skip to main content
editorial
Free Access

Edge-centric Computing: Vision and Challenges

Published:30 September 2015Publication History
Skip Abstract Section

Abstract

In many aspects of human activity, there has been a continuous struggle between the forces of centralization and decentralization. Computing exhibits the same phenomenon; we have gone from mainframes to PCs and local networks in the past, and over the last decade we have seen a centralization and consolidation of services and applications in data centers and clouds. We position that a new shift is necessary. Technological advances such as powerful dedicated connection boxes deployed in most homes, high capacity mobile end-user devices and powerful wireless networks, along with growing user concerns about trust, privacy, and autonomy requires taking the control of computing applications, data, and services away from some central nodes (the "core") to the other logical extreme (the "edge") of the Internet. We also position that this development can help blurring the boundary between man and machine, and embrace social computing in which humans are part of the computation and decision making loop, resulting in a human-centered system design. We refer to this vision of human-centered edge-device based computing as Edge-centric Computing. We elaborate in this position paper on this vision and present the research challenges associated with its implementation.

References

  1. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. In Proc. of the 2nd Workshop on Mobile Cloud Computing (MCC), pages 13--16. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cisco Research Center Requests for Proposals (RFPs). Fog computing, ecosystem, architecture and applications. http://www.cisco.com/web/about/ac50/ac207/crc_new/university/RFP/rfp13078.html.Google ScholarGoogle Scholar
  3. R. Ganti, F. Ye, and H. Lei. Mobile crowdsensing: Current state and future challenges. IEEE Communications Magazine, 49(11):32--39, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  4. T. Higuchi, H. Yamaguchi, and T. Higashino. Mobile devices as an infrastructure: A survey of opportunistic sensing technology. Journal of Information Processing, 23(2):94--104, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  5. I. P. Kurniawan, H. Febiansyah, and J. B. Kwon. Cost-effective content delivery networks using clouds and nano data centers. In Ubiquitous Information Technologies and Applications, pages 417--424. Springer, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  6. N. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. Campbell. A survey of mobile phone sensing. Communications Magazine, 48(9):140--150, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Lee et al. The swarm at the edge of the cloud. Journal of Design & Test, 31:8--20, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. Rabinovich, Z. Xiao, and A. Aggarwal. Computing on the edge: A platform for replicating internet applications. In Web content caching and distribution, pages 57--77. Springer, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Ryden, K. Oh, A. Chandra, and J. Weissman. Nebula: Distributed edge cloud for data intensive computing. In Proc. of the 2nd Int. Conf. on Cloud Engineering (IC2E), pages 57--66. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Toka, M. Dell'Amico, and P. Michiardi. Online data backup: A peer-assisted approach. In Proc. of the 10th Int. Conf. on Peer-to-Peer Computing (P2P), pages 1--10. IEEE, 2010.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Edge-centric Computing: Vision and Challenges

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGCOMM Computer Communication Review
          ACM SIGCOMM Computer Communication Review  Volume 45, Issue 5
          October 2015
          41 pages
          ISSN:0146-4833
          DOI:10.1145/2831347
          Issue’s Table of Contents

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 September 2015

          Check for updates

          Qualifiers

          • editorial

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader