Journal of Machine and Computing


Assessment of Innovative Architectures, Challenges and Solutions of Edge Intelligence



Journal of Machine and Computing

Received On : 22 March 2022

Revised On : 20 May 2022

Accepted On : 23 July 2022

Published On : 05 October 2022

Volume 02, Issue 04

Pages : 157-167


Abstract


Data collecting, caching, analysis, and processing in close proximity to where the data is collected is referred to as "edge intelligence," a group of linked devices and systems. Edge Intelligence aims to improve data processing quality and speed while also safeguarding the data's privacy and security. This area of study, which dates just from 2011, has shown tremendous development in the last five years, despite its relative youth. This paper provides a survey of the architectures of edge intelligence (Data Placement-Based Architectures to Reduce Latency; 2) Orchestration-Based ECAs- IoT. 3) Big Data Analysis-Based Architectures; and 4) Security-Based Architectures) as well as the challenges and solutions for innovative architectures in edge intelligence.


Keywords


Edge Computing, Artificial Intelligence, Edge Intelligence, Software-Defined Network


  1. F. Foukalas and A. Tziouvaras, "Edge Artificial Intelligence for Industrial Internet of Things Applications: An Industrial Edge IntelligenceSolution", IEEE Industrial Electronics Magazine, vol. 15, no. 2, pp. 28-36, 2021. Doi : 10.1109/mie.2020.3026837.
  2. H. Tang, H. Liu, W. Xiao and N. Sebe, "When Dictionary Learning Meets Deep Learning: Deep Dictionary Learning and Coding Network for Image Recognition With Limited Data", IEEE Transactions on Neural Networks and Learning Systems, vol. 32, no. 5, pp. 2129-2141, 2021.Doi : 10.1109/tnnls.2020.2997289.
  3. P. Georgiev, S. Bhattacharya, N. Lane and C. Mascolo, "Low-resource Multi-task Audio Sensing for Mobile and Embedded Devices via Shared Deep Neural Network Representations", Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 1, no. 3, pp. 1-19, 2017. Doi : 10.1145/3131895.
  4. P. Zhang, E. Lo and B. Lu, "High Performance Depthwise and Pointwise Convolutions on Mobile Devices", Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 04, pp. 6795-6802, 2020. Doi : 10.1609/aaai.v34i04.6159.
  5. C. García-Pérez and P. Merino, "Experimental evaluation of fog computing techniques to reduce latency in LTE networks", Transactions on Emerging Telecommunications Technologies, vol. 29, no. 4, p. e3201, 2017. Doi : 10.1002/ett.3201.
  6. G. Baranwal and D. Vidyarthi, "FONS: a fog orchestrator node selection model to improve application placement in fog computing", The Journal of Supercomputing, vol. 77, no. 9, pp. 10562-10589, 2021. Doi : 10.1007/s11227-021-03702-x.
  7. T. Ibaraki, "Integer programming formulation of combinatorial optimization problems", Discrete Mathematics, vol. 16, no. 1, pp. 39-52, 1976. Doi : 10.1016/0012-365x(76)90091-1.
  8. S. Pirbhulal, W. Wu, K. Muhammad, I. Mehmood, G. Li and V. de Albuquerque, "Mobility Enabled Security for Optimizing IoT based Intelligent Applications", IEEE Network, vol. 34, no. 2, pp. 72-77, 2020. Doi : 10.1109/mnet.001.1800547.
  9. J. Lee and J. Lee, "Hierarchical Mobile Edge Computing Architecture Based on Context Awareness", Applied Sciences, vol. 8, no. 7, p. 1160, 2018. Doi : 10.3390/app8071160.
  10. S. Das, A. Santra, J. Bodra and S. Chakravarthy, "Query processing on large graphs: Approaches to scalability and response time trade offs", Data & Knowledge Engineering, vol. 126, p. 101736, 2020. Doi : 10.1016/j.datak.2019.101736.
  11. B. Kopmaz and A. Arslanoğlu, "Mobile health and smart health applications", Health Care Academician Journal, vol. 5, no. 4, p. 251, 2018. Doi : 10.5455/sad.13-1543239549.
