You are on page 1of 8

EDGE COMPUTING FOR THE INTERNET OF THINGS

KID Model-Driven Things-Edge-Cloud Computing Paradigm for Traffic Data as a Service


Bowen Du, Runhe Huang, Zhipu Xie, Jianhua Ma, and Weifeng Lv

Abstract However, because it is a centralized process


model, a cloud-only platform has four limitations
The development of intelligent traffic systems for TDaaS:
can benefit from the pervasiveness of IoT tech- • Transmitting large amounts of data between
nologies. In recent years, increasing numbers of IoT devices and the cloud consumes a large
devices are connected to the IoT, and new kinds amount of network bandwidth.
of heterogeneous data sources have been gen- • Providing data services through the Internet
erated. This leads to traffic systems that exist in inevitably delays real-time applications.
extended dimensions of data space. Although • Processing huge volumes of data places a
cloud computing can provide essential services computational load on the cloud.
that reduce the computational load on IoT devic- • Increasing risks of privacy violations [4] occur
es, it has its limitations: high network bandwidth when security-sensitive data are exposed on
consumption, high latency, and high privacy risks. the Internet.
To alleviate these problems, edge computing The emergence of edge computing inspires
has emerged to reduce the computational load a new paradigm for building the relationship
for achieving TDaaS in a dynamic way. Howev- between IoT devices and cloud platforms [5]. Sev-
er, how to drive all edge servers’ work and meet eral such paradigms, such as mobile edge com-
data service requirements is still a key issue. To puting and fog computing, have been presented
address this challenge, this article proposes a in recent years. They mainly optimize cloud com-
novel three-level transparency-of-traffic-data ser- puting systems by performing data processing at
vice framework, that is, a KID-driven TEC com- the edge of the data network, near the source of
puting paradigm. Its aim is to enable edge servers the data, which significantly reduces the volume
to cooperatively work with a cloud server. A case of data flows, network bandwidth occupation, and
study is presented to demonstrate the feasibility response time of data services, because IoT devic-
of the proposed new computing paradigm with es are accessible to edge servers without passing
associated mechanisms. The performance of the data through the Internet [6]. Tran et al. [7] illus-
proposed system is also compared to other meth- trated case studies of collaboration between edge
ods. servers. However, they mostly focused on setting
up architectures that combine edge computing
Introduction and communication infrastructures, not on data
With the exponential growth in the types and provision.
quantities of IoT devices such as wireless sen- To this end, in this article, we propose a
sors, smart vehicles, and surveillance cameras, a knowledge-information-data (KID)-driven TDaaS
large amount and variety of data can be collect- edge computing (TEC) paradigm for TDaaS. The
ed, which is of great benefit in industry and daily main idea of TEC is that by utilizing edge com-
life. The use of these data not only helps optimize puting and providing a distributed computing
transportation systems, but also supports traffic environment for applications and service host-
data services in a dynamic way. However, to ing, the computational load of a cloud server
understand the real-time status of traffic systems, is shared, thus removing a major transmission
such as moving patterns, not only the raw data, and computational bottleneck for cloud-only
but also data mining algorithms are required. platforms. Moreover, the risk of privacy leaks
Recently, cloud computing has emerged as a is reduced. The proposed paradigm is similar
leading computing paradigm. It supports on-de- to mobile edge computing, a data service net-
mand access to a large amount of data and work architecture concept that enables cloud
computing resources, which are provided by indi- and edge computing at the edge of the data net-
viduals and organizations at any time and from work. However, to enable TEC to work automat-
anywhere via the Internet. Traffic data as-a ser- ically, a knowledge discovery and fusion engine
vice (TDaaS) [1] aims to provide data services is needed to enhance the cooperation between
using integrated data and knowledge fused from edge and cloud computing. The KID model [8] is
different sources for intelligent traffic systems. It a cognitive engine that can be used for interpret-
is based on the concept of transparent comput- ing incoming data, in both service requests and
ing [2], namely, enabling traffic services without data provisioning. This enables data flow, infor-
the need to know how the data are integrated or mation assimilation, and even knowledge fusion.
how the knowledge has been discovered by data KID consists of three transparent levels for edge
requesters and data providers [3]. services and cloud servers. There are dynamic
Digital Object Identifier:
10.1109/MNET.2018.1700169 Bowen Du, Zhipu Xie, and Weifeng Lv are with Beihang University; Runhe Huang (corresponding author) and Jianhua Ma are with Hosei University

