Intelligent Edge Computing for Cyber Physical Applications
()
About this ebook
Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems. The book presents a comprehensive review of recent literature and analysis of different techniques for building edge-based CPS. In addition, it describes how edge-based CPS can be built to seamlessly interact with physical machines for optimal performance, covering various aspects of edge computing architectures for dynamic resource provisioning, mobile edge computing, energy saving scenarios, and different security issues.
Sections feature practical use cases of edge-computing which will help readers understand the workings of edge-based systems in detail, taking into account the need to present intellectual challenges while appealing to a broad readership, including academic researchers, practicing engineers and managers, and graduate students.
- Introduces and provides reviews on cyber physical and edge computing systems, with different architectures and models needed to address sustainable solutions to social, environmental and economic applications
- Presents the different architectures of edge computing for building cyber physical systems with dynamic resource provisioning and security solutions
- Provides AI based perspectives to edge-based cyber physical systems with different algorithms and AI based security solutions
- Covers different case studies and applications in detail, with real-life examples and possible challenges that can be encountered
- Offers perspectives for the design, development and commissioning of intelligent edge-based cyber physical systems
Related to Intelligent Edge Computing for Cyber Physical Applications
Related ebooks
Blockchain Technology for Emerging Applications: A Comprehensive Approach Rating: 0 out of 5 stars0 ratingsBlockchain Technology Solutions for the Security of IoT-Based Healthcare Systems Rating: 0 out of 5 stars0 ratingsCloud Control Systems: Analysis, Design and Estimation Rating: 0 out of 5 stars0 ratings5G IoT and Edge Computing for Smart Healthcare Rating: 0 out of 5 stars0 ratingsSecurity and Privacy Issues in Internet of Medical Things Rating: 0 out of 5 stars0 ratingsInternet of Multimedia Things (IoMT): Techniques and Applications Rating: 0 out of 5 stars0 ratingsImplementation of Smart Healthcare Systems using AI, IoT, and Blockchain Rating: 0 out of 5 stars0 ratingsSemantic Models in IoT and eHealth Applications Rating: 0 out of 5 stars0 ratingsDiagnostic Biomedical Signal and Image Processing Applications With Deep Learning Methods Rating: 0 out of 5 stars0 ratingsCyberphysical Infrastructures in Power Systems: Architectures and Vulnerabilities Rating: 0 out of 5 stars0 ratingsBig Data Analytics for Cyber-Physical Systems: Machine Learning for the Internet of Things Rating: 0 out of 5 stars0 ratingsHandbook of Computational Intelligence in Biomedical Engineering and Healthcare Rating: 0 out of 5 stars0 ratingsHamiltonian Monte Carlo Methods in Machine Learning Rating: 0 out of 5 stars0 ratingsInteger Optimization and its Computation in Emergency Management Rating: 0 out of 5 stars0 ratingsState Space Systems With Time-Delays Analysis, Identification, and Applications Rating: 0 out of 5 stars0 ratingsIoT for Smart Operations in the Oil and Gas Industry: From Upstream to Downstream Rating: 0 out of 5 stars0 ratingsBuilding Lifecycle Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsAccelerating Strategic Changes for Digital Transformation in the Healthcare Industry Rating: 0 out of 5 stars0 ratingsReal-time business intelligence A Complete Guide Rating: 0 out of 5 stars0 ratingsFoundations of Data Intensive Applications: Large Scale Data Analytics under the Hood Rating: 0 out of 5 stars0 ratingsDigital Twins: How Engineers Can Adopt Them To Enhance Performances Rating: 0 out of 5 stars0 ratingsProgramming the Network with Perl Rating: 0 out of 5 stars0 ratingsBackup and Restore The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsNon-Destructive Testing and Condition Monitoring Techniques in Wind Energy Rating: 0 out of 5 stars0 ratingsSonar Code Quality Testing Essentials Rating: 0 out of 5 stars0 ratingsBusiness Models in Emerging Technologies: Data Science, AI, and Blockchain Rating: 0 out of 5 stars0 ratings
Intelligence (AI) & Semantics For You
