Loading [MathJax]/extensions/MathMenu.js
Saptarshi Debroy - IEEE Xplore Author Profile

Showing 1-25 of 45 results

Filter Results

Show

Results

Edge computing plays a crucial role in large-scale and real-time video analytics for smart cities, particularly in environments with massive machine-type communications (mMTC) among IoT devices. Due to the dynamic nature of mMTC, one of the main challenges is to achieve energy-efficient resource allocation and service placement in resource-constrained edge computing environments. In this paper, we...Show More
Although the emergence of edge computing has greatly enhanced the efficiency of data processing and reduced latency by bringing computation closer to the data source, one significant drawback of edge computing is the lack of processing capabilities of centralized cloud servers. With the rapid development of Internet of Things (IoT) and Artificial Intelligence (AI) techniques, the computational dem...Show More
Collaborative IoT-edge environments, although effective in hosting latency-sensitive applications, are fundamentally vulnerable to data falsification attacks that can potentially impact key system performance objectives. In this paper, we explore and propose an intent-driven energy data falsification attack model for collaborative IoT-edge environments and shed light on the attack's impact on syst...Show More
Ad-hoc edge deployments to support real-time complex video processing applications such as, multi-view 3D reconstruction often suffer from spatio-temporal system disruptions that greatly impact reconstruction quality. In this poster paper, we present a novel portfolio theory-inspired edge resource management strategy to ensure reliable multi-view 3D reconstruction by accounting for possible system...Show More
Balancing mutually diverging performance metrics, such as, processing latency, outcome accuracy, and end device energy consumption is a challenging undertaking for deep learning model inference in ad-hoc edge environments. In this paper, we propose EdgeRL framework that seeks to strike such balance by using an Advantage Actor-Critic (A2C) Reinforcement Learning (RL) approach that can choose optima...Show More
Volunteer Edge-Cloud (VEC) computing has a significant potential to support scientific workflows in user communities contributing volunteer edge nodes. However, managing heterogeneous and intermittent resources to support machine/deep learning (ML/DL) based workflows poses challenges in resource governance for reliability, and confidentiality for model/data privacy protection. There is a need for ...Show More
In recent times, Volunteer Edge-Cloud (VEC) has gained traction as a cost-effective, community computing paradigm to support data-intensive scientific workflows. However, due to the highly distributed and heterogeneous nature of VEC resources, centralized workflow task scheduling remains a challenge. In this paper, we propose a Reinforcement Learning (RL)-driven data-intensive scientific workflow ...Show More
Real-time video analytics applications are one of the driving forces towards adoption of edge computing due to the latter’s ability to provide ‘near cloud-scale’ resources closer to the application site. However, striking a balance between system energy-efficiency and video quality satisfaction still remains a challenge. In this paper, we propose an edge-driven unified resource broker (URB) framew...Show More
Multi-view 3D reconstruction driven augmented, virtual, and mixed reality applications are becoming increasingly edge-native, due to factors such as, rapid reconstruction needs, security/privacy concerns, and lack of connectivity to cloud platforms. Managing edge-native 3D reconstruction, due to edge resource constraints and inherent dynamism of ‘in the wild’ 3D environments, involves striking a b...Show More
Real-time visual computing applications running Deep Neural Networks (DNN) are becoming popular for mission-critical use cases such as, disaster response, tactical scenarios, and medical triage that require establishing ad-hoc edge environments. However, strict latency deadlines of such applications require real-time processing of pre-trained DNN layers (i.e., DNN inference) involving image/video ...Show More
In order to plan rapid response during disasters, first responder agencies often adopt ‘bring your own device’ (BYOD) model with inexpensive mobile edge devices (e.g., drones, robots, tablets) for complex video analytics applications, e.g., 3D reconstruction of a disaster scene. Unlike simpler video applications, widely used Multi-view Stereo (MVS) based 3D reconstruction applications (e.g., openM...Show More
In order to satisfy diverse quality-of-service (QoS) requirements of complex real-time video applications, civilian and tactical use cases are employing software-defined hybrid edgecloud systems. One of the primary QoS requirements of such applications is ultra-low end-to-end latency for video applications that necessitates rapid frame transfer between end-devices and edge servers using software-d...Show More