34 0890-8044/18/$25.00 © 2018 IEEE IEEE Network • January/February 2018


steps that make implementation of the three-lev-
Cloud server
el transparent approach feasible, namely, trans- Edge server
parency for data, transparency for models, and TDaaS
E2
transparency for services. That is, the TEC com- Service Global
puting paradigm needs to be able to recognize engine K-store
incoming data, discover insights from data, and
be aware of the task and situation, which can be
Edge server
provided by the KID model. Internet E3
The rest of this article is organized as follows.
The architecture of the TEC computing paradigm
is described, followed by an illustration of the Edge server E1 Local ••• •••
transparency enabled by the KID model. Then a K-store
Knowledge <V1,G1,A1> Edge server
case study of traffic event detection is presented <V4,G4,A4> I-store
En
Information
that shows how the combination of KID and TEC <V5,G5,A5> <V2,G2,A2> D-store
can benefit TDaaS. Finally, a brief conclusion is Information
given. <V6,G6,A6> <V3,G3,A3>
V
V
V
V
Information
KID Driven
V V

TEC Computing Paradigm for TDaaS Data


Data
source Data
Data collecting

TDaaS [1] is an objective-oriented system that source 2 source


transparently integrates heterogeneous multi- 1 3
Location Camera
source data and fuses mined features and dis- data data
covered knowledge for a traffic service. The TEC
paradigm enables part of the computation and
data processing to be distributed from the cloud FIGURE 1. KID-driven TEC computing paradigm.
to the edge servers, which are closer to the IoT
devices. However, how to effectively and effi-
ciently direct the data processing and balance the locally stored, when the data are required and
computational resources is still a challenge in the sent to the data center in the cloud, data inte-
TEC paradigm. This section briefly describes the gration and processing are conducted there.
KID-driven TEC computing paradigm for TDaaS, This approach inevitably has the problems of a
as shown in Fig. 1. cloud-only platform. To solve them, the TEC para
digm, described below, is used.
E nabling Transparent On-Demand Services
In the previous TDaaS architecture, all the data Embedding the KID Model into TEC
sources are distributed but have links in the data In contrast to cloud-only platforms, TEC is a
center in the cloud. framework that distributes the storage and pro-
Upon receiving a service request, the cloud cessing of large sets of traffic data to the edge
data center integrates and processes data with servers closer to the IoT devices. Each IoT device
prior knowledge contained in the triple Vocabu- is connected to an edge server that has the ability
lary, Graph, Algorithm. Here, Vocabulary holds to store and preprocess data as well as select or
the necessary descriptions of data types, proper- even provide services. To be aware of the data
ties, and relations; Graph holds entity relations; service situation (e.g., what data are requested
and Algorithm holds all necessary algorithms for or what data resources are available) and enable
data processing and mining. This system achieves data service provision (e.g., what resources are
three-level transparency for TDaaS: needed and where to send data for processing)
1. Data collection is transparent to data users. the TEC computing paradigm requires a cogni-
2. Data integration is transparent to data provid- tive model with its associated mechanisms. There-
ers. fore, the KID model is embedded into the TEC
3. The data as a service is transparent to both framework, and drives dynamic recognition of
data users and providers. the traffic situation and service requirements. This
The main four components of the TDaaS sys- dynamically and intelligently coordinates the edge
tem are the Transparent Client, Transparent Serv- servers and cloud for effective resource allocation
er, DaaS Agent, Data Source Service Center, and and efficient network bandwidth usage, enabling
Data Processing Service Center. In an on-demand practical applications.
service mode [9], all the data processing and ser- The KID model has three cognitive stages:
vice models in TDaaS are designed for transpar- interpretation, assimilation, and instantiation.
ent services. Generally, each kind of traffic data All these three stages require prior knowledge.
has its own characteristics. For example, vehicle Therefore, K-store, a knowledge repository struc-
trajectory generation needs a complex model ture, is the core element and consists of the triple
that includes linking GPS locations by time series 〈Vocabulary, Graph, Algorithm〉. Their contents
and matching them to the road network, while and relations are given in Fig. 2.
for video data, a knowledge extraction model is Vocabulary is a collection of data type defini-
required for discovering vehicle profiles and mov- tions, including their potential properties, and the
ing patterns. That is, not every node can process relations among them. With these properties and
the same kinds of data, but they all need to take relations, the relevant knowledge can be matched
into account computing resources, storage capac- as requested. Several standard vocabularies such
ity, and connectivity. as DBPedia, YAGO, and schema.org [10] can be
Although all the data can be distributed and used. However, there are few vocabularies cater-