2084: Artificial Intelligence and the Future of Humanity Rating: 4 out of 5 stars4/5101 Midjourney Prompt Secrets Rating: 3 out of 5 stars3/5Summary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsDark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Secrets of ChatGPT Prompt Engineering for Non-Developers Rating: 5 out of 5 stars5/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5ChatGPT For Fiction Writing: AI for Authors Rating: 5 out of 5 stars5/5ChatGPT For Dummies Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: A Guide for Thinking Humans Rating: 4 out of 5 stars4/5What Makes Us Human: An Artificial Intelligence Answers Life's Biggest Questions Rating: 5 out of 5 stars5/5Dancing with Qubits: How quantum computing works and how it can change the world Rating: 5 out of 5 stars5/5Chat-GPT Income Ideas: Pioneering Monetization Concepts Utilizing Conversational AI for Profitable Ventures Rating: 4 out of 5 stars4/5Impromptu: Amplifying Our Humanity Through AI Rating: 5 out of 5 stars5/5Our Final Invention: Artificial Intelligence and the End of the Human Era Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5A Quickstart Guide To Becoming A ChatGPT Millionaire: The ChatGPT Book For Beginners (Lazy Money Series®) Rating: 4 out of 5 stars4/5How To Become A Data Scientist With ChatGPT: A Beginner's Guide to ChatGPT-Assisted Programming Rating: 5 out of 5 stars5/5TensorFlow in 1 Day: Make your own Neural Network Rating: 4 out of 5 stars4/5
Related categories
Reviews for Intelligent Edge Computing for Cyber Physical Applications
0 ratings0 reviews
Book preview
Intelligent Edge Computing for Cyber Physical Applications - D. Jude Hemanth
Chapter 1
Introduction to different computing paradigms: cloud computing, fog computing, and edge computing
Swati Vijay Shinde¹, D. Jude Hemanth² and Mohamed Elhoseny³, ¹Pimpri Chinchwad College of Engineering, Pune, Maharashtra, India, ²Department of ECE, Karunya Institute of Technology, Chennai, Tamil Nadu, India, ³College of Computer Information Technology, American University in the Emirates, Dubai, UAE
Abstract
This chapter introduces the different computing paradigms: Cloud computing, fog computing, and edge computing, with emphasis on edge computing. Each of these paradigms is more suited to a particular application than the other, and each has its own features. The different computing paradigms are deployed depending upon the need of the application. Cloud computing systems have proved to be useful in almost all application areas, providing remote processing and storage of the end-user data and software in the bigger data centers. However, for smaller requests, accessing a remote data center has resulted in latency and bandwidth problems, which become particularly evident in IoT-based applications, where sensor readings are uploaded to the cloud, processed, and results are sent back to the end-users. To solve this problem, CISCO has introduced fog computing, wherein fog nodes filter the data to be sent to the cloud and process the rest of the data. A faster version of fog computing is edge computing, wherein edge devices do most of the computation, making the end-user experience faster and smoother. Although fog computing and edge computing are helpful in reducing the load of centralized clouds and giving a faster end-user experience, these systems involve many challenges and security concerns, which are discussed in this chapter.
Keywords
Cloud computing; fog computing; edge computing; security attacks; privacy preservation
1.1 Introduction
Data is the lifeblood of the modern age, providing significant business insight as well as real-time control over crucial business processes and activities. Businesses nowadays are flooded with data, and massive amounts of data may be routinely acquired from sensors and the Internet of Things (IoT) devices working in real time from remote locations and hostile operating environments practically from anywhere in the world. The IoT lets a device connect to the internet – a concept that has the potential to drastically alter our lives and workplaces. The IoT is predicted to grow faster than any other category of connected systems. The virtual data stream is also responsible for radically altering the way in which firms handle computing [1].
Fig. 1.1 shows the statistics about the number of IoT-connected devices worldwide in 2018, 2025, and 2030 according to the reports of Statista [2]. As per these statistics, at the end of the year 2018, there were 22 billion IoT-connected devices around the world, and by the year 2030, around 50 billion IoT devices are forecasted to be used, resulting in a massive web of interconnected devices spanning everything from smartphones to kitchen appliances.
