Skip to main content

Advertisement

Log in

A Fault-Tolerant Approach to Alleviate Failures in Offloading Systems

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Computation offloading effectively expands the usability of mobile terminals beyond their physical limits, and also greatly extends their battery charging intervals. Offloading or cyber foraging is a technique by which large and complex computational jobs are relocated from lightweight portable devices (such as smartphones) called offloadee to powerful servers (such as nearby laptops/desktops or cloud server over the Internet) called surrogates, and getting the output back at the offloadee. Many research works have been done so far on the architecture of offloading systems, but only few works can be found on fault detection and tolerance. So this paper concentrates on categorizing different failures that may affect the benefit of offloading computation and proposes a fault-tolerance approach to alleviate those faults. The checkpoint based fault-tolerance approach proposed in this paper is able to handle crash, omission and transient failures altogether. Fault prevention is obtained by utilizing historical data for choosing worthy surrogate from known neighborhood. This fault tolerance model is evaluated by applying a real application named \(\pi\)calculator and Scimark benchmark suite. The system is implemented and the proposed approach is found to be effective with respect to energy consumption and resource utilization even in case of crash and omission failure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ou, S., Wu, Y., Yang, K., & Zhou, B. (2008). Performance analysis of fault-tolerant offloading systems for pervasive services in mobile wireless environments. In IEEE international conference on communications, 2008. ICC’08 (pp. 1856–1860).

  2. Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, 8(4), 10–17.

    Article  Google Scholar 

  3. Cuervo, E., Balasubramanian, A., Cho, D. K., Wolman, A., Saroiu, S., Chandra, R., & Bahl, P. (2010). MAUI: Making smartphones last longer with code offload. In Proceedings of the 8th international conference on mobile systems, applications, and services (pp. 49–62). ACM.

  4. Bhagat, N., & Bhushan, S. (2016). Energy efficient offloading for mobile cloud computing: A review. International Journal of Advanced Engineering Research and Applications., 2(2), 65–71.

    Google Scholar 

  5. Powell, M. L., & Miller, B. P. (1983). Process migration in demos/mp. Proceedings of the Ninth ACM Symposium on Operating Systems Principles SOSP ’83, 17(5), 110–119.

    Article  Google Scholar 

  6. Kumar, K., Liu, J., Lu, Y. H., & Bhargava, B. (2013). A survey of computation offloading for mobile systems. Mobile Networks and Applications, 18(1), 129–140.

    Article  Google Scholar 

  7. Kemp, R., Palmer, N., Kielmann, T., & Bal, H. (2012). Cuckoo: A computation offloading framework for smartphones. In M. Gris & G. Yang (Eds.), Mobile computing, applications, and services. MobiCASE 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Vol. 76). Springer.

  8. Park, S., Chen, Q., Han, H., & Yeom, H. Y. (2014). Design and evaluation of mobile offloading system for web-centric devices. Journal of Network and Computer Applications, 40, 105–115.

    Article  Google Scholar 

  9. Yang, K., Ou, S., & Chen, H. H. (2008). On effective offloading services for resource-constrained mobile devices running heavier mobile internet applications. IEEE Communications Magazine, 46(1), 56–63.

    Article  Google Scholar 

  10. Chen, X., Chen, S., Zeng, X., Zheng, X., Zhang, Y., & Rong, C. (2017). Framework for context-aware computation offloading in mobile cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. Hindawi, 6(1), 71:1–71:17.

    Google Scholar 

  11. Kwon, D., Yang, S., Paek, Y., & Ko, K. (2017). Optimization techniques to enable execution offloading for 3D video games. Journal of Multimedia Tools and Applications, 76(9), 11347–11360.

    Article  Google Scholar 

  12. Haghighi, V., & Moayedian, N. S. (2018). An offloading strategy in mobile cloud computing considering energy and delay constraints. Publihed in IEEE Access, 6, 11849–11861.

    Article  Google Scholar 

  13. Jin, X., Liu, Y., Fan, W., Wu, F., & Tang, B. (2017). Multisite computation offloading in dynamic mobile cloud environments. Journal of Science China Information Sciences, 60, 89301.

    Article  Google Scholar 

  14. Chen, G., Kang, B. T., Kandemir, M., Vijaykrishnan, N., Irwin, M. J., & Chandramouli, R. (2004). Studying energy tradeoffs in offloading computation/compilation in java-enabled mobile devices. IEEE Transactions on Parallel and Distributed Systems, 15(9), 795–809.

    Article  Google Scholar 

  15. Li, Z., Wang, C., & Xu, R. (2001). Computation offloading to save energy on handheld devices: A partition scheme. In Proceedings of the 2001 international conference on compilers, architecture, and synthesis for embedded systems (pp. 238–246). ACM.