IEEE Network • January/February 2018 35


Therefore, only the necessary data, information,
e.g. Double Double and knowledge are sent to the cloud instead of
Longitude Latitude all the data. The KID model uses three cognitive
GPSSensor stages or processes: interpretation of the incom-
servedBy embeddedOn ing data, assimilation of the interpreted infor-
Vocabulary mation, and instantiation of knowledge for the
Server Vehicle
provision of services. Figure 3 gives an overview

ry es
ula anc
of the KID-driven TDaaS system under the TEC

cab st

Alg itio
computing paradigm.
Vo re in

de
fin
ori ns
h
As Fig. 3 shows, the KID model is embedded
s in h a

Vo nd o
ap

thm in
sse rap

c a b utp
Gr

a
in the edge server. Knowledge triples 〈Vocabu-

wil V
cla e g

he

ula uts

l p oc
st

the
lary, Graph, Algorithm〉 in the K-store are retrieved
the th

r y of

us a bu
fie
of ies in

sp th

h n la
eci
to support the three cognitive processes, that is,

eci e A

ew r y
sp
tit

fie lg
interpretation, assimilation, and instantiation. Data
En

ry

s t or
ula

he ith
are therefore transformed into information, and
cab

inp ms
Entities of Graph are
Vo

further into knowledge. During these process-

uts
inputs of Algorithms
es, some data, information, and knowledge are
Graph Algorithm stored in the local D-store, I-store, and K-store, but
Outputs of Algorithms some are sent to the cloud. The edge server has
enrich the Graph service workers that provide services directly back
e.g. e.g. to the IoT devices if information and knowledge
Longitude URL: algorithms/vehicleSpeedEstimation/ from other edge servers are not required. That is,
GPSSensor#001
139.0011 Input Demo: future IoT devices are transparent clients that can
Latitude {values:[ be both data collectors and service receivers in
embeddedOn
servedBy {Ing: 139.0011, lat: 39.0022, t: 08081322} a local processing mode. In this mode, data pro-
39.0022 ]} cessing and service provision are conducted com-
Taxi#002 Output Demo:
EdgeServer#003
{values:[{t:08081322, speed:36.5}]} pletely locally without going through the Internet
to the cloud.
FIGURE 2. Knowledge repository structure and examples. For some cases, the source data or the inter-
mediate results of local processing have to be
sent to the cloud. Of course, the cloud generally
ing for traffic data, and there is a need to expand holds more computational and storage resources;
them for TDaaS applications. balancing these resources considering network
Graph is a knowledge representation that is bandwidth and network traffic conditions is a key
composed of vertices and links [11]. A vertex issue. The KID model aims to optimize the bal-
represents an entity, and a link holds a relation ance between resource allocation and computa-
between two entities. The whole Graph is a set tion with its growing knowledge as it interprets
of entities and their relations, which are defined external data, similar to humans’ recognition of
in Vocabulary. Entities in Graph can be inputs of the external world.
Algorithm, and outputs of Algorithm enrich Graph Determining what data to send, where to send
in return. it, and how to send it is done by the KID model
Algorithm is a pool that holds a collection of based on its awareness of both data resources
executable programs. Although they are regard- and data service situations while it continuously
ed as a type of knowledge that can extract fea- interprets incoming data using prior knowledge in
tures, discover moving patterns, or even support the K-Store. Knowledge in a local K-Store can be
decision making, they cannot be represented in updated to the global K-Store in the cloud, and
Graph. They are deployed in a separate runtime any local K-Store can share the knowledge in the
environment and can be exported to other sys- global K-Store with permission.
tems as services. In a TDaaS system, the data providers are IoT
For better understanding, examples of Vocab- devices and the service receivers are Internet of
ulary, Graph, and Algorithm are given in Fig. 2. Things (IoT) devices/things or human users. Ser-
in the Vocabulary, GPSSensor is a data type defi- vice providers can be the edge or cloud servers.
nition, longitude is a property, and embeddedOn The data providers do not need to know how
is a relation; in the Graph, GPSSensor#001 and data are collected and processed; these process-
Taxi#002 are entities; and in the Algorithm, the es are transparent to them. Similarly, how the
presented instance is called vehicleSpeedEstima- service is formed is transparent to service receiv-
tion, which takes vehicle position records as input ers. Three levels (data collection, processing and
and outputs vehicle speeds as a time series. integration, and services) are transparent to data
providers and service receivers. In the next sec-
Overview of the KID-Driven TDaaS System tion, we describe how the KID model enables the
When the TEC paradigm is embedded with the three-level transparency.
KID model, it is enhanced with the KID model’s
cognitive ability to smartly: TDaaS Example
• Direct data to the cloud or edge server for When requesting a TDaaS, such as an estima-
processing tion of whether there are any traffic events, a
• Direct information (i.e., data endowed with user first posts the request to a URL on the cloud
meaning) to the global or local K-store for server. The cloud server parses the URL and
assimilation maps it to the service algorithm trafficEvents().
• Direct knowledge to the cloud for sharing or Moreover, algorithm parameters to specify the
to the local K-store for fusion. time span and road sections for the required traf-

