skip to main content
research-article

Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things

Authors Info & Claims
Published:28 September 2023Publication History
Skip Abstract Section

Abstract

The Web of Things (WoT) is a concept that aims to create a network of intelligent devices capable of remote monitoring, service provisioning, and control. Virtual and Physical Internet of Things (IoT) gateways facilitate communication, processing, and storage among social nodes that form the social Web of Things (SWoT). Peripheral IoT services commonly use device data. However, due to the limited bandwidth and processing power of edge devices in the IoT, they must dynamically alter the quality of service provided to their connected clients to meet each user's needs while also meeting the service quality requirements of other devices that may access the same data. Consequently, deciding which transactions get access to which Internet of Things data is a scheduling problem.

Edge-cloud computing requires transaction management because several Internet of Things transactions may access shared data simultaneously. However, cloud transaction management methods cannot be employed in edge-cloud computing settings. Transaction management models must be consistent and consider ACIDity of transactions, especially consistency. This study compares three implementation strategies, Edge Host Strategy (EHS), Cloud Host Strategy (CHS), and Hybrid BHS (BHS), which execute all IoT transactions on the Edge host, the cloud, and both hosts, respectively. These transactions affect the Edge hosts as well. An IoTT framework is provided, viewing an Internet of Things transaction as a collection of fundamental and additional subtransactions that loosen atomicity. Execution strategy controls essential and additional subtransactions.

The integration of edge and cloud computing demonstrates that the execution approach significantly affects system performance. EHS and CHS can waste wireless bandwidth, while BHS outperforms CHS and EHS in many scenarios. These solutions enable edge transactions to complete without restarting due to outdated IoT data or other edge or cloud transactions. The properties of these approaches have been detailed, showing that they often outperform concurrent protocols and can improve edge-cloud computing.

