2015 IEEE 8th International Conference on Cloud Computing 2015
DOI: 10.1109/cloud.2015.11
|View full text |Cite
|
Sign up to set email alerts
|

A Cost-Effective Method to Keep Availability of Many Cloud-Connected Devices

Abstract: In the case of a cloud-based remote control system that enables users to control cloud-connected devices from anywhere at any time, costs tend to increase in proportion to the number of devices. Most of the costs are derived from a message broker, a key component of the system that keeps connections from devices and relays messages between users and devices. In this paper, we analyze the costs of the message broker under a typical remote-control workload and reveal that keepalive communication costs account fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
0
1
0
1
Order By: Relevance
“…Finalmente, las tecnologías utilizadas por los trabajos recientes para la implementación de la interacción semántica entre objetos se pueden resumir en: middlewares orientados a servicios de sensores [15], middlewares orientados a microservicios [16], arquitecturas orientadas a eventos [17], desarrollo de agentes inteligentes para objetos inteligentes [18] y basados en ontologías y mensajes en redes sociales [19].…”
Section: Conceptos Base De Interacción Semántica De Las Cosasunclassified
“…Finalmente, las tecnologías utilizadas por los trabajos recientes para la implementación de la interacción semántica entre objetos se pueden resumir en: middlewares orientados a servicios de sensores [15], middlewares orientados a microservicios [16], arquitecturas orientadas a eventos [17], desarrollo de agentes inteligentes para objetos inteligentes [18] y basados en ontologías y mensajes en redes sociales [19].…”
Section: Conceptos Base De Interacción Semántica De Las Cosasunclassified
“…With the embedded public key, IoT devices can initiate a secure session towards the endpoint right after it boots up and maintain the session with heartbeat packets. This method enables indirect access through the relay server [4]. Since the session is proactively launched by the IoT device located behind the NAT, access requests encapsulated in the response packets can freely pass through the NAT and firewall, which is dubbed as "piggybacking."…”
Section: Case Study Of Efficient Blockchain and Iot Integration: Iot ...mentioning
confidence: 99%