Avoiding Data Corruption in Drop Computing Mobile Networks
Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8664482/ |
id |
doaj-3a7ad11c2b2b476eadc12a3c470511c4 |
---|---|
record_format |
Article |
spelling |
doaj-3a7ad11c2b2b476eadc12a3c470511c42021-03-29T22:22:52ZengIEEEIEEE Access2169-35362019-01-017311703118510.1109/ACCESS.2019.29030188664482Avoiding Data Corruption in Drop Computing Mobile NetworksRadu-Ioan Ciobanu0https://orcid.org/0000-0002-4114-1139Vladut-Constantin Tabusca1Ciprian Dobre2https://orcid.org/0000-0003-4638-7725Lidia Bajenaru3Constandinos X. Mavromoustakis4https://orcid.org/0000-0003-0333-8034George Mastorakis5Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Bucharest, RomaniaFaculty of Automatic Control and Computers, University Politehnica of Bucharest, Bucharest, RomaniaNational Institute for Research and Development in Informatics, Bucharest, RomaniaNational Institute for Research and Development in Informatics, Bucharest, RomaniaDepartment of Computer Science, University of Nicosia, Nicosia, CyprusDepartment of Informatics Engineering, Technological Educational Institute of Crete, Heraklion, GreeceDrop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100%.https://ieeexplore.ieee.org/document/8664482/Mobilecloudedgeopportunisticconsistency |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Radu-Ioan Ciobanu Vladut-Constantin Tabusca Ciprian Dobre Lidia Bajenaru Constandinos X. Mavromoustakis George Mastorakis |
spellingShingle |
Radu-Ioan Ciobanu Vladut-Constantin Tabusca Ciprian Dobre Lidia Bajenaru Constandinos X. Mavromoustakis George Mastorakis Avoiding Data Corruption in Drop Computing Mobile Networks IEEE Access Mobile cloud edge opportunistic consistency |
author_facet |
Radu-Ioan Ciobanu Vladut-Constantin Tabusca Ciprian Dobre Lidia Bajenaru Constandinos X. Mavromoustakis George Mastorakis |
author_sort |
Radu-Ioan Ciobanu |
title |
Avoiding Data Corruption in Drop Computing Mobile Networks |
title_short |
Avoiding Data Corruption in Drop Computing Mobile Networks |
title_full |
Avoiding Data Corruption in Drop Computing Mobile Networks |
title_fullStr |
Avoiding Data Corruption in Drop Computing Mobile Networks |
title_full_unstemmed |
Avoiding Data Corruption in Drop Computing Mobile Networks |
title_sort |
avoiding data corruption in drop computing mobile networks |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100%. |
topic |
Mobile cloud edge opportunistic consistency |
url |
https://ieeexplore.ieee.org/document/8664482/ |
work_keys_str_mv |
AT raduioanciobanu avoidingdatacorruptionindropcomputingmobilenetworks AT vladutconstantintabusca avoidingdatacorruptionindropcomputingmobilenetworks AT cipriandobre avoidingdatacorruptionindropcomputingmobilenetworks AT lidiabajenaru avoidingdatacorruptionindropcomputingmobilenetworks AT constandinosxmavromoustakis avoidingdatacorruptionindropcomputingmobilenetworks AT georgemastorakis avoidingdatacorruptionindropcomputingmobilenetworks |
_version_ |
1724191718700482560 |