Human Factors of XR: Using Human Factors to Design XR Systems
Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing
1. SECuRE and Trustworthy
Computing Lab
Aura: An IoT based Cloud Infrastructure for
Localized Mobile Computation Outsourcing
Authors
Ragib Hasan, Md Mahmud Hossain, and Rasib Khan
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Ragib Hasan, Assistant Professor, Dept. of Computer
and Information Sciences, UAB
http://secret.cis.uab.edu
CLOUD
COMPUTING
IoT
2. SECuRE and Trustworthy
Computing Lab
Do Clouds/computations always need to be
stationary (and far far away)?
Today’s clouds are all stationary, located far away from
users, and are housed in dedicated cloud data centers.
But sometimes, users need to perform local computation
offloading, sending data to resources close to them.
Why?
Security
Performance
Mobile computing
2
3. SECuRE and Trustworthy
Computing Lab
How can we use the power of clouds, while
doing localized computation offloading?
Solution:
Outsource computation locally
Use idle or underutilized local devices
Use the idea of bidding and micropayments to
create a sustainable computation ecosystem
Use the cloud computing paradigm to manage
services
Make the computation and data follow the user
3
5. SECuRE and Trustworthy
Computing Lab
Finding computing devices in a building:
Internet of Things (IoT) to the rescue!
IoT devices are everywhere (approximately 18.2 billions)
Leverage the WIDE availability of IoT devices for computation offloading
Concept: a ‘traveling’ cloud using IoT devices for mobile devices
5
6. SECuRE and Trustworthy
Computing Lab
Internet of
Things
M2M
Smart
Cards
Ubiquitous
computing
Web of
things
Wearables
Context -
aware
computing
Pieces of the Puzzle: Internet of Things (IoT)
Future of computing,
communications, and services
Self configuring capabilities
Integrates…
Machine-to-machine (M2M)
Context-aware computing
Wearables
Ubiquitous computing
6
7. SECuRE and Trustworthy
Computing Lab
Smart Spaces – IoT Ecosystems
Homes, offices, etc.
Smart things
Interconnected devices
Proximal/Remote communication
IoT information network
Cooperative decision making
Send/Receive data
Share contexts
7
8. SECuRE and Trustworthy
Computing Lab
Cloud
Computing
Pay As You Use
Scalability
Highly
Automated
Utility Based
Reliability &
Sustainability
Device &
Location
Independent
Pieces of the Puzzle: Cloud Computing
Elastic resource scalability
On-demand provisioning
Pay-as-you-go
Complex problem solving
using inexpensive yet large
scale computing model.
Distributed data processing
(e.g. MapReduce)
8
9. SECuRE and Trustworthy
Computing Lab
Pieces of the Puzzle: Computation Offloading
Offloading/ distributed
computation of mobile
applications using cloud
resources
Augmented execution of
partial or full process using
virtually much more
powerful devices.
9
Mobile Device
HW
OS
PaaS/IaaS Cloud
Virtual Machine
Virtual HW
OS
Partial/Full offloading
Process/Application
Process/Application
11. SECuRE and Trustworthy
Computing Lab
Aura
Contributions
Create a framework for outsourcing computations to IoT devices in a
building
Create a mobile cloud using the IoT devices
Proof of concept: Ported MapReduce to IoT devices
11
12. SECuRE and Trustworthy
Computing Lab
Our solution, Aura: An IoT based Computation
Outsourcing Framework, creates a localized cloud
Localized IoT-based cloud
Physical proximity
Uses available IoT devices
Computation outsourcing
Secure
Less network b/w
Supports interruption,
result preservation, and
resumption
Increased battery lifetime
12
13. SECuRE and Trustworthy
Computing Lab
Aura Architecture
Mobile devices (agents)
Smart phone, tablet, wearables, etc.
IoT devices
Perform outsourced computations
Controller
Monitors localized IoT cloud
Communicational and
computational abstraction between
IoT devices and the M-Agent
High end devices (Laptop, Smart
TV, etc.)
13
26. SECuRE and Trustworthy
Computing Lab
Open Problems and Future Work
26
Application &
use case scenarios
Plug & Play devices
Self-configuring protocol
Large scale
experiment &
evaluation
Incentive model
Security
27. SECuRE and Trustworthy
Computing Lab
Thank You
27
SECRETLab@UAB
Phone: 205.934.8643
Fax: 205.934.5473
Web: http://secret.cis.uab.edu/
Ragib Hasan
Email: ragib@cis.uab.edu
Web: http://www.ragibhasan.com/