Avoiding Data Corruption in Drop Computing Mobile Networks

Radu Ioan Ciobanu, Vladut Constantin Tǎbuşcǎ, Ciprian Dobre, Lidia Bǎjenaru, Constandinos X. Mavromoustakis, George Mastorakis

Research output: Contribution to journalArticle

Abstract

Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100%.

Original languageEnglish
Article number8664482
Pages (from-to)31170-31185
Number of pages16
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 1 Jan 2019

Fingerprint

Wireless networks
Mobile cloud computing
Mobile computing
Network protocols

Keywords

  • cloud
  • consistency
  • edge
  • Mobile
  • opportunistic

Cite this

Ciobanu, R. I., Tǎbuşcǎ, V. C., Dobre, C., Bǎjenaru, L., Mavromoustakis, C. X., & Mastorakis, G. (2019). Avoiding Data Corruption in Drop Computing Mobile Networks. IEEE Access, 7, 31170-31185. [8664482]. https://doi.org/10.1109/ACCESS.2019.2903018
Ciobanu, Radu Ioan ; Tǎbuşcǎ, Vladut Constantin ; Dobre, Ciprian ; Bǎjenaru, Lidia ; Mavromoustakis, Constandinos X. ; Mastorakis, George. / Avoiding Data Corruption in Drop Computing Mobile Networks. In: IEEE Access. 2019 ; Vol. 7. pp. 31170-31185.
@article{52f312fc0194465095cc5c1b170ec667,
title = "Avoiding Data Corruption in Drop Computing Mobile Networks",
abstract = "Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100{\%}.",
keywords = "cloud, consistency, edge, Mobile, opportunistic",
author = "Ciobanu, {Radu Ioan} and Tǎbuşcǎ, {Vladut Constantin} and Ciprian Dobre and Lidia Bǎjenaru and Mavromoustakis, {Constandinos X.} and George Mastorakis",
year = "2019",
month = "1",
day = "1",
doi = "10.1109/ACCESS.2019.2903018",
language = "English",
volume = "7",
pages = "31170--31185",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Ciobanu, RI, Tǎbuşcǎ, VC, Dobre, C, Bǎjenaru, L, Mavromoustakis, CX & Mastorakis, G 2019, 'Avoiding Data Corruption in Drop Computing Mobile Networks', IEEE Access, vol. 7, 8664482, pp. 31170-31185. https://doi.org/10.1109/ACCESS.2019.2903018

Avoiding Data Corruption in Drop Computing Mobile Networks. / Ciobanu, Radu Ioan; Tǎbuşcǎ, Vladut Constantin; Dobre, Ciprian; Bǎjenaru, Lidia; Mavromoustakis, Constandinos X.; Mastorakis, George.

In: IEEE Access, Vol. 7, 8664482, 01.01.2019, p. 31170-31185.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Avoiding Data Corruption in Drop Computing Mobile Networks

AU - Ciobanu, Radu Ioan

AU - Tǎbuşcǎ, Vladut Constantin

AU - Dobre, Ciprian

AU - Bǎjenaru, Lidia

AU - Mavromoustakis, Constandinos X.

AU - Mastorakis, George

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100%.

AB - Drop computing is a network paradigm that aims to address the issues of the mobile cloud computing model, which has started to show limitations especially since the advent of the Internet of Things and the increase in the number of connected devices. In drop computing, nodes are able to offload data and computations to the cloud, to edge devices, or to the social-based opportunistic network composed of other nodes located nearby. In this paper, we focus on the lowest layer of drop computing, where mobile nodes offload tasks and data to and from each other through close-range protocols, based on their social connections. In such a scenario, where the data can circulate in the mobile network on multiple paths (and through multiple other devices), consistency issues may appear due to data corruption or malicious intent. Since there is no central entity that can control the way information is spread and its correctness, alternative methods need to be employed. In this paper, we propose several mechanisms for ensuring data consistency in drop computing, ranging from a rating system to careful analysis of the data received. Through thorough experimentation, we show that our proposed solution is able to maximize the amount of correct (i.e., uncorrupted) data exchanged in the network, with percentages as high as 100%.

KW - cloud

KW - consistency

KW - edge

KW - Mobile

KW - opportunistic

UR - http://www.scopus.com/inward/record.url?scp=85064690098&partnerID=8YFLogxK

U2 - 10.1109/ACCESS.2019.2903018

DO - 10.1109/ACCESS.2019.2903018

M3 - Article

VL - 7

SP - 31170

EP - 31185

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

M1 - 8664482

ER -

Ciobanu RI, Tǎbuşcǎ VC, Dobre C, Bǎjenaru L, Mavromoustakis CX, Mastorakis G. Avoiding Data Corruption in Drop Computing Mobile Networks. IEEE Access. 2019 Jan 1;7:31170-31185. 8664482. https://doi.org/10.1109/ACCESS.2019.2903018