Deep Learning for Edge Computing Applications: A Comprehensive Survey

Authors

  • Mohamed Buhary Fathima Sanjeetha Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  • Yasanthy Kanagaraj Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  • Vihangi Herath Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  • Shashika Lokuliyana Faculty of Graduate Studies and Research, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

DOI:

https://doi.org/10.51983/ajcst-2022.11.2.3456

Keywords:

Security, IoT, Federated Learning, Edge Server, Edge Computing

Abstract

Edge computing is a modern computer architecture that processes data quickly and efficiently close to its point of origin, hence avoiding slowdowns caused by network latency and capacity limitations. By moving processing power to the network’s perimeter, edge computing decreases the load on central data centers and reduces the time it takes for users to submit data. Therefore, access latency may become a barrier, potentially negating the benefits of edge computing, particularly for applications that need a great deal of data.. Edge computing has some challenges, such as security, incomplete data, investment costs, and maintenance costs. In this research, we undertake a thorough analysis of edge computing, how edge device placement improves performance in IoT networks, compare various edge computing implementations, and explain various difficulties encountered during edge computing implementation. This study aims to promote creative edge-based Internet of Things security design by thoroughly examining existing Internet of Things security solutions at the edge layer and facilitate the dynamic deployment of edge devices.

References

N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile Edge Computing: A Survey," IEEE Internet of Things Journal, vol. 5, no. 1, pp. 450-465, 2018. DOI: 10.1109/JIOT.2017.2750180

Q. Luo, S. Hu, C. Li, G. Li, and W. Shi, "Resource Scheduling in Edge Computing: A Survey," IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2131-2165, 2021. DOI: 10.1109/COMST.2021.3106401

M. Satyanarayanan, "The Emergence of Edge Computing," Computer, vol. 50, no. 1, pp. 30-39, 2017. DOI: 10.1109/MC.2017.9

E. Ahmed et al., "Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?" IEEE Communications Magazine, vol. 55, no. 11, pp. 138-144, 2017. DOI: 10.1109/MCOM.2017.1700120

W. Khan, E. Ahmed, S. Hakak, I. Yaqoob, and A. Ahmed, "Edge computing: A survey," Future Generation Computer Systems, vol. 97, pp. 219-235, 2019.

D. Kimovski, N. Mehran, C. E. Kerth, and R. Prodan, "Mobility-Aware IoT Application Placement in the Cloud - Edge Continuum," IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3358-3371, 2022. DOI: 10.1109/TSC.2021.3094322

M. Nikravan and M. H. Kashani, "A review on trust management in fog/edge computing: Techniques, trends, and challenges," Journal of Network and Computer Applications.

E. Gyamfi and A. Jurcut, "Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets," Sensors, vol. 22, no. 10, p. 3744, 2022. DOI: 10.3390/s22103744

S. J. Stolfo, M. B. Salem, and A. D. Keromytis, "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud," in 2012 IEEE Symposium on Security and Privacy Workshops, 2012. DOI: 10.1109/SPW.2012.19

G. Kurikala, K. Gupta, and A. Swapna, "Fog computing: Implementation of security and privacy to comprehensive approach for avoiding knowledge thieving attack exploitation decoy technology," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 2, no. 4, pp. 176-181, 2017.

V. Mandlekar, V. Mahale, S. Sancheti, and M. Rais, "Survey on fog computing mitigating data theft attacks in cloud," International Journal of Innovative Research in Computer Science and Technology, vol. 2, no. 6, pp. 13-16, 2014.

A. Filali et al., "Multi-Access Edge Computing: A Survey," IEEE Access, vol. 8, pp. 197017-197046, 2020. DOI: 10.1109/ACCESS.2020.3034136

P. Ranaweera, A. D. Jurcut, and M. Liyanage, "Survey on Multi-Access Edge Computing Security and Privacy," IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1078-1124, 2021. DOI: 10.1109/COMST.2021.3062546

E. Ollora Zaballa, D. Franco, M. Aguado, and M. S. Berger, "Next-generation SDN and fog computing: a new paradigm for SDN-based edge computing," in 2nd Workshop on Fog Computing and the IoT (Fog-IoT 2020).