36 IEEE Network • January/February 2018


IOT devices
Service
clients Environment Vehicle
data Video data
behavior data

Data as a service
Service worker D
Real time History Traffic D-store
traffic event flow Streaming
condition influence distribution Sub-task parsing HDFS data
files
Scheduling
Big data service engine
Data mining Interpretation I
Service Knowledge Data
parsing matching mining Local K-store
I-store
Global K-store Local Assimilation
vocabulary RDBMS
Global Global Global
vocabulary graphDB algorithm Local Local K
algorithm graphDB
Cloud server Edge server

FIGURE 3. Overview of the KID-driven TDaaS system.

fic events are also posted. Instead of outputting


the final results, the cloud server only outputs a 1
service plan. When it is executed, the final results
are produced. The service plan comprises a list: [D11 D21 D31••• Dm1] I1 I2 I3 ••• IT K1
[〈order1, edgeServer1, algorithm1〉, 〈order2, edg- 2 3
[D12 D22 D32••• Dn2] ••• K2
eServer 2 , algorithm 2 〉, …, 〈order n , edgeServer n , •••
algorithmn〉]. Here, order indicates the sequence K-store TDaaS
••• ••• ••• ••• K3
of service execution, edgeServer determines
which edge server to use, and algorithm denotes [D1t D2t D3t••• Dkt] •••
which algorithm on the edge server should be
invoked. The service plan is then executed in 1 Interpretation 2 Assimilation 3 Instantiation
order by the specified edge servers and produc-
es the final result. FIGURE 4. Three cognitive processes from data to knowledge.

KID Model Enables Transparency resents the newly produced information, and the
The KID model [12] was inspired by human cog- K on the arrow represents the predefined knowl-
nitive processes: signals that stimulate the brain edge in the K-Store. This indicates that when
are defined as data and denoted as D; sub- producing new information, more than one data
sequently, the nervous system transforms data source may be used.
into information, denoted as I; finally, the brain This process is transparent with respect to
understands the information and transforms it data because the data model is predefined in the
into knowledge, denoted as K, and stores it in vocabulary, and each data model is bound with
memory by establishing connections with other a specific interpretation(). The system can intelli-
related knowledge. Figure 4 shows an example gently recognize the incoming data and input it
of the present processes of transforming data in the specific interpretation() that produces the
into knowledge. Driven by KID, the TEC comput- wanted information.
ing paradigm is transparent at three levels, data,
model, and services, which correspond to three Assimilation for Model Transparency
abstract functions: interpretation(), assimilation(), The newly generated information is assimilated by
and instantiation(), respectively. These three pro- assimilation() into the body of the K-store by link-
cesses are defined as follows. For clarity, the nota- ing it to existing relevant knowledge. This means
tions in the equations are consistent with those in that not only are new entities added, but also
Fig. 4. new relations are established. This process can be
expressed as
I nterpretation for Data Transparency assimilation() : { I1, I 2 ,…, I t } → K1
K
After data are collected by IoT devices, they are (2)
outside the information systems. Here, interpre- where I1, I2, …, It represent the information pro-
tation() means endowing the data with meaning duced in the interpretation parse and K1 is the
by finding associative knowledge, which is stored new knowledge, which is added into the K-Store,
in the K-Store, to interpret it. This process can be enriching it.
expressed as This process is transparent with respect to
model because it is triggered by the former pro-
{
interpretation() : D11, D21 ,…, D1m → I1 } K
(1)
cess, automatically absorbs information as knowl-
edge, and puts knowledge in the correct place,
where D11, D21, …, 1
Dm represent input data, I1 rep- on either the edge or cloud servers.