REFERENCES

  1. [1] Abu-Elkheir M., Hayajneh M., and Ali N. A.. 2013. Data management for the Internet of Things: Design primitives and solution. Sensors 13, 11 (2013), 1558215612.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] NingLi H.Y., Shi F., and Yang L. T.. 2020. Heterogeneous edge computing open platforms and tools for Internet of Things. Future Generation Computer Systems 106 (2020), 6776.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Bittencourt L., Immich R., Sakellariou R., Fonseca N., Madeira E., Curado M., Villas L., DaSilva L., Lee C., and Rana O.. 2018. The Internet of Things, fog and cloud continuum: Integration and challenges. Internet of Things 3 (2018), 134155.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Hassan N., Gillani S., Ahmed E., Yaqoob I., and Imran M.. 2018. The role of edge computing in Internet of Things. IEEE Communications Magazine 56, 11 (2018), 110115.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Wang G. and Xu F.. 2020. Regional intelligent resource allocation in mobile edge computing based vehicular network. IEEE Access 8 (2020), 71737182.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Al-Qerem A., Alauthman M., Almomani A., and Gupta B. B.. 2020. IoT transaction processing through cooperative concurrency control on fog–cloud computing environment. Soft Computing 24 (2020), 56955711.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Cicconetti C., Conti M., and Passarella A.. 2020. Architecture and performance evaluation of distributed computation offloading in edge computing. Simulation Modelling Practice and Theory 101 (2020), 102007.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Abbas Q., Shafiq H., Ahmad I., and Tharanidharan S.. 2016. Concurrency control in distributed database system. IEEE (2016).Google ScholarGoogle Scholar
  9. [9] Al-Qerem A., Hamarsheh A., Al-Lahham Y. A., and Eleyat M.. 2018. Scheduling of concurrent transactions in broadcasting environment. KSII Transactions on Internet and Information Systems (TIIS) 12, 4 (2018), 16551673.Google ScholarGoogle Scholar
  10. [10] Baccarelli E., Naranjo P. G. V., Scarpiniti M., Shojafar M., and Abawajy J. H.. 2017. Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 5 (2017), 98829910.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Calheiros R. N., Ranjan R., Beloglazov A., De Rose C. A., and Buyya R.. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and Experience 41, 1 (2011), 2350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Chi H. R., Silva R., Santos D., Quevedo J., Corujo D., Abboud O., Radwan A., Hecker A., and Aguiar R. L.. 2023. Multi-criteria dynamic service migration for ultra-large-scale edge computing networks. IEEE Transactions on Industrial Informatics (2023).Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Liu B., Zhang Y., Zhang G., and Zheng P.. 2019. Edge-cloud orchestration driven industrial smart product-service systems solution design based on CPS and IIoT. Advanced Engineering Informatics 42 (2019), 100984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Porambage P., Okwuibe J., Liyanage M., Ylianttila M., and Taleb T.. 2018. Survey on multi-access edge computing for Internet of Things realization. IEEE Communications Surveys & Tutorials 20, 4 (2018), 29612991.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Aslanpour M. S., Gill S. S., and Toosi A. N.. 2020. Performance evaluation metrics for cloud, fog and edge computing: A review, taxonomy, benchmarks and standards for future research. Internet of Things 12 (2020), 100273.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Salaht F. A., Desprez F., and Lebre A.. 2020. An overview of service placement problem in fog and edge computing. ACM Computing Surveys (CSUR) 53, 3 (2020), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Kong L., Tan J., Huang J., Chen G., Wang S., Jin X., Zeng P., Khan M., and Das S. K.. 2022. Edge-computing-driven Internet of Things: A survey. ACM Computing Surveys 55, 8 (2022), 141.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Mekala M. S., Jolfaei A., Srivastava G., Zheng X., Anvari-Moghaddam A., and Viswanathan P.. 2020. Resource offload consolidation based on deep-reinforcement learning approach in cyber-physical systems. IEEE Transactions on Emerging Topics in Computational Intelligence 6, 2 (2020), 245254.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Nagarajan G., Simpson S., and Sasikala T.. 2022. An Application-Oriented Study of Security Threats and Countermeasures in Edge Computing–Assisted Internet of Things. Auerbach Publications, (2022).Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Yao H., Bai C., Xiong M., Zeng D., and Fu Z.. 2017. Heterogeneous cloudlet deployment and user-cloudlet association toward cost effective fog computing. Concurrency and Computation: Practice and Experience 29, 16 (2017), e3975.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Yousefpour A., Patil A., Ishigaki G., Kim I., Wang X., Cankaya H. C., Zhang Q., Xie W., and Jue J. P.. 2018. QoS-aware dynamic fog service provisioning. arXiv preprint arXiv:1802.00800 (2018).Google ScholarGoogle Scholar
  22. [22] Cao K., Hu S., Shi Y., Colombo A. W., Karnouskos S., and Li X.. 2021. A survey on edge and edge-cloud computing assisted cyber-physical systems. IEEE Transactions on Industrial Informatics 17, 11 (2021), 78067819.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Dastjerdi A. V., Gupta H., Calheiros R. N., Ghosh S. K., and Buyya R.. 2016. Fog computing: Principles, architectures, and applications. Elsevier, (2016).Google ScholarGoogle Scholar
  24. [24] Shi W., Cao J., Zhang Q., Li Y., and Xu L.. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637646.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Satyanarayanan M.. 2017. The emergence of edge computing. Computer 50, 1 (2017), 3039.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Botta A., de Donato W., Persico V., and Pescapé A.. 2016. Integration of cloud computing and Internet of Things: A survey. Future Generation Computer Systems 56 (2016), 684700.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Ashraf Z., Sohail A., Latif S., Hameed A., and Yousaf M.. 2023. Challenges and mitigation strategies for transition from IPv4 network to virtualized next-generation IPv6 network. Int. Arab J. Inform. Technol. 20, 1 (2023), 7891.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Mijuskovic A., Chiumento A., Bemthuis R., Aldea A., and Havinga P.. 2021. Resource management techniques for cloud/fog and edge computing: An evaluation framework and classification. Sensors 21, 5 (2021), 1832.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Transactional Services for Concurrent Mobile Agents over Edge/Cloud Computing-Assisted Social Internet of Things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of Data and Information Quality
      Journal of Data and Information Quality  Volume 15, Issue 3
      September 2023
      326 pages
      ISSN:1936-1955
      EISSN:1936-1963
      DOI:10.1145/3611329
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2023
      • Online AM: 15 June 2023
      • Accepted: 15 May 2023
      • Revised: 13 May 2023
      • Received: 15 December 2022
      Published in jdiq Volume 15, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)152
      • Downloads (Last 6 weeks)14

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text