A. Yousefpour et al., "All one needs to know about fog computing and related edge computing paradigms: A complete survey," Journal of Systems Architecture, vol. 98, pp. 289-330, 2019. DOI: 10.1016/j.sysarc.2019.06.002

P. Verma et al., "FETCH: A Deep Learning-Based Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis," IEEE Access, vol. 10, pp. 12548-12563, 2022. DOI: 10.1109/ACCESS.2022.3143793

Q. Qi and F. Tao, "A Smart Manufacturing Service System Based on Edge Computing, Fog Computing, and Cloud Computing," IEEE Access, vol. 7, pp. 86769-86777, 2019. DOI: 10.1109/ACCESS.2019.2923610

A. Jain and P. Singhal, "Fog computing: Driving force behind the emergence of edge computing," in 2016 International Conference System Modeling & Advancement in Research Trends (SMART), 2016. DOI: 10.1109/SYSMART.2016.7894538

Y. Ai, M. Peng, and K. Zhang, "Edge computing technologies for Internet of Things: a primer," Digital Communications and Networks, vol. 4, no. 2, pp. 77-86, 2018.

A. M. Alwakeel, "An Overview of Fog Computing and Edge Computing Security and Privacy Issues," Sensors, vol. 21, no. 24, p. 8226, 2021. DOI: 10.3390/s21248226.

Y. Zhao et al., "Edge Computing and Networking: A Survey on Infrastructures and Applications," IEEE Access, vol. 7, pp. 101213-101230, 2019. DOI: 10.1109/ACCESS.2019.2927538.

S. J. Bigelow, "What is edge computing? Everything you need to know."

G. Cui et al., "Efficient Verification of Edge Data Integrity in Edge Computing Environment," IEEE Transactions on Services Computing, vol. 15, no. 6, pp. 3233-3244, 2022. DOI: 10.1109/TSC.2021.3090173.

J. Ren et al., "A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet," ACM Computing Surveys (CSUR), vol. 52, no. 6, pp. 1-36, 2019. DOI: 10.1145/3351652.

S. Yang et al., "Cloudlet Placement and Task Allocation in Mobile Edge Computing," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5853-5863, 2019. DOI: 10.1109/JIOT.2019.2907605.

A. T. Atieh, "The Next Generation Cloud technologies: A Review On Distributed Cloud, Fog And Edge Computing and Their Opportunities and Challenges," RRST, vol. 1, no. 1, pp. 1-15, 2021.

M. Liyanage, P. Porambage, A. Y. Ding, and A. Kalla, "Driving forces for multi-access edge computing (MEC) IoT integration in 5G," ICT Express, vol. 7, no. 2, pp. 127-137, 2021.

W. Xu et al., "Edge Learning for B5G Networks with Distributed Signal Processing: Semantic Communication, Edge Computing, and Wireless Sensing," arXiv preprint arXiv:2206.00422, 2022.

Y. Dai and Y. Zhang, "Adaptive Digital Twin for Vehicular Edge Computing and Networks," Journal of Communications and Information Networks, vol. 7, no. 1, pp. 48-59, 2022. DOI: 10.23919/JCIN.2022.9745481.

H. G. Abreha, M. Hayajneh, and M. A. Serhani, "Federated Learning in Edge Computing: A Systematic Survey," Sensors, vol. 22, no. 2, p. 450, 2022. DOI: 10.3390/s22020450.

L. Liu et al., "Design and implementation of intelligent monitoring terminal for distribution room based on edge computing," Energy Reports, vol. 7, no. 1, pp. 1131-1138, 2021.

S. Lee et al., "Turbulent boundary layer trailing-edge noise: Theory, computation, experiment, and application," Progress in Aerospace Sciences, vol. 126, no. 1.