IEEE Network • January/February 2018 37


fetched from the cloud side, they are locally exe-
Cloud server cuted via a streaming approach. Moreover, KID is
Central K-store Global graph
also modular.
TDaaS Service Just as different models of cars are produced
Driving behavior Traffic flow regulation consumer by assembly on the same modern automotive
production line following different designs, the
Driving pattern Events and emergencies
related data subgraph and algorithm are treated
as a block because the same edge computing
node can load different datasets or algorithms
MEC server A Sub-graph A according to the work pushed by the cloud. This
MEC server B means that the benefit of transparent computing
Road K Sub-graph B is that local computing capabilities can be fully uti-
congestion
lized because the computing resources are glob-
Individual K
speed ally optimized and can be automatically streamed
Interpretation to and executed on edge nodes.
A4: road congestion estimation
Interpretation Case Study of Expressway Event Detection
A5: speed estimation Here, a case study of expressway event detec-
Traffic I I Travel tion is presented to illustrate how TEC supports
density speed
TDaaS. We also experimentally evaluate how well
Trajectory I our KID-driven TEC computing paradigm works
Interpretation with real data.
A1: traffic density estimation Interpretation Scenario Description
A2: travel speed estimation A3: trajectory building In contrast to urban roads, a highway is a closed
system, which means that once an accident hap-
Video pens or there is bad weather such as heavy fog,
D stream GPS location D
vehicles are easily stuck in traffic and unable to
immediately change their route because there are
IoT devices Traffic fewer exits. Travelers expect traffic events identi-
events fied by TDaaS to be reported as soon as possible
Road Road Road so that they may choose another route. Transpor-
section A section B section C tation departments want to use TDaaS to eval-
uate whether an expressway should be closed.
FIGURE 5. KID-driven TEC computing in expressway event detection. As shown in Fig. 5, we selected a part of the G6
highway, which starts from Fourth — Ring — Road
and ends at Badaling — Great — Wall, covering
about 70 km. This road bears heavy daily traffic,
Instantiation for Service Transparency comprising not only numerous freight vehicles,
Knowledge must be instantiated by the instantia- but also many tourist vehicles traveling to the
tion() function before it is applied to solve a prob- Great Wall. Once the expressway is affected by a
lem or used in an application. This enables the traffic event or bad weather, travelers spend twice
application of knowledge to real-world problems. as long traveling along it.
TDaaS is a good example of knowledge applica- On a key segment of the expressway in Bei-
tion. This process can be defined as jing’s downtown area, surveillance video cameras
K2 are deployed every kilometer. Using these, we
instantiation() : K1 → Service (3) can estimate the traffic flow volume. The loca-
where K1 is the knowledge on which the service tion records of taxis, buses, and trucks that are
is provided, that is, the knowledge for answering equipped with GPS are collected by different
specific requests. For instance, if the TDaaS for transportation departments or companies. Using
traffic conditions is required, knowledge stored in these, we can learn the moving patterns of vehi-
the graph that correctly describes the traffic con- cles to identify the spatial-temporal scope of influ-
ditions is this kind of knowledge. ence. Moreover, the entering and exiting records
The previous example shows that the instantia- of each vehicle that uses electronic toll collection
tion process is transparent with respect to service (ETC), which is similar to EZpass in the United
because it hides the details of how the service is States, are collected by the highway management
provided from the service consumers. department.
In this case, as shown in Fig. 5, edge server A
Dynamic Data Service Provisioning on KID belongs to the transportation department, which
In the era of IoT, the data stored in the D-store can obtain travel speeds based on GPS records.
are multidimensional, continuous, rapidly pro- Edge server B is used for extracting traffic flow
duced, and change over time and space. That is, volume and travel speed knowledge from massive
the computing resources need to be suitable in video stream data.
situations where the speed of service response The existing method of transmitting all the data
time is high, especially when there is a significant to the cloud, including a large number of video
growth in data volume. Hence, KID is a tailored streams and billions of vehicle location records, is
transparent computing-based architecture for slow and impedes real-time services. In contrast,
TEC, which means it consists of knowledge-relat- in KID-driven TEC, edge servers act as service
ed subsets of specific predefined organized data workers and are responsible for processing the
and algorithm. Once the on-demand services are data collected from their own local edge serv-

