Big Data Research ›› 2019, Vol. 5 ›› Issue (2): 3-16.doi: 10.11959/j.issn.2096-0271.2019010
Special Issue: 边缘计算
• TOPIC::EDGE COMPUTING • Next Articles
Linzhe LI1,2,Peilei ZHOU3,Peng CHENG1,Zhiguo SHI1,2
Online:
2019-03-15
Published:
2019-04-04
CLC Number:
Linzhe LI, Peilei ZHOU, Peng CHENG, Zhiguo SHI. Architecture,challenges and applications of edge computing[J]. Big Data Research, 2019, 5(2): 3-16.
[1] | 于文平 . 《2017—2018中国物联网发展年度报告》发布[J]. 物联网技术, 2018,8(10): 5-6. |
YU W P . Annual report on China’s Internet of things development from 2017 to 2018’ released[J]. Internet of Things Technologies, 2018,8(10): 5-6. | |
[2] | KNORR E , GRUMAN G . What cloud computing really means[J]. InfoWorld, 2008(7):20 |
[3] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the Internet of things[C]// The 1st Edition of the MCC Workshop on Mobile Cloud Computing,August 17,2012,Helsinki,Finland. New York:ACM Press, 2012: 13-16. |
[4] | BELOGLAZOV A , ABAWAJY J , BUYYA R . Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing[J]. Future Generation Computer Systems, 2012,28(5): 755-768. |
[5] | TAKABI H , JOSHI J B D , AHN G J . Security and privacy challenges in cloud computing environments[J]. IEEE Security and Privacy, 2010(6): 24-31. |
[6] | PEARSON S , BENAMEUR A . Privacy,security and trust issues arising from cloud computing[C]// 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom),November 30-December 3,2010,Indianapolis,USA. Piscataway:IEEE Press, 2010: 693-702. |
[7] | SHI W S , CAO J , ZHANG Q ,et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016,3(5): 637-646. |
[8] | HU Y C , PATEL M , SABELLA D ,et al. Mobile edge computing-a key technology towards 5G[M]// ETSI White Paper.[S.l.:s.n]. 2015. |
[9] | WEIN J M , KLONINGER J J , NOTTINGHAM M C ,et al. Content delivery network (CDN) content server request handling mechanism with metadata framework support:U.S.Patent 7,240,100[P].2007-7-3. |
[10] | 施巍松, 张星洲, 王一帆 ,等. 边缘计算:现状与展望[J]. 计算机研究与发展, 2019(1): 1-21. |
SHI W S , ZHANG X Z , WANG Y F ,et al. Edge computing:state-of-the-art and future directions[J]. Journal of Computer Research and Development, 2019(1): 1-21. | |
[11] | PORTILLA J , MUJICA G , LEE J ,et al. The extreme edge at the bottom of the Internet of things:a review[J]. IEEE Sensors Journal, 2019(1): 1-20. |
[12] | YU W , LIANG F , HE X ,et al. A survey on the edge computing for the Internet of things[J]. IEEE Access, 2018(6): 6900-6919. |
[13] | 施巍松, 孙辉, 曹杰 ,等. 边缘计算:万物互联时代新型计算模型[J]. 计算机研究与发展, 2017,54(5): 907-924. |
SHI W S , SUN H , CAO J ,et al. Edge computing-an emerging computing model for the Internet of everything era[J]. Journal of Computer Research and Development, 2017,54(5): 907-924. | |
[14] | BONOMI F , MILITO R , NATARAJAN P ,et al. Fog computing:a platform for internet of things and analytics[M]// Big data and Internet of things:a roadmap for smart environments. Heidelberg:Springer, 2014: 169-186. |
[15] | STOJMENOVIC I , WEN S . The fog computing paradigm:scenarios and security issues[C]// 2014 Federated Conference on Computer Science and Information Systems (FedCSIS),September 7-10,2014,Warsaw,Poland. Piscataway:IEEE Press, 2014: 1-8. |