Figure 1.1 Rising trend in IOT devices. (Source: https://www.mdpi.com/1424-8220/22/3/995)
Fully automated systems are being increasingly deployed in almost all locations to monitor and manage the associated infrastructural components, which has been possible with key technologies like the IoT and cloud computing. The cloud computing network is nothing but a set of high computing servers situated at a remote location made available for its users. IoT sensors record the different physical parameters and pass these to the cloud computing network. The cloud servers apply machine learning algorithms to the data and make powerful predictions based on which actions are taken. However, these IoT devices are constrained by limited energy as the cloud computing nodes are located far from the data source, for which delays and latencies are introduced in reporting to user queries. Much research has been carried out to overcome this limitation, with researchers proposing solutions such as edge computing and fog computing technologies. Both edge computing and fog computing make the lighter versions of cloud computing, which is easily accessible to the users with improved latencies and other features.
This chapter summarizes the computing paradigms with their architecture, advantages, drawbacks, security issues, etc. The main objective of this chapter is to set the context and provide background details that are necessary to understand the further chapters in the book.
The organization of the chapter is as follows: Section 1.2 summarizes the computing paradigms in brief and their comparison; Section 1.3 describes cloud computing in detail with the architecture, advantages, and drawbacks; Section 1.4 summarizes the fog computing paradigm with its pros and cons and security issues; Section 1.5 explains edge computing in detail with its background, necessity, architectures, advantages, drawbacks, and use cases; Section 1.6 highlights the challenges of edge computing implementation; and finally Section 1.7 concludes the chapter.
1.2 Computing paradigms: cloud, fog, and edge computing
Cloud computing provides the possibility to outsource the data processing and storage to a bigger and more powerful pool of servers with ease and per the requirement. This allows the users to have low resources on their devices. Cloud computing has been widely accepted in the industry for a variety of application needs as it facilitates the computing, storage, and network infrastructure capabilities getting extended with optimal cost savings.
Cloud computing enables businesses with a ubiquitous, convenient, and on-demand services platform. This has led to lesser investments by individuals and businesses, allowing them to focus on their goals rather than computing infrastructures.
Data is generated by IoT devices and saved in the cloud, which necessitates faster processing and responses. As a result, the closer the user is to the cloud, the faster the performance speed of the device [3]. Transmission delay increases as the distance between the cloud and the IoT device user grows. Because of the increased transmission delay, IoT device users may experience certain performance issues. Thus the traditional cloud computing architecture based on a centralized data center and the internet is not well suited for applications that require continuous transferring of the expanding stream of real-world data. Bandwidth constraints, latency concerns, and unpredictability in network interruptions can all work together to standoff such initiatives.
Fog computing, which refers to extending cloud computing to the network edge [4], was introduced by Cisco to address the performance issues in cloud computing. The architecture pushes intelligence down to the LAN level of network design, where it processes data in the IoT gateway or fog node. Simply put, it entails bringing the computers closer to the sensors they are communicating with [5]. However, the design of fog computing depends on multiple links in a communication chain in transporting data from our physical world assets into the digital world of information technology. Each of these links may be a potential point of failure [6,7].
The issues in fog computing have expanded the scope of edge computing that demands data processing at the network edge. Edge computing has been growing fast since 2014 with many applications and the potential to minimize latency and bandwidth charges, addressing the limitation of the computing capability of the cloud data center, boosting availability, and safeguarding data privacy and security [8].
Fig. 1.1 [9] depicts the pyramid structure of these paradigms in terms of the number of devices engaged at each level. It is clearly seen from this figure that billions of edge devices are interacting with millions of fog devices, which in turn are communicating with thousands of cloud data centers. The computational capacity of cloud computing is the highest, and that of edge computing is the lowest (Fig. 1.2).
Figure 1.2 Recent computing paradigms. (Source: https://www.mdpi.com/2673-4001/2/4/28)
Table 1.1 provides a comparison among the three computing paradigms.
Table 1.1
1.3 Cloud computing
According to the definition provided by the National Institute of Standards and Technology (NIST), cloud computing is a model that supports on-demand access for sharing the storage and computing infrastructure [10]. Cloud data centers are constructed with a larger collection of virtualized resources that are highly accessible and reconfigurable to the increasing workloads and support the pay-as-per-use cost model [11], making it a more convenient and preferable choice among the users. Google, Microsoft, and Amazon cloud service providers are the major giants in this domain and provide powerful cloud infrastructure for user services.
1.3.1 Architecture
The cloud architecture is as shown in Fig. 1.3, with the front end referring to client management, which acts as the graphical user interface (GUI), and the back end referring to application, service, management, runtime cloud, storage, infrastructure, and security. Each layer in the backend architecture is essential for completing the action over the cloud. The internet is the bridge to establish the connection between the front end and the back end.
