A Lightweight Secure Cyber Foraging Infrastructure for Resource-Constrained Devices
- 6 April 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 15506193,p. 186-195
- https://doi.org/10.1109/mcsa.2004.2
Abstract
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resource-constrained surrogate machines, enables new and interesting applications for these devices. In this paper, we describe a surrogate infrastructure based on virtual machine technology that allows resource-constrained devices to utilize a surrogate's compute, network, and storage resources. After describing the design of our surrogate infrastructure, we demonstrate how it can be used to support real-time speech recognition and a synthetic Web services application. Using a surrogate reduces the response time of speech recognition by a factor of 200 while reducing the energy drain on the client device by a factor of 60. Using a surrogate reduces the response time and energy drain on the client by factors of 21 and 25, respectively, for the Web services application.Keywords
This publication has 12 references indexed in Scilit:
- Self-tuned remote execution for pervasive computingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A low-power accelerator for the SPHINX 3 speech recognition systemPublished by Association for Computing Machinery (ACM) ,2003
- Towards a distributed platform for resource-constrained devicesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Balancing performance, energy, and quality in pervasive computingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Tactics-based remote execution for mobile computingPublished by Association for Computing Machinery (ACM) ,2003
- Xen and the art of virtualizationPublished by Association for Computing Machinery (ACM) ,2003
- Minimizing energy for wireless web access with bounded slowdownPublished by Association for Computing Machinery (ACM) ,2002
- Pervasive computing: vision and challengesIEEE Wireless Communications, 2001
- Service location protocol: automatic discovery of IP network servicesIEEE Internet Computing, 1999
- Agile application-aware adaptation for mobilityPublished by Association for Computing Machinery (ACM) ,1997