[16] | REN J , GUO H , XU C ,et al. Serving at the edge:a scalable IoT architecture based on transparent computing[J]. IEEE Network, 2017,31(5): 96-105. |
[17] | TALEB T , SAMDANIS K , MADA B ,et al. On multi-access edge computing:a survey of the emerging 5G network edge cloud architecture and orchestration[J]. IEEE Communications Surveys and Tutorials, 2017,19(3): 1657-1681. |
[18] | GARCIA LOPEZ P , MONTRESOR A , EPEMA D ,et al. Edge-centric computing:vision and challenges[J]. ACM SIGCOMM Computer Communication Review, 2015,45(5): 37-42. |
[19] | 安星硕, 曹桂兴, 苗莉 ,等. 智慧边缘计算安全综述[J]. 电信科学, 2018,34(7): 135-147. |
AN X S , CAO G X , MIAO L ,et al. Security of intelligent edge computing:a survey[J]. Telecommunications Science, 2018,34(7): 135-147. | |
[20] | CHEN T , MOREAU T , JIANG Z ,et al. TVM:end-to-end compilation stack for deep learning[J]. Computer Science, 2018,arXiv:1802.04799v1. |
[21] | MOREAU T , CHEN T , JIANG Z ,et al. VTA:an open hardware-software stack for deep learning[J]. Computer Science, 2018,arXiv:1807.04188. |
[22] | MOCKAPETRIS P , DUNLAP K J . Development of the domain name system[M]. New York: ACM PressPress, 1988. |
[23] | ZHANG L , ESTRIN D , BURKE J ,et al. Named data networking (ndn) project[J]. ACM SIGCOMM Computer Communication Review, 2010,44(3): 66-73. |
[24] | WU H , SHI J , WANG Y ,et al. On incremental deployment of named data networking in local area networks[C]// 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS),May 18-19,2017,Beijing,China. Piscataway:IEEE Press, 2017: 82-94. |
[25] | ZHANG D , MA Y , ZHENG C ,et al. Cooperative-competitive task allocation in edge computing for delay-sensitive social sensing[C]// 2018 IEEE/ACM Symposium on Edge Computing (SEC),February 24-25,2018,Dubai,United Arab Emirates. Piscataway:IEEE Press, 2018: 243-259. |
[26] | XIAO K , GAO Z , WANG Q ,et al. A heuristic algorithm based on resource requirements forecasting for server placement in edge computing[C]// 2018 IEEE/ACM Symposium on Edge Computing (SEC) ,February 24-25,2018,Dubai,United Arab Emirates. Piscataway:IEEE Press, 2018: 354-355. |
[27] | 庄小君, 杨波, 王旭 ,等. 移动边缘计算安全研究[J]. 电信工程技术与标准化, 2018,31(12): 38-43. |
ZHUANG X J , YANG B , WANG X ,et al. Approach on mobile edge computing security[J]. Telecom Engineering Technics and Standardization, 2018,31(12): 38-43. | |
[28] | SHI W , DUSTDAR S . The promise of edge computing[J]. Computer, 2016,49(5): 78-81. |
[29] | CHI J , OWUSU E , YIN X ,et al. Privacy partition:a privacy-preserving framework for deep neural networks in edge networks[C]// 2018 IEEE/ACM Symposium on Edge Computing (SEC),February 24-25,2018,Dubai,United Arab Emirates. Piscataway:IEEE Press, 2018: 378-380. |
[30] | TRIMANANDA R , YOUNIS A , WANG B ,et al. Vigilia:securing smart home edge computing[C]// 2018 IEEE/ACM Symposium on Edge Computing (SEC),February 24-25,2018,Dubai,United Arab Emirates. Piscataway:IEEE Press, 2018: 74-89. |
[31] | MOBLEY R K . An introduction to predictive maintenance[M]. Amsterdam: ElsevierPress, 2002. |
[32] | CHEN N , CHEN Y , SONG S ,et al. Smart urban surveillance using fog computing[C]// 2016 IEEE/ACM Symposium on Edge Computing (SEC),October 27-28,2016,Washington,DC,USA. Piscataway:IEEE Press, 2016: 95-96. |
