A lightweight secure cyber foraging infrastructure for resource-constrained devices

被引:44
作者
Goyal, S [1 ]
Carter, J [1 ]
机构
[1] Univ Utah, Sch Comp, Salt Lake City, UT 84112 USA
来源
SIXTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS | 2004年
关键词
D O I
10.1109/MCSA.2004.2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Resource-constrained embedded and mobile devices are becoming increasingly common. Cyber foraging, which allows such devices to offload computation to less resource-constrained surrogate machines, enables new and interesting applications for these devices. In this paper we describe a surrogate infrastructure based on virtual machine technology that allows resource-constrainted devices to utilize a surrogate's compute, network, and storage resources. After describing the design of our surrogate infrastructure, we demonstrate how it can be used to support real-time speech recognition and a synthetic web services application. Using a surrogate reduces the response time of speech recognition by a factor of 200 while reducing the energy drain on the client device by a factor of 60. Using a surrogate reduces the response time and energy drain on the client by factors of 21 and 25, respectively, for the web services application.
引用
收藏
页码:186 / 195
页数:10
相关论文
共 14 条
[1]  
[Anonymous], P INT C COMP ARCH SY
[2]  
BALAN RK, 2003, 1 INT C MOB SYST APP
[3]  
Barham P., 2003, ACM SIGOPS OPERATING
[4]  
FLINN J, 2001, HOTOS, V8, P61
[5]  
Flinn J., 2002, P 22 INT C DISTR COM
[6]   Service location protocol: Automatic discovery of IP network services [J].
Guttman, E .
IEEE INTERNET COMPUTING, 1999, 3 (04) :71-+
[7]  
KISTLER JJ, 1991, 13 ACM S OP SYST PRI
[8]  
KRASHINSKY R, 2002, 8 INT C MOB COMP NET
[9]  
MESSER A, 2002, P 22 INT C DISTR COM
[10]  
Noble B., 1997, P 16 ACM S OP SYST P