[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3132211.3134457acmconferencesArticle/Chapter ViewAbstractPublication PagessecConference Proceedingsconference-collections
research-article

ePrivateeye: to the edge and beyond!

Published: 12 October 2017 Publication History

Abstract

Edge computing offers resource-constrained devices low-latency access to high-performance computing infrastructure. In this paper, we present ePrivateEye, an implementation of PrivateEye that offloads computationally expensive computer-vision processing to an edge server. The original PrivateEye locally processed video frames on a mobile device and delivered approximately 20 fps, whereas ePrivateEye transfers frames to a remote server for processing. We present experimental results that utilize our campus Software-Defined Networking infrastructure to characterize how network-path latency, packet loss, and geographic distance impact offloading to the edge in ePrivateEye. We show that offloading video-frame analysis to an edge server at a metro-scale distance allows ePrivateEye to analyze more frames than PrivateEye's local processing over the same period to achieve realtime performance of 30 fps, with perfect precision and negligible impact on energy efficiency.

References

[1]
P. Bahl. The emergence of micro datacenters (cloudlets) for mobile computing, 2015.
[2]
R. K. Balan, D. Gergle, M. Satyanarayanan, and J. Herbsleb. Simplifying Cyber Foraging for Mobile Devices. In Proc. of MobiSys, 2007.
[3]
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC '12, pages 13--16, New York, NY, USA, 2012. ACM.
[4]
J.-Y. Bouguet. Pyramidal implementation of the affine lucas kanade feature tracker description of the algorithm. Intel Corporation, 5(1-10):4, 2001.
[5]
J. Canny. A computational approach to edge detection. TMAPI, 1986.
[6]
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Proceedings of the sixth conference on Computer systems, pages 301--314. ACM, 2011.
[7]
E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In Proceedings of the 8th international conference on Mobile systems, applications, and services, pages 49--62. ACM, 2010.
[8]
E. Cuervo, A. Wolman, L. P. Cox, K. Lebeck, A. Razeen, S. Saroiu, and M. Musuvathi. Kahawai: High-quality mobile gaming using gpu offload. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, pages 121--135. ACM, 2015.
[9]
T. L. Foundation. Netem. [Online; accessed 22-Apr-2017].
[10]
P. Garcia Lopez, A. Montresor, D. Epema, A. Datta, T. Higashino, A. Iamnitchi, M. Barcellos, P. Felber, and E. Riviere. Edge-centric computing: Vision and challenges. ACM SIGCOMM Computer Communication Review, 45(5):37--42, 2015.
[11]
A. Gember, C. Dragga, and A. Akella. Ecos: leveraging software-defined networks to support mobile application offloading. In Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, pages 199--210. ACM, 2012.
[12]
P. Georgiev, N. D. Lane, K. K. Rachuri, and C. Mascolo. Leo: Scheduling sensor inference algorithms across heterogeneous mobile processors and network resources. In Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, number CONFCODE, pages 320--333. ACM, 2016.
[13]
M. S. Gordon, D. K. Hong, P. M. Chen, J. Flinn, S. Mahlke, and Z. M. Mao. Accelerating mobile applications through flip-flop replication. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '15, pages 137--150, New York, NY, USA, 2015. ACM.
[14]
Q. T. Inc. Trepn Power Profiler. https://developer.qualcomm.com/software/trepn-power-profiler. [Online; accessed 7-Dec-2015].
[15]
K. Lee, D. Chu, E. Cuervo, J. Kopf, A. Wolman, Y. Degtyarev, S. Grizan, and J. Flinn. Outatime: Using speculation to enable low-latency continuous interaction for mobile cloud gaming. GetMobile: Mobile Comp. and Comm., 19(3):14--17, Dec. 2015.
[16]
M.-R. Ra, A. Sheth, L. Mummert, P. Pillai, D. Wetherall, and R. Govindan. Odessa: Enabling interactive perception applications on mobile devices. MobiSys, 2011.
[17]
N. Raval, A. Srivastava, K. Lebeck, L. Cox, and A. Machanavajjhala. Markit: Privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pages 1289--1295. ACM, 2014.
[18]
N. Raval, A. Srivastava, A. Razeen, K. Lebeck, A. Machanavajjhala, and L. P. Cox. What you mark is what apps see. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pages 249--261. ACM, 2016.
[19]
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, 8(4):14--23, Oct. 2009.
[20]
C. Shi, P. Pandurangan, K. Ni, J. Yang, M. Ammar, M. Naik, and E. Zegura. Ic-cloud: Computation offloading to an intermittently-connected cloud. Technical report, Georgia Institute of Technology, 2013.
[21]
A. Singla, B. Chandrasekaran, P. Godfrey, and B. Maggs. The internet at the speed of light. In Proceedings of the 13th ACM Workshop on Hot Topics in Networks, page 1. ACM, 2014.
[22]
S. Suzuki et al. Topological structural analysis of digitized binary images by border following. Computer vision, graphics, and image processing, 30(1):32--46, 1985.

Cited By

View all
  • (2024)PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsFormal Aspects of Computing10.1145/368593536:4(1-26)Online publication date: 2-Aug-2024
  • (2023)PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems2023 IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC59308.2023.00023(111-122)Online publication date: 24-Oct-2023
  • (2022)Camaroptera: A Long-range Image Sensor with Local Inference for Remote Sensing ApplicationsACM Transactions on Embedded Computing Systems10.1145/351085021:3(1-25)Online publication date: 28-May-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SEC '17: Proceedings of the Second ACM/IEEE Symposium on Edge Computing
October 2017
365 pages
ISBN:9781450350877
DOI:10.1145/3132211
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 October 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. edge computing
  2. software-defined networking
  3. visual privacy

Qualifiers

  • Research-article

Conference

SEC '17
Sponsor:
SEC '17: IEEE/ACM Symposium on Edge Computing
October 12 - 14, 2017
California, San Jose

Acceptance Rates

SEC '17 Paper Acceptance Rate 20 of 41 submissions, 49%;
Overall Acceptance Rate 40 of 100 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)43
  • Downloads (Last 6 weeks)4
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsFormal Aspects of Computing10.1145/368593536:4(1-26)Online publication date: 2-Aug-2024
  • (2023)PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems2023 IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC59308.2023.00023(111-122)Online publication date: 24-Oct-2023
  • (2022)Camaroptera: A Long-range Image Sensor with Local Inference for Remote Sensing ApplicationsACM Transactions on Embedded Computing Systems10.1145/351085021:3(1-25)Online publication date: 28-May-2022
  • (2022)PGCEComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2022.109065212:COnline publication date: 20-Jul-2022
  • (2021)Privacy-Preserving Surveillance as an Edge Service Based on Lightweight Video Protection Schemes Using Face De-Identification and Window MaskingElectronics10.3390/electronics1003023610:3(236)Online publication date: 21-Jan-2021
  • (2021)Enforcing Privacy Preservation on Edge Cameras using Lightweight Video Frame ScramblingIEEE Transactions on Services Computing10.1109/TSC.2021.3135352(1-1)Online publication date: 2021
  • (2021)Edge Intelligence: Empowering Intelligence to the Edge of NetworkProceedings of the IEEE10.1109/JPROC.2021.3119950109:11(1778-1837)Online publication date: Nov-2021
  • (2020)Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209720(1-11)Online publication date: Aug-2020
  • (2020)Privacy-Preserving Selective Video Surveillance2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209688(1-10)Online publication date: Aug-2020
  • (2020)PriSE: Slenderized Privacy-Preserving Surveillance as an Edge Service2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)10.1109/CIC50333.2020.00024(125-134)Online publication date: Dec-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media