[33] | IANDOLA F N , HAN S , MOSKEWICZ M W ,et al. Squeezenet:alexnet-level accuracy with 50x fewer parameters and < 0.5 MBmodel size[J]. Computer Science, 2016arXiv:1602.07360. |
[34] | NIKOUEI S Y , CHEN Y , FAUGHNAN T R . Smart surveillance as an edge service for realtime human detection and tracking[C]// 2018 IEEE/ACM Symposium on Edge Computing (SEC),February 24-25,2018,Dubai,United Arab Emirates. Piscataway:IEEE Press, 2018: 336-337. |
[35] | NIKOUEI S Y , CHEN Y , SONG S ,et al. Kerman:a hybrid lightweight tracking algorithm to enable smart surveillance as an edge service[J]. Computer Science, 2018arXiv:1808.02134. |
[1] | Ming LI, Abin LYU. Exploration and practice of privacy preserving computing for vehicle-road collaboration system [J]. Big Data Research, 2022, 8(5): 74-87. |
[2] | Xiaolan QIU, Yuxin HU, Songtao SHANGGUAN, Kun FU. Remote sensing satellite big data high-recision integration processing technology [J]. Big Data Research, 2022, 8(2): 15-27. |
[3] | Baojiang XIN, Dewen LI, Lanlan WANG. Value mining and application of big data in enterprise power credit investigation [J]. Big Data Research, 2021, 7(6): 138-146. |
[4] | Zhengxun XIA, Shengmei LUO, Yuanhao SUN, Jianfei TANG, Yan ZHANG. Design,implementation and practice of parallel processing system for a large-scale heterogeneous data [J]. Big Data Research, 2020, 6(4): 18-29. |
[5] | Wanggen LIU, Huaicheng ZHENG, Guoping RONG. A scheduler system for large-scale distributed data computing in cloud [J]. Big Data Research, 2020, 6(1): 81-98. |
[6] | Huizhe WANG,Dan TANG,Zihao YU,Zhigang LIU,Biwei XIE,Yungang BAO. Open-source chip,RISC-V and agile development [J]. Big Data Research, 2019, 5(4): 50-66. |
[7] | Kenli LI, Chubo LIU. Edge intelligence:state-of-the-art and expectations [J]. Big Data Research, 2019, 5(3): 69-75. |
[8] | Zhihao QU, Baoliu YE, Guihai CHEN, Bin TANG, Chenghao GUO. State-of-the-art survey on resource optimization in edge computing [J]. Big Data Research, 2019, 5(2): 17-33. |
[9] | Jie LING, Jiahui CHEN, Yu LUO, Siliang ZHANG. A survey on the security technology of edge computing [J]. Big Data Research, 2019, 5(2): 34-52. |
[10] | Zhi ZHOU, Shuai YU, Xu CHEN. Edge intelligence:a new nexus of edge computing and artificial intelligence [J]. Big Data Research, 2019, 5(2): 53-63. |
[11] | Cong ZHANG, Xiaoyi FAN, Xiaoten LIU, Haitian PANG, Lifeng SUN, Jiangchuan LIU. Edge computing enabled smart grid [J]. Big Data Research, 2019, 5(2): 64-78. |
[12] | Ke ZHANG, Ying YE, Hong ZHANG. Forest fire monitoring system based on edge computing [J]. Big Data Research, 2019, 5(2): 79-88. |
[13] | Li MA, Yongmei ZHANG. Discussion on training program of computer majors under the background of emerging engineering education [J]. Big Data Research, 2018, 4(6): 46-53. |
[14] | Jianmin WANG. Survey on industrial big data [J]. Big Data Research, 2017, 3(6): 3-14. |
[15] | Limin XIAO, Zhisheng HUO. Review of I/O performance optimization technology for big data storage system [J]. Big Data Research, 2017, 3(6): 65-84. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|