38 IEEE Network • January/February 2018


700
TC1 TC2 TEC KID-TEC 1200
TC1 TC2 TEC KID-TEC
600
1000
500

The amount of data transmitted


800

on the Internet (Mb)


400
Latency (s)

600
300

200 400

100 200

0
130.1 247.4 385.1 515.9 639.2 763.5 930.1 0
130.1 247.4 385.1 515.9 639.2 763.5 930.1
Data size (Mb)
Data size (Mb)
(a)
(b)
120
TC1 TC2 TEC KID-TEC
2
TEC KID-TEC
100 1.8
1.6
80 1.4

Retrieval latency (s)


CPU usage (%)

1.2
60 1
0.8
40 0.6
0.4
20 0.2
0
10,000 20,000 30,000 40,000 50,000 60,000 70,000
0
130.1 247.4 385.1 515.9 639.2 763.5 930.1 Entities in the local knowledge graph
Data size (Mb) (d)
(c)

FIGURE 6. Performance comparison of cloud-only TEC and KID-TEC.

ers. Data are transformed into knowledge before rithm is implemented in Python and contained
transmission to the cloud. This process reduces in a Python sandbox by Anaconda so that the
the computational burden of the cloud. dependencies can be transmitted along with the
codes. The sandbox uses 54 Mb.
Data Description
There are five kinds of data collected in the sys- Experiments
tem: GPS locations, highway pass records, vid- Three Windows Server 2012 64-bit systems (12
eos, events, and weather data. GPS locations and CPUs, 128 GB main memory) were used for sim-
video data are complex data, and to handle them, ulating the edge servers. A Tecent Cloud (https://
high-capacity and high-performance systems are cloud.qq.com/) server was used as the cloud. The
required to meet real-time requirements. For GPS proposed method was compared with a cloud
locations, a complex model is needed to link and computing model without edge servers. To sim-
match them on the road. About 1000 vehicles ulate a surveillance video camera with compu-
pass through a road section; hence, millions of tational ability, a smartphone with an Android
records must be processed because there are operating system was utilized. The network band-
thousands of road sections. A surveillance camera width within the local area network was 128
with 720 P (1280 × 720) produces about 42 GB Mb/s. The related algorithms were implemented
of video per day, which is sent to the edge servers with Java using OpenCV for video processing.
as streaming data. To estimate the performance Within the TEC, the surveillance cameras
of the proposed KID-driven TEC, the simulation were only responsible for collecting and trans-
experiment takes video files ranging from about mitting raw data. The edge servers received and
100 MB to about 1 GB in size. Knowledge is processed the video stream and then discovered
extracted from these unstructured videos. the different moving patterns caused by traffic
For the algorithm, our video processing algo- accidents. Next, the edge servers transferred the
rithm counts the number of vehicles in each results to the cloud as knowledge.
frame. Using the OpenCV framework, this func- The experiments considered the following sce-
tion first recognizes the background and then narios (Fig. 6):
picks out moving areas, which should be vehi- • IoT devices collect data that are then trans-
cles. Morphological algorithms are also applied to mitted to the cloud, which deals with the
eliminate interference caused by noise. The algo- data for decision making (TC1).