  12. T. Das and M. Gurusamy, "Controller Placement for Resilient Network State Synchronization in Multi-Controller SDN", IEEE Communications Letters, vol. 24, no. 6, pp. 1299-1303, 2020. Doi : 10.1109/lcomm.2020.2979072.
  13. N. Radam, S. Al-Janabi and K. Shaker, "Optimisation Methods for the Controller Placement Problem in SDN: A Survey", Webology, vol. 19, no. 1, pp. 3130-3149, 2022. Doi : 10.14704/web/v19i1/web19207.
  14. S. Park, M. Hong, T. Shon and J. Kwak, "VANET Privacy Assurance Architecture Design", Journal of Internet Computing and Services, vol.17, no. 6, pp. 81-91, 2016. Doi : 10.7472/jksii.2016.17.6.81.
  15. E. Sham and D. Vidyarthi, "CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud", Digital Signal Processing, vol. 126, p. 103523, 2022. Doi : 10.1016/j.dsp.2022.103523.
  16. J. Lozano-Rizk, J. Nieto-Hipolito, R. Rivera-Rodriguez, M. Cosio-Leon, M. Vazquez-Briseño and J. Chimal-Eguia, "QoSComm: A Data Flow Allocation Strategy among SDN-Based Data Centers for IoT Big Data Analytics", Applied Sciences, vol. 10, no. 21, p. 7586, 2020. Doi : 10.3390/app10217586.
  17. J. Birkholzer, A. Cihan and K. Bandilla, "A tiered area-of-review framework for geologic carbon sequestration", Greenhouse Gases: Science and Technology, vol. 4, no. 1, pp. 20-35, 2013. Doi : 10.1002/ghg.1393.
  18. M. Pang, L. Wang and N. Fang, "A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment", Journal of Cloud Computing, vol. 9, no. 1, 2020. Doi : 10.1186/s13677-020-00201-x.
  19. R. Hu, X. Dong and D. Wang, "Protecting Data Source Location Privacy in Wireless Sensor Networks against a Global Eavesdropper", International Journal of Distributed Sensor Networks, vol. 10, no. 8, p. 492802, 2014. Doi : 10.1155/2014/492802.
  20. A. Singh, "Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data", Journal of Privacy and Confidentiality, vol. 1, no. 2, 2010. Doi : 10.29012/jpc.v1i2.571.
  21. R. Tiburski et al., "Lightweight Security Architecture Based on Embedded Virtualization and Trust Mechanisms for IoT Edge Devices", IEEE Communications Magazine, vol. 57, no. 2, pp. 67-73, 2019. Doi : 10.1109/mcom.2018.1701047.
  22. R. Xu, L. Hang, W. Jin and D. Kim, "Distributed Secure Edge Computing Architecture Based on Blockchain for Real-Time Data Integrity in IoT Environments", Actuators, vol. 10, no. 8, p. 197, 2021. Doi : 10.3390/act10080197.
  23. Dina Merlinda Izzah, "Kompetensi Keamanan Jaringan Sesuai Kebutuhan Industri ISP (Internet Service Provider)", Jurnal Teknologi dan Bisnis, vol. 3, no. 1, pp. 33-42, 2021. Doi : 10.37087/jtb.v3i1.43.
  24. S. Hamdan, M. Ayyash and S. Almajali, "Edge-Computing Architectures for Internet of Things Applications: A Survey", Sensors, vol. 20, no. 22, p. 6441, 2020. Doi : 10.3390/s20226441.
  25. F. Ullah, I. Ullah, A. Khan, M. Uddin, H. Alyami and W. Alosaimi, "Enabling Clustering for Privacy-Aware Data Dissemination Based on Medical Healthcare-IoTs (MH-IoTs) for Wireless Body Area Network", Journal of Healthcare Engineering, vol. 2020, pp. 1-10, 2020. Doi :10.1155/2020/8824907.
  26. Y. Xu, "Resource Management of Maritime Edge Nodes for Collected Data Feedback", IEEE Access, vol. 8, pp. 131511-131521, 2020. Doi : 10.1109/access.2020.3007669.

Acknowledgements


Author(s) thanks to Dr. Lars Vlrtanen for this research validation and verification support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.


Availability of data and materials


No data available for above study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Heikku Siltanen and Lars Vlrtanen, “Assessment of Innovative Architectures, Challenges and Solutions of Edge Intelligence”, Journal of Machine and Computing, vol.2, no.4, pp. 157-167, October 2022. doi: 10.53759/7669/jmc202202020.


Copyright


© 2022 Heikku Siltanen and Lars Vlrtanen. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.