Energy efficient task offloading within a fog computing environment comprising of end-devices and edge servers remains a challenging problem to solve, especially for real-time video processing applications due to such tasks' strict latency deadline demands. In this paper we propose an Energy-efficient Fog Computing framework (EFFECT) for real-time applications within mission-critical use cases. Th...Show More
With the increased push to promote data-driven methods in modern healthcare, there is a tremendous need for fast access to clinical datasets in order to pursue medical breakthroughs in the areas of personalized medicine and big data knowledge discovery. However, the inherent lack of trust between the data custodians and data consumers/users has resulted in a fully manual honest broker approach to ...Show More
Federated multi-cloud resource allocation for data-intensive application workflows is generally performed based on performance or quality of service (i.e., QSpecs) considerations. At the same time, end-to-end security requirements of these workflows across multiple domains are considered as an afterthought due to lack of standardized formalization methods. Consequently, diverse/heterogenous domain...Show More
In order to support last-mile wireless connectivity of computation-intensive applications, edge systems can benefit from secondary (i.e., opportunistic) utilization of licensed spectrum. However, spectrum sensing for such secondary utilization can end up causing considerable energy consumption for already energy-constrained mobile devices. In this paper, we propose an energy-aware task offloading ...Show More
In mobile edge computing (MEC) systems, offloading real-time and compute-intensive application tasks to remote edge servers is performed to relieve energy-constrained mobile devices of energy consuming computations. However, such practice often becomes counter-productive as transmission power requirements to offload such real-time tasks through wireless can make the mobile devices spend significan...Show More
Security vulnerabilities that are unique to unlicensed (secondary) networks have been well studied in literature. However, the nature and impact of traditional wireless network threats, such as backoff manipulation when applied to secondary networks, require further investigation in particular for multiple rogue station scenarios. In this paper, we perform modeling and analysis of multi-rogue back...Show More
With the increase of DDoS attacks, resource adaptation schemes need to be effective to protect critical cloud-hosted applications. Specifically, they need to be adaptable to attack behavior, and be dynamic in terms of resource utilization. In this paper, we propose an intelligent strategy for proactive and reactive application migration by leveraging the concept of `moving target defense' (MTD). T...Show More
Cloud based incidence response systems suffer from lack of network connectivity to offload compute intensive mission-critical applications to remote cloud. Thus, the next-generation incidence response solutions are becoming more edge-cloud based where computational resources are available closer to the disaster site. However, frequent and dynamic unpredictabilities or fluctuations generated in suc...Show More
Data-intensive bioinformatics applications often use federated multi-cloud infrastructures to support compute-intensive processing needs. In this paper, we propose a Multi-Cloud Performance and Security (MCPS) Brokering framework within such federated multi-cloud infrastructures to allocate cloud resources to applications by satisfying their performance and security requirements.Show More
Securing multi-domain network performance monitoring (NPM) systems that are being widely deployed as `Measurement Infrastructure-as-a-Service' (MIaaS) in high-performance computing is becoming increasingly critical. It presents an emerging set of research challenges in cloud security given that security mechanisms such as policy-driven access to federated NPM services across multiple domains need ...Show More
With wider adoption of Software-Defined Networking (SDN), network obfuscation and resource adaptation within a cloud environment have emerged as cost-effective solutions against cyber attacks. In spite of their implementation simplicity, shortcomings of such one-dimensional strategies are considerable against sophisticated attacks where the attacker/s have enhanced visibility to the cloud network....Show More
With the surge in data-intensive science applications, the campus cloud infrastructures are increasingly dealing with sensitive data that has strict security requirements. However, in most cases due to lack of sophisticated security frameworks and trained personnel, such campus private clouds (CPC) are not fully equipped to handle sophisticated integrity, availability, and confidentiality attacks....Show More
In order to cater the growing spectrum demands of large scale future 5G Internet of Things (IoT) applications, Dynamic Spectrum Access (DSA) based networks are being proposed as a high-throughput and cost-effective solution. However the lack of understanding of DSA paradigm's inherent security vulnerabilities on IoT networks might become a roadblock towards realizing such spectrum aware 5G vision....Show More