Preface |
|
xi | |
About the Book |
|
xiii | |
Acknowledgments |
|
xv | |
Author Biographies |
|
xvii | |
|
Chapter 1 Computing Paradigms |
|
|
1 | (38) |
|
1.1 Introduction to Computing |
|
|
1 | (1) |
|
1.2 The Major Impacts of Computing |
|
|
2 | (1) |
|
|
3 | (4) |
|
1.3.1 Shared Memory Systems |
|
|
5 | (1) |
|
1.3.2 Distributed Memory Systems |
|
|
5 | (1) |
|
|
6 | (1) |
|
1.4 Distributed Computing |
|
|
7 | (3) |
|
|
10 | (3) |
|
1.5.1 High-Performance Clusters |
|
|
12 | (1) |
|
1.5.2 Load Balancing Clusters |
|
|
12 | (1) |
|
1.5.3 High-Availability Clusters |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (7) |
|
|
22 | (3) |
|
1.8.1 Characteristics of Cloud Environments |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.8.2.1 Cloud Services Models |
|
|
23 | (1) |
|
1.8.2.2 Cloud Deployment Models |
|
|
24 | (1) |
|
1.9 Other Computing Paradigms |
|
|
25 | (9) |
|
1.9.1 Ubiquitous Computing |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (5) |
|
|
34 | (1) |
|
|
35 | (4) |
|
|
37 | (2) |
|
Chapter 2 Edge Computing and Its Essentials |
|
|
39 | (30) |
|
|
39 | (3) |
|
2.2 Edge Computing Architecture |
|
|
42 | (2) |
|
|
42 | (1) |
|
2.2.2 Edge Server Cluster |
|
|
42 | (1) |
|
|
43 | (1) |
|
2.3 Background Essentials: IoT Devices |
|
|
44 | (2) |
|
2.3.1 Mobile Phone-Based Sensors |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
2.3.4 Environmental and Chemical Sensors |
|
|
45 | (1) |
|
2.3.5 Radio Frequency Identification |
|
|
45 | (1) |
|
|
46 | (1) |
|
2.4 Networking Architecture |
|
|
46 | (3) |
|
2.5 Network Management and Control |
|
|
49 | (2) |
|
|
51 | (1) |
|
2.6 Edge Computing State-of-the-Art Interfaces and Devices |
|
|
51 | (5) |
|
|
51 | (3) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
2.6.2 Application Interfaces |
|
|
55 | (1) |
|
2.7 Edge Computing Simulators |
|
|
56 | (8) |
|
|
56 | (1) |
|
|
57 | (3) |
|
|
60 | (4) |
|
|
64 | (1) |
|
|
64 | (2) |
|
|
66 | (3) |
|
|
66 | (3) |
|
|
69 | (18) |
|
|
69 | (1) |
|
|
69 | (1) |
|
3.3 Goals of Data Analytics |
|
|
69 | (1) |
|
3.4 Domains Benefiting from Big Data Analytics |
|
|
70 | (1) |
|
3.5 Real-Time Applications of Data Analytics |
|
|
71 | (1) |
|
3.6 Phases of Data Analytics |
|
|
71 | (7) |
|
3.6.1 Data Collection and Pre-Processing |
|
|
71 | (1) |
|
3.6.2 Machine Learning-Model Building |
|
|
72 | (4) |
|
3.6.3 Performance Evaluation |
|
|
76 | (2) |
|
3.7 Types of Data Analytics |
|
|
78 | (2) |
|
3.7.1 Descriptive Analytics |
|
|
78 | (1) |
|
3.7.2 Diagnostic Analytics |
|
|
79 | (1) |
|
3.7.3 Predictive Analytics |
|
|
79 | (1) |
|
3.7.4 Prescriptive Analytics |
|
|
79 | (1) |
|
|
80 | (2) |
|
3.9 Potential of Edge Analytics |
|
|
82 | (1) |
|
3.10 Architecture of Edge Analytics |
|
|
82 | (1) |
|
3.11 Machine Learning for Edge Devices |
|
|
83 | (1) |
|
3.12 Edge Analytics: Case Study |
|
|
84 | (1) |
|
3.13 Research Challenges and Future Research Directions |
|
|
84 | (1) |
|
|
84 | (3) |
|
|
85 | (2) |
|
Chapter 4 Edge Data Storage Security |
|
|
87 | (16) |
|
|
87 | (2) |
|
|
89 | (7) |
|
4.2.1 Identity-Based Encryption |
|
|
89 | (1) |
|
