{"615276":{"#nid":"615276","#data":{"type":"news","title":"School of Computer Science Researchers Innovate on the Edge of Computing","body":[{"value":"\u003Cp\u003EThe future of computing is on the edge. The cloud allows the development of complex applications but has its limitations. Video processing, image recognition, and other computation need a closer server for improved latency, security, and cost. School of Computer Science researchers are leveraging existing devices at the edge of the network, a practice known as fog or edge computing.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ETo understand why the edge is so innovative, one must understand the understand the history of networks. \u0026ldquo;For a long time, we would compute on our own machines that were owned by one organization,\u0026rdquo; said Professor \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/fac\/Ellen.Zegura\/Welcome.html\u0022\u003E\u003Cstrong\u003EEllen Zegura\u003C\/strong\u003E\u003C\/a\u003E. \u0026ldquo;What\u0026rsquo;s so revolutionary about the cloud is it allows access to the process in a much more accessible, cheaper, and widely used way.\u0026rdquo; But what if the cloud is too far or access is intermittent? This is where edge computing comes in because it allows computation to be spread on existing mobile devices.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ERelying on the edge\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe two biggest issues with this effort are breaking the computing down into transitive pieces and then ensuring they return. Networking Professors \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/fac\/Mostafa.Ammar\/\u0022\u003E\u003Cstrong\u003EMostafa Ammar\u003C\/strong\u003E\u003C\/a\u003E and Zegura predict the churn of devices and how reliable the network will be. They have been attacking this problem from multiple angles, such as using mobile servers and \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/609257\/scs-phd-student-karim-habak-finds-computing-solutions-edge\u0022\u003Efemtoclouds\u003C\/a\u003E. The latter is a mobile self-configuring cloud made from a cluster of mobile devices that provides a reliable compute service despite the churn of its devices.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EEdge computing offers a lot of performance advantages, but there are challenges when harnessing a distributed network. One of the strengths of the cloud is its reliability, but ensuring multiple edge nodes also have this reliability is more complicated. Professor \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~rama\/\u0022\u003E\u003Cstrong\u003EUmakishore Ramachandran\u003C\/strong\u003E \u003C\/a\u003Eapproaches the edge from a systems angle.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EHis research ensures that if one node loses power, the computation isn\u0026rsquo;t lost, but also it isn\u0026rsquo;t distributed so far that latency suffers. One of the ways he\u0026rsquo;s working on improving the resilience of the edge is through Georgia Tech\u0026rsquo;s campus security camera network. He believes anomaly detection could be done in real-time if nodes tracked all vehicles and set a time bound on their activities. Ultimately, Georgia Tech Police wouldn\u0026rsquo;t need to save all video and could respond faster because the edge nodes could process the footage for threats faster.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETrusting the edge\u003C\/strong\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESecuring data is another benefit of edge computing. As a systems researcher, Associate Professor \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/home\/ada\/\u0022\u003E\u003Cstrong\u003EAda Gavrilovska\u003C\/strong\u003E\u003C\/a\u003E realized all the edge\u0026rsquo;s advantages for scalability and latency wouldn\u0026rsquo;t matter if data weren\u0026rsquo;t secure. However, securing the edge in the same way as the cloud made it too slow, so she and Research Scientist \u003Ca href=\u0022https:\/\/www.cc.gatech.edu\/~kbhardwa\/\u0022\u003E\u003Cstrong\u003EKetan Bhardwaj\u003C\/strong\u003E\u003C\/a\u003E built an edge security solution that uses a security feature in commodity hardware. Once a user can trust the edge, they can put critical services there, such as security for Internet of Things (IoT) devices. \u0026ldquo;I want to use the edge to make these applications faster, more scalable, and more efficient in how they use resources,\u0026rdquo; she said.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESCS professors are only just scratching the surface of how revolutionary edge computing could be. The edge can bring computing everywhere, from ensuring self-driving cars have the most up-to-date information to \u003Ca href=\u0022https:\/\/www.scs.gatech.edu\/news\/595715\/new-research-may-improve-communications-during-natural-disasters\u0022\u003Ekeeping communities connected\u003C\/a\u003E to the network during a natural disaster. \u0026ldquo;The vision of edge computing is limited; they say it\u0026rsquo;s a slave to the cloud, but the story is more compelling than that,\u0026rdquo; said Ramachandran. \u0026ldquo;It\u0026rsquo;s about creating a level playing field and having autonomy on the edge for decision-making.\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cem\u003EIllustrations by Pikisuperstar\/Freepik.com\u003C\/em\u003E\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"SCS researchers are pioneering in edge computing."}],"uid":"34541","created_gmt":"2018-12-12 20:41:01","changed_gmt":"2018-12-12 21:35:37","author":"Tess Malone","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2018-12-12T00:00:00-05:00","iso_date":"2018-12-12T00:00:00-05:00","tz":"America\/New_York"},"extras":[],"hg_media":{"615278":{"id":"615278","type":"image","title":"Edge illo","body":null,"created":"1544650521","gmt_created":"2018-12-12 21:35:21","changed":"1544650521","gmt_changed":"2018-12-12 21:35:21","alt":"Illustration of cloud and edge computing elements","file":{"fid":"234287","name":"Artboard 1[1] copy.png","image_path":"\/sites\/default\/files\/images\/Artboard%201%5B1%5D%20copy.png","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Artboard%201%5B1%5D%20copy.png","mime":"image\/png","size":532147,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/Artboard%201%5B1%5D%20copy.png?itok=LpUcb5eG"}}},"media_ids":["615278"],"groups":[{"id":"47223","name":"College of Computing"},{"id":"50875","name":"School of Computer Science"}],"categories":[],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"},{"id":"39541","name":"Systems"}],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ETess Malone, Communications Officer\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022mailto:tess.malone@cc.gatech.edu\u0022\u003Etess.malone@cc.gatech.edu\u003C\/a\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["tess.malone@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}