Y. Kalyani and R. Collier, "A Systematic Survey on the Role of Cloud, Fog, and Edge Computing Combination in Smart Agriculture," Sensors, vol. 21, no. 17, p. 5922, 2021. DOI: 10.3390/s211755922.

R. Anusuya, D. K. Renuka, and L. A. Kumar, "Review on Challenges of Secure Data Analytics in Edge Computing," in 2021 International Conference on Computer Communication and Informatics (ICCCI), 2021. DOI: 10.1109/ICCCI50826.2021.9402559.

D. Mishra et al., "A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party," Journal of Information Security and Applications, vol. 55, no. 1.

Z. Zhang et al., "Cloud Computing Placement Optimization Under Ubiquitous Power Internet of Things Background," in 2019 IEEE International Conference on Smart Cloud (SmartCloud), 2019. DOI: 10.1109/SmartCloud.2019.00012.

Y. Liang and T. Li, "Ubiquitous Power Internet of Things-Oriented Low-Latency Edge Task Scheduling Optimization Strategy," Frontiers in Energy Research, vol. 10, no. 10, pp. 72-98, 2022. DOI: 10.3389/fenrg.2022.974702.

L. Cao, Z. Wang, and Y. Yue, "Analysis and prospect of the application of wireless sensor networks in ubiquitous power internet of things," Computational Intelligence and Neuroscience.

A. Singh et al., "Ai-based mobile edge computing for IOT: Applications, challenges, and future scope," Arabian Journal for Science and Engineering, vol. 3, no. 1, pp. 1-31, 2022. DOI: 10.1007/s13369-022-06538-y.

J. Li et al., "Service Home Identification of Multiple-Source IoT Applications in Edge Computing," IEEE Transactions on Services Computing. DOI: 10.1109/TSC.2022.3176576.

P. Porambage et al., "Survey on Multi-Access Edge Computing for Internet of Things Realization," IEEE Communications Surveys & Tutorials, vol. 20, no. 4, pp. 2961-2991, 2018. DOI: 10.1109/COMST.2018.2849509.

Z. Li et al., "Toward open manufacturing: A cross-enterprises knowledge and services exchange framework based on blockchain and edge computing," Industrial Management & Data Systems.

L. H. Phuc, L. A. Phan, and T. Kim, "Traffic-Aware Horizontal Pod Autoscaler in Kubernetes-Based Edge Computing Infrastructure," IEEE Access, vol. 10, pp. 18966-18977, 2022. DOI: 10.1109/ACCESS.2022.3150867.

K. Sha, T. A. Yang, W. Wei, and S. Davari, "A survey of edge computing-based designs for IoT security," Digital Communications and Networks, vol. 6, no. 2, pp. 195-202, 2020.

M. Goudarzi et al., "An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments," IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1298-1311, 2021. DOI: 10.1109/TMC.2020.2967041.

K. Cao, Y. Liu, G. Meng, and Q. Sun, "An Overview on Edge Computing Research," IEEE Access, vol. 8, pp. 85714-85728, 2020. DOI: 10.1109/ACCESS.2020.2991734.

S. Mondal, G. Das, and E. Wong, "Cost-optimal cloudlet placement frameworks over fiber-wireless access networks for low-latency applications," Journal of Network and Computer Applications, vol. 138, no. 1, pp. 27-38, 2022. DOI: 10.1016/j.jnca.2022.03.058.

Li, C., Wang, Y., Tang, H., Zhang, Y., Xin, Y., & Luo, Y. (2019). "Flexible replica placement for enhancing the availability in edge computing environment." Computer Communications, 146(1), 1-4. DOI: 10.1016/j.comcom.2019.08.024.

Downloads

Published

23-11-2022

How to Cite

Fathima Sanjeetha, M. B., Kanagaraj, Y., Herath, V., & Lokuliyana, S. . (2022). Deep Learning for Edge Computing Applications: A Comprehensive Survey. Asian Journal of Computer Science and Technology, 11(2), 39–47. https://doi.org/10.51983/ajcst-2022.11.2.3456