4.2.2 Attribute-Based Encryption |
|
|
89 | (2) |
|
4.2.3 Proxy Re-encryption |
|
|
91 | (1) |
|
4.2.4 Functional Encryption |
|
|
91 | (1) |
|
|
92 | (1) |
|
4.2.6 Searchable Encryption |
|
|
92 | (1) |
|
4.2.7 Homomorphic Encryption |
|
|
93 | (1) |
|
4.2.7.1 Types of Homomorphic Encryption |
|
|
93 | (2) |
|
4.2.7.2 Basic Functions of Homomorphic Encryption |
|
|
95 | (1) |
|
|
96 | (2) |
|
4.3.1 Single-Domain Authentication |
|
|
96 | (1) |
|
4.3.2 Cross-Domain Authentication |
|
|
97 | (1) |
|
4.3.3 Handover Authentication |
|
|
98 | (1) |
|
4.4 Privacy-Preserving Schemes |
|
|
98 | (2) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
4.5 Edge-Based Attack Detection and Prevention |
|
|
100 | (1) |
|
4.6 Conclusions and Future Research Directions |
|
|
101 | (2) |
|
|
101 | (2) |
|
Chapter 5 Blockchain and Edge Computing Systems |
|
|
103 | (36) |
|
5.1 History of Blockchain |
|
|
103 | (1) |
|
5.2 Distributed Ledger Technology |
|
|
103 | (3) |
|
5.3 Role of P2P Architecture in Blockchain |
|
|
106 | (1) |
|
5.4 Blockchain Cryptography |
|
|
107 | (3) |
|
5.5 Characteristics of Blockchain |
|
|
110 | (1) |
|
5.6 Benefits and Limitations of Blockchain |
|
|
111 | (1) |
|
|
111 | (2) |
|
5.8 Blockchain Architecture and Fundamentals |
|
|
113 | (5) |
|
5.8.1 Blockchain behind Bitcoin Network |
|
|
114 | (1) |
|
5.8.2 Transaction Validation |
|
|
115 | (1) |
|
5.8.3 Mining and Block Structure |
|
|
115 | (2) |
|
5.8.4 Consensus Mechanisms |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (5) |
|
|
118 | (2) |
|
|
120 | (3) |
|
|
123 | (1) |
|
5.10 Edge Computing with Blockchain |
|
|
123 | (12) |
|
5.10.1 Internet of Things and Blockchain |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
125 | (10) |
|
5.11 Research Challenges and Future Research Directions |
|
|
135 | (1) |
|
|
136 | (3) |
|
|
136 | (3) |
|
Chapter 6 Edge Computing Use Cases and Case Studies |
|
|
139 | (22) |
|
|
139 | (1) |
|
6.2 Edge Computing High-Potential Use Cases |
|
|
139 | (5) |
|
6.2.1 Autonomous Vehicles |
|
|
139 | (1) |
|
|
140 | (1) |
|
6.2.3 Industrial Automation |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
6.3 Realization of Edge Computing in Healthcare Ensuring Storage Security |
|
|
144 | (14) |
|
|
145 | (1) |
|
6.3.2 Case Study I: Pulse Oximeter to Detect ARDS in Edge Server |
|
|
145 | (1) |
|
|
146 | (1) |
|
6.3.2.2 Oxygen Delivery (DO2) |
|
|
146 | (1) |
|
6.3.2.3 Oxygen Consumption (VO2) |
|
|
147 | (1) |
|
6.3.2.4 Acute Respiratory Distress Syndrome |
|
|
147 | (1) |
|
6.3.2.5 Analysis in Edge Server |
|
|
148 | (1) |
|
6.3.3 Case Study II: Blood Pressure Monitor to Predict Hypotension in Edge Server |
|
|
148 | (3) |
|
6.3.3.1 Mean Arterial Pressure |
|
|
151 | (1) |
|
6.3.3.2 Edge Server Analysis on MAP |
|
|
152 | (1) |
|
6.3.4 Case Study III: Body Composition Scale to Detect Heat Index in Edge Server |
|
|
153 | (1) |
|
|
154 | (1) |
|
6.3.4.2 Heat Index Analysis in Edge Server |
|
|
155 | (1) |
|
6.3.5 Use Case - Edge Computing/Analytics in Industrial IOT |
|
|
156 | (2) |
|
6.4 Conclusions and Open Research Challenges |
|
|
158 | (3) |
|
|
159 | (2) |
Index |
|
161 | |