IEEE Network • January/February 2018 39


incoming data, assimilating information into the
The cloud in the future may just take the role of a manager that controls registering, interacting with, body of knowledge, and instantiating knowledge
and coordinating edge services, and any new edge server with new services can be connected and for the use of traffic data as a service. We noted
that the KID-driven TEC computing paradigm has
disconnected, which enables the architecture to be extensible. the data-driven characteristics of knowledge dis-
covery, knowledge generation, and knowledge
evolution, a process comprising three cyclic stag-
• IoT devices collect data and process data es from data to knowledge, and interaction with
into knowledge. All the knowledge is then the external world when receiving data from IoT
sent to the cloud (TC2). devices and providing services. Its feasibility and
• IoT devices collect data and transmit them to advantages were demonstrated in a case study
edge servers. Edge servers process the data through the implementation details of a TDaaS
and then push the results to the cloud (TEC). application.
• The local K-Store is operated in dynamic As a novel computing paradigm, KID-driven
mode, which means that before it process- edge computing could be an important research
es the data, it loads Vocabulary, Graph, and topic. Once computing platforms such as cloud
Algorithm from the cloud dynamically, and and edge servers have been built, endeavors can
flushes temporary knowledge every time focus on the enrichment of various services — not
processing is performed (KID-TEC). only TDaaS, as in this article, but also data as a
The performance of each scenario involves service (DaaS) in any field, which is called xDaaS.
time latency, the amount of data transmitted It may be possible to set up a service register
through the Internet, and the computational load mechanism for TEC services and encourage more
of the cloud server (indicated by CPU usage per- people to contribute to the TEC computing para-
centage), as shown in Figs. 6a–6c, respectively. A digm on this common shared platform. Note that
specific comparison between the performance of the cloud in the future may just take the role of a
TEC and KID-TEC is also presented in Fig. 6d. manager that controls registering, interacting with,
As shown in Fig. 6a, TC1 and TC2 are slower and coordinating edge services, and any new
than TEC and KID-TEC. This is because although edge server with new services can be connected
the computation time varies slightly between and disconnected, which enables the architec-
these computing paradigms, TC1 and TC2 spend ture to be extensible. Moreover, the recent break-
more time transmitting data through the Internet. throughs in deep learning [13], together with the
This indicates that both TEC and KID-TEC are KID model, which is a cognitive process, enhance
more suitable for offering low-latency services. TDaaS by evolving and making the TEC comput-
Similarly, Fig. 6b shows that, in the TEC and KID- ing paradigm smarter. However, the challenges
TEC scenarios, smaller amounts of data are trans- are to find appropriate mechanisms for charac-
mitted through the Internet and less network terizing the inputs and outputs of deep learning
bandwidth is consumed. Figure 6c illustrates algorithms [14].
that because the workload of the cloud server
is reduced in TEC and KID-TEC, its CPU usage Acknowledgment
remains at a lower level. Figure 6d shows anoth- The work is partially supported by the Japan Soci-
er experiment that demonstrates the advantag- ety for the Promotion of Science Grants-in-Aid
es of KID-TEC over TEC without KID. KID-TEC for Scientific Research (No. 25330270 and No.
adopts a dynamic K-Store and loads knowledge 26330350) and by the National Natural Science
from the cloud in an on-demand way, flushing Foundation of China (No. 51408018).
temporary knowledge when one job is done.
Hence, as the knowledge of the cloud accu- References
mulates, the knowledge in the edge is kept at [1] D. Bowen et al., “Active CTDaaS: A Data Service Framework
Based on Transparent IoD in City Traffic,” IEEE Trans. Com-
a constant level. This is helpful for promptly puters, 65.12, 2016, pp. 3524–36.
responding to the information retrieved from the [2] R. Ju et al., “Serving at the Edge: A Scalable IoT Architecture
knowledge base. Based on Transparent Computing,” IEEE Network, 2017.
In addition, the advantages of TEC or KID- [3] X. Zhipu et al., “An Evolvable and Transparent Data as a
Service Framework for Multisource Data Integration and
TEC for protecting privacy are also indicated. Fusion,” Peer-to-Peer Networking and Applications, 2017,
Because raw video streams originally include pri- pp. 1–14.
vacy information such as vehicle plate number [4] Z. Yaoxue et al., “A Survey on Emerging Computing Para-
and car positions (according to the position of the digms for Big Data,” Chinese J. Electronics, 26.1, 2017.
[5] M. Pavel and Z. Becvar, “Mobile Edge Computing: A Survey
video camera), in TC1 and TC2, this information on Architecture and Computation Offloading,” IEEE Com-
is transmitted through the Internet, and the risk mun. Surveys & Tutorials, 2017.
of exposure is higher. However, in TEC and KID- [6] S. Yuan-Yao et al., “Enabling Low-Latency Applications in
TEC, only the results of the video processing are Fog-Radio Access Networks,” IEEE Network, vol. 31, no. 1,
Jan./Feb. 2017, pp. 52–58.
transmitted, separate from the privacy informa- [7] X. T. Truyen et al., “Collaborative Mobile Edge Computing in
tion, so they are safer. 5G Networks: New Paradigms, Scenarios, and Challenges,”
IEEE Commun. Mag., vol. 55, no. 4, Apr. 2017, pp. 54–61.
Conclusion and Perspectives [8] S. Atsushi and R. Huang, “From Data to Knowledge: A Cog-
nitive Approach to Retail Business Intelligence,” Proc. 2015
The proposed TEC computing paradigm with the IEEE Int’l. Conf. Data Science and Data Intensive Systems,
KID model embedded can both support low-la- 2015.
tency local responses and share global awareness. [9] Y. Zhang et al., “Transparent Computing: A Promising Net-
Moreover, it optimizes data flow, information work Computing Paradigm,” J. Computing in Science and
Engineering, vol. 19, no. 1, 2017, pp. 7–20.
flow, and knowledge discovery/generation. In this [10] V. G. Ramanathan, D. Brickley, and S. Macbeth, “Schema.
article, we describe the KID model and explain org: Evolution of Structured Data on the Web,” Commun.
how it plays an important role in interpreting ACM, 59.2, 2016, pp. 44–51.

