolerant system. The performance of the proposed models is evaluated by a high number of experiments for different scenarios.
引用
收藏
页码:1006 / 1013
页数:8
相关论文
共 50 条
  • [21] Dynamic software allocation algorithm for saving power in pervasive computing
    Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    Journal of Southeast University (English Edition), 2007, 23 (02) : 216 - 220
  • [22] Computing in the Continuum: Combining Pervasive Devices and Services to Support Data-driven Applications
    AbdelBaky, Moustafa
    Zou, Mengsong
    Zamani, Ali Reza
    Renart, Eduard
    Diaz-Montes, Javier
    Parashar, Manish
    2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, : 1815 - 1824
  • [23] Resource Allocation and Consensus of Blockchains in Pervasive Edge Computing Environments
    Huang, Yaodong
    Zhang, Jiarui
    Duan, Jun
    Xiao, Bin
    Ye, Fan
    Yang, Yuanyuan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3298 - 3311
  • [24] Safeguarding personal data using trusted computing in pervasive computing
    Hohl, A
    Zugenmaier, A
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155
  • [25] A Method for Web Data Collection for Pervasive Computing
    Wang, Lihong
    Li, Qingzhong
    Deng, Li
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 555 - 560
  • [26] Pervasive Neuroimaging with Fog Computing and Linked Data
    Zao, John K.
    Gan, Tchin-Tze
    You, Chun-Kai
    Mendez, Sergio Jose Rodriguez
    You, Chieh
    Chung, Cheng-En
    Wang, Yu-Te
    Mullen, Tim
    Kothe, Christian
    Hsiao, Ching-Teng
    Jung, Tzyy-Ping
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 719 - 722
  • [27] Market mechanisms for resource allocation in pervasive sensor applications
    Geyik, Sahin Cem
    Shah, S. Yousaf
    Szymanski, Boleslaw K.
    Das, Sanmay
    Zerfos, Petros
    PERVASIVE AND MOBILE COMPUTING, 2012, 8 (03) : 346 - 357
  • [28] Plugin-orb for applications in a pervasive computing environment
    d'Acierno, A
    De Pietro, G
    Coronato, A
    Gugliara, G
    PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 140 - 146
  • [29] Programming Pervasive and Mobile Computing Applications: The TOTA Approach
    Mamei, Marco
    Zambonelli, Franco
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2009, 18 (04) : 1 - 56
  • [30] Field-Based Coordination for Pervasive Computing Applications
    Mamei, Marco
    Zambonelli, Franco
    BIO-INSPIRED COMPUTING AND COMMUNICATION, 2008, 5151 : 376 - 386