Limit search to available items
Book Cover
E-book
Author Flinn, Jason.

Title Cyber foraging : bridging mobile and cloud computing / Jason Flinn
Published Cham, Switzerland : Springer, ©2012
Online access available from:
Synthesis Digital Library    View Resource Record  

Copies

Description 1 online resource (ix, 93 pages) : illustrations
Series Synthesis lectures on mobile and pervasive computing, 1933-902X ; #10
Synthesis lectures on mobile and pervasive computing ; #10.
Contents 1. Introduction -- 1.1 The motivation for cyber foraging -- 1.2 Potential benefits from using remote infrastructure -- 1.3 Potential costs of using remote infrastructure -- 1.4 Discussion -- 1.5 Lecture overview
2. Partitioning -- 2.1 Partitioning goals -- 2.2 Choosing candidate partitions -- 2.3 Selecting a partition -- 2.4 Resource measurement and estimation -- 2.4.1 CPU -- 2.4.2 Network -- 2.4.3 Battery energy -- 2.4.4 File cache state -- 2.4.5 Memory -- 2.5 Dealing with errors during partitioning -- 2.6 Applications -- 2.7 Summary
3. Management -- 3.1 Surrogate location -- 3.1.1 Surrogates near mobile computers -- 3.1.2 Surrogates in the cloud -- 3.1.3 Surrogate location for current cyber foraging systems -- 3.2 Isolation of remote operations -- 3.2.1 Design goals -- 3.2.2 Process-level isolation -- 3.2.3 Hardware virtualization -- 3.2.4 Application virtualization -- 3.3 Managing state -- 3.3.1 Application-specific state -- 3.3.2 Obtaining and caching application-specific state -- 3.4 Mechanics -- 3.5 Summary
4. Security and privacy -- 4.1 Desired security and privacy properties -- 4.1.1 Properties for surrogate owners -- 4.1.2 Properties for mobile computer owners -- 4.2 Leveraging standard solutions -- 4.3 Trusted boot -- 4.3.1 Trusted boot for public kiosks -- 4.3.2 Application to cyber foraging and vulnerabilities -- 4.4 Verification via redundant execution -- 4.4.1 Verification in Slingshot -- 4.4.2 Enforcing determinism -- 4.5 Discussion
5. Data staging -- 5.1 Motivation -- 5.2 Data staging for prefetching data -- 5.2.1 Infostations -- 5.2.2 Data staging -- 5.2.3 Sulula -- 5.3 Predicting the future -- 5.3.1 Mobility prediction -- 5.3.2 Data access prediction -- 5.3.3 Bandwidth prediction -- 5.4 Data staging for data sent to the cloud -- 5.5 Summary
6. Challenges and opportunities -- 6.1 Trends that impact cyber foraging -- 6.2 Challenges -- 6.2.1 Finding the killer app -- 6.2.2 Defining the business case -- 6.2.3 Security and privacy -- 6.3 Opportunities for further research -- 6.3.1 Bringing benefit to more applications -- 6.3.2 Handling uncertainty and failure -- 6.3.3 Improving ease-of-management -- 6.4 Final thoughts
Bibliography -- Author's Biography
Summary This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as close as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co-located with wireless hotspots in coffee shops, airport lounges, and other public locations
Analysis cyber foraging
mobile code offload
dynamic partitioning of computation
data staging
Bibliography Includes bibliographical references (pages 83-91)
Notes Title from PDF title page (Morgan & Claypool, viewed Oct. 9, 2012)
Subject Mobile computing.
Cloud computing.
COMPUTERS -- Hardware -- Personal Computers -- Macintosh.
COMPUTERS -- Hardware -- Personal Computers -- PCs.
Cloud computing
Mobile computing
Form Electronic book
ISBN 9781608458509
1608458504
1608458490
9781608458493
9783031024818
3031024818