40 IEEE Network • January/February 2018


[11] S. Amit, “Introducing the Knowledge Graph: Things, Not England in 1993. Her research fields include cognitive comput-
Strings,” official google blog, 2012. ing, brain modeling, computational intelligence computing, big
[12] S. Atsushi and R. Huang. “A Generic Formulated KID data, and machine learning.
Model for Pragmatic Processing of Data, Information, and
Knowledge,” UIC-ATC-ScalCom, 2015. Zhipu Xie received his B.S. in information and computing science
[13] F. Zubair et al., “State-of-the-Art Deep Learning: Evolving from Central South University, Changsha, China, in 2013. He is
Machine Intelligence Toward Tomorrow’s Intelligent Net- now a Ph.D. degree candidate in computer science and engineer-
work Traffic Control Systems,” IEEE Commun. Surveys & ing at Beihang University. His research interests include smart city
Tutorials, 2017. technology, intelligent transportation, and city big data mining.
[14] K. Nei et al., “The Deep Learning Vision for Heterogeneous
Network Traffic Control: Proposal, Challenges, and Future Jianhua Ma is a full professor in the Faculty of Computer and
Perspective,” IEEE Wireless Commun., vo. 24, no. 3, June Information Sciences at Hosei University, Japan. He received his
2017, pp. 146–53. B.S. and M.S. degrees from National University of Defense Tech-
nology, China, in 1982 and 1985, respectively, and his Ph.D.
Biographies degree from Xidian University, China, in 1990. His research
Bowen Du received his B.S. degree from Shijiazhuang Tiedao interests include multimedia, networks, ubiquitous computing,
University, China, and his Ph.D. degree in computer science social computing, and cyber intelligence. He is a founding Chair
and engineering from Beihang University, Beijing, China, in of the IEEE CIS Smart World Technical Committee (founded
2005 and 2013, respectively. Currently, he is an assistant pro- in 2016) and the IEEE SMC Cybermatics Technical Committee
fessor with the State Key Laboratory of Software Development (founded in 2016).
Environment, Beihang University. His research interests include
smart city technology, traffic data mining, and data service. Weifeng Lv received his B.S. degree in computer science and
engineering from Shandong University, Jinan, China, and his
Runhe Huang [SM’17] is a full professor in the Faculty of Com- Ph.D. degree in computer science and engineering from Bei-
puter and Information Sciences at Hosei University, Japan. She hang University in 1992 and 1998, respectively. Currently, he
received a Sino-Britain Friendship Scholarship for her Ph.D. is a professor with the State Key Laboratory of Software Devel-
study in the United Kingdom and received her Ph.D. in comput- opment Environment, Beihang University. His research interests
er science and mathematics from the University of the West of include smart city technology and mass data processing.

IEEE Network • January/February 2018 41

You might also like