• Application: It acts as the platform for the user to get services that are provided by the cloud
• Services: The cloud services are managed according to the client’s requirements, which are-
• Software as a Service (SaaS): It is a platform-independent service in which the user can go to the desired application per the requirement, for example, the Google storage system.
• Platform as a Service (PaaS): It is a platform-dependent system that provides the platform for making an application for the client, for example, OpenShift
• Infrastructure as a Service (IaaS): This is responsible for managing application data, middleware, runtime, for example, AWS
• Management: It coordinates among all the layers in the backend for communication.
• Run-time cloud: It provides the virtual environment for execution and computing.
• Storage: It provides storage infrastructure for customers.
• Infrastructure: It refers to both the software and hardware components of the cloud, including the devices for network connection and software for virtualization.
• Security: It provides confidentiality to clients’ data to prevent attacks.
Figure 1.3 The architecture of cloud computing. (Source: https://www.mdpi.com/2079-9292/10/15/1811)
1.3.2 Advantages of cloud computing
• Storage cost: Cloud computing allows clients to spend less on storage as they no longer need storage disks as the cloud provides massive storage space.
• Increased computing power: Access to cloud computing offers access to the enormous computing power of the data center since the clients are no longer limited by the capacity of the desktop computer.
• Collaboration: Cloud computing allows clients located in different locations to conveniently and securely collaborate with each other. These collaborations can be internal across departments and also externally with clients.
• Reduced software costs: Clients do not need to purchase the software as cloud computing provides access to software per the requirements. Also, cloud computing updates the software automatically, and users do not have to worry about the software.
• Scalability: Clouds are easily scalable, so clients can add and remove resources per their needs.
• Reliability and recovery: As the cloud maintains a lot of redundant resources, failures can be effectively handled. Also, it provides the most efficient recovery plan after failures.
1.3.3 Drawbacks of cloud computing
In spite of the advantages of cloud computing, it has the following drawbacks:
• Increased delays in data uploading: Cloud computing requires the data to be fetched before any data processing has started, causing delays, especially in real-time applications where data uploading takes time, due to which responses are delayed.
• Latency in user network access: If the interfaces between the user and the IoT network are hosted on the cloud, then some additional time is needed to direct the user data to the IoT network causing latencies.
• Limited customizations: As the applications and services hosted on the cloud are defined by the service level agreements (SLAs) between the service providers and customers, limited customizations are possible.
• Dependency on internet: Cloud computing requires a good internet connection, without which it is not possible for the cloud to operate and communicate with the end-user.
• Security concerns: In cloud computing, the confidential data of the customer is hosted on the remote cloud provided by the service providers. As such, there are chances that malicious cloud providers misuse the data. Also, the security of the data can be compromised by the attacker during the communication between the user and the cloud network.
• Technical support and issues: Cloud service providers are required to give 24×7 technical support for customer queries. Many service providers are making customers rely on FAQs and online help. Also, the cloud network may experience outages or other technical issues, which need to be monitored continuously and solved immediately.
1.4 Fog computing
Cloud computing has facilitated the on-demand delivery of IT resources like storage, computing power, hardware, etc. In spite of these advantages, latency is a major problem with cloud computing. All IoT devices send data to the cloud for further processing and storage [12]. The IoT environments are constrained with respect to bandwidth, processing, memory, energy, etc., as a lot of data is sent to the cloud, and a lot of energy is invested into it [13]. So, the idea of fog computing comes into the picture, which extends the cloud nearer to the IoT devices [14].
As per the statistics, 40% of the world’s data comes from sensors alone, and 90% of the world’s data are generated only during the period of the last 2 years. There are almost 250 million connected vehicles worldwide and 30 billion IoT devices [15].
The ability of the current cloud model is insufficient to handle the requirement of the IoT because of the volume of data, latency, and bandwidth. Volume refers to the huge amount of data produced by different end-user applications; latency refers to the time taken by a packet for a round trip that causes the delay, which is not acceptable for time-sensitive applications; and bandwidth refers to the bit rate during transmission wherein if all the data generated by IoT devices are sent to the cloud for storage and processing then traffic will be so heavy that it will consume almost all bandwidth