  16. Goyal, M., & Saini,P. (2016). A fault-tolerant energy-efficient computational offloading approach with minimal energy and response time in mobile cloud computing. In: Proceedings of 4th international conference on parallel, distributed and grid computing.

  17. Xia, F., Ding, F., Li, J., Kong, X., Yang, L. T., & Ma, J. (2014). Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing. Journal of Information Systems Frontiers, 16(1), 95–111.

    Article  Google Scholar 

  18. Jun, Y., Lee, J., & Seo, E. (2017). Evaluation of remote-I/O support for a DSM-based computation offloading scheme. Journal of Computer Science and Technology, 32(5), 957–973.

    Article  Google Scholar 

  19. Wang, Q., & Wolter, K. (2014). Detection and analysis of performance deterioration in mobile offloading system. In 2014 IEEE international symposium on software reliability engineering workshops (ISSREW) (pp. 420–425). IEEE.

  20. Meng, T., Wang, Q., & Wolter, K. (2015). Model-based quantitative security analysis of mobile offloading systems under timing attacks. In M. Gribaudo, D. Manini & A. Remke (Eds.), Analytical and stochastic modelling techniques and applications. ASMTA 2015. Lecture Notes in Computer Science (Vol. 9081, pp. 143–157). Springer.

  21. Mondal, S., Chowdhury, C., Roy, S., Deb, S. K., & Neogy, S. (2016). Crash failure immune offloading framework. In IEEE international conference proceedings of advanced networks and telecommunications systems (ANTS) (pp. 1–6).

  22. Brumley, D., & Boneh, D. (2005). Remote timing attacks are practical. Computer Networks, 48(5), 701–716.

    Article  Google Scholar 

  23. Abd, S. K., Al Haddad, S. K. R., Abdullah, A. B. H. J., & Yussof, S. (2017). Energy-aware fault tolerant task offloading of mobile cloud computing. In Proceedings of 5th IEEE international conference on mobile cloud computing, services, and engineering (pp. 161–164).

  24. Kwon, Y., & Tilevich, E. (2012). Energy efficient and fault tolerant distributed mobile execution. In Proceedings of 32nd IEEE international conference on distributed computing systems (pp. 586–595).

  25. Gordon, M. S., Jamshidi, D. A., Mahlke, S., Mao, Z. M., & Chen, X. (2012). Comet: Code offload by migrating execution transparently. In 10th USENIX symposium on operating systems design and implementation (OSDI 12) (pp. 93–106).

  26. Huang, Y., Kintala, C., Kolettis, N., & Fulton, N. D. (1995). Software rejuvenation: Analysis, module and applications. In Twenty-fifth international symposium on fault-tolerant computing, 1995. FTCS-25. digest of papers (pp. 381–390).

  27. Cotroneo, D., Natella, R., Pietrantuono, R., & Russo, S. (2011). Software aging and rejuvenation: Where we are and where we are going. In 2011 IEEE third international workshop on software aging and rejuvenation (WoSAR) (pp. 1–6).

  28. Van Moorsel, A., & Wolter, K. (2006). Analysis of restart mechanisms in software systems. IEEE Transactions on Software Engineering, 32(8), 547–558.

    Article  Google Scholar 

  29. Ou, S., Yang, K., & Hu, L. (2007). Cross: A combined routing and surrogate selection algorithm forpervasive service offloading in mobile ad hoc environments. In Global telecommunications conference, 2007. GLOBECOM’07 (pp. 720–725). IEEE.

  30. Rebeiro, C., Mukhopadhyay, D., & Bhattacharya, S. (2015). An introduction to timing attacks. In Timing channels in cryptography (pp. 1–11). Springer.

  31. Liu, J., & Lu, Y. H. (2010). Energy savings in privacy-preserving computation offloading with protection by homomorphic encryption. In Proceedings of the 2010 international conference on power aware computing and systems, HotPower (Vol. 10, pp. 1–7).

  32. Liu, J., Kumar, K., & Lu, Y. H. (2010). Tradeoff between energy savings and privacy protection in computation offloading. In Proceedings of the 16th ACM/IEEE international symposium on low power electronics and design (pp. 213–218). ACM.

  33. Sheahan, R., Lipsky, L., Fiorini, P. M., & Asmussen, S. (2006). On the completion time distribution for tasks that must restart from the beginning if a failure occurs. ACM SIGMETRICS Performance Evaluation Review, 34(3), 24–26.

    Article  Google Scholar 

  34. http://ziyang.eecs.umich.edu/projects/powertutor/. Accessed 5 Oct 2018.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarbani Roy.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chowdhury, C., Roy, S., Ray, A. et al. A Fault-Tolerant Approach to Alleviate Failures in Offloading Systems. Wireless Pers Commun 110, 1033–1055 (2020). https://doi.org/10.1007/s11277-019-06772-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-019-06772-6

Keywords

Navigation