Page 14 - ITU Journal Future and evolving technologies Volume 2 (2021), Issue 5 – Internet of Everything
P. 14

ITU Journal on Future and Evolving Technologies, Volume 2 (2021), Issue 5




          which aggregates and merges the data preliminary pro‑  The  r        organized    follow      2
          cessed by the clients. Typically, FL has the following mat‑  an in‑depth review of the related literature is presented.
          ters to face with [25]                               Section 3, discusses the problem statement, while in Sec‑
                                                               tion 4 the FL framework and the placement strategy are
            • Non‑Independent Identically Distributed Data     present            experimental  results
             The clients have different training datasets, therefore  are analyzed and the alternative CT predictive approach
             a single dataset cannot be considered representative  explained.  Finally,  the  conclusions  are  presented  in
             of the other clients datasets;                    Section 6.
            • Unbalanced Datasets Different clients have differ‑  2.   RELATED WORKS
             ent datasets, and each dataset may have a diverse
             number of elements in comparison to other clients  Recently    techniques  hav  f  extensiv  applica‑
             datasets;                                         tions in big data analysis in fog/edge networks research
                                                               area.
            • Large‑Scale Distribution The number of clients
                                                               An overview of the ML techniques applied to fog is pre‑
             involved in the FL training procedure is generally
                                                               sented in paper [26  Then,  paper [26] investigates the
             higher than the amount of data processed at the
                                                               ability of the ML strategies in detecting malicious attack‑
             client level;
                                                               ers in fog networks, while paper [27] focuses on the ML
                                                                 t  evaluat    advantages  deri  fr  an
            • Limited Communication Mobile devices may or
             may not be available for data training and the com‑  edge caching solution, taking into account user satisfac‑
                                                               tion perspective and energy ef iciency. The improvement
             putational capability or communication conditions
                                                               in sensing reliability and network latency is the aim of pa‑
             could be poor.
                                                               per [28], in which the authors implement a multi‑hidden
          In reference to the proposed contextualization, we have  multi‑layer convolutional neural network solution to pro‑
          assumed here that sensitive user data may be derived  vide  data  authentication        crowd‑sensing  en‑
          from historical users functions utilization. In this per‑  vironment  The  tr  decisions  strat  combined  with
          spective, sharing data about daily users habits may ex‑    k‑near  neighbors  method        [29  in
          pose the users to undue risks. For this reason, the FL  which authors deal with the position‑based con idential‑
          framework may represent a useful tool to counteract such  ity problem in high real‑time industrial application sce‑
          a problem. However, a deep investigation of the privacy  narios.
          issues are out of the scope of this paper. The paper pro‑  In a different way, SP maximization is the objective of pa‑
          poses the application of the FL framework, in order to  per [30], in which a deep supervised learning approach is
          forecast the service demands, without losing the user pri‑  applied to perform the minimization of the total network
          vacy constraints, in an IoE scenario. Moreover, on the ba‑  cost  A fog blockchain network is analyzed in paper [31],
          sis of service demand forecasting, this paper proposes a  which formulates a solution based on the auction theory,
          suitable Virtual Functions (VFs) placement both on the  where deep learning is applied to the maximization of the
          ECN and cloud. Summarizing, the contributions of this pa‑  edge computing SP revenue.
          per are                                              Additionally, distributed ML is adopted in papers [32, 33,
                                                               34, 35  In paper [32], a distributed version of the well‑
            • Application of the FL strategy to forecast the network
                                                               known support vector machine method is implemented
             VFs demand, in order to take into account the users
                                                               to investigate its applicability  The reinforcement learn‑
             privacy;
                                                                   mor        Q‑learning      ap‑
                                                               plied in paper [33], in order to minimize the users’ outage
            • Formulation of the SP maximum revenue problem,
                                                               in heterogeneous cellular networks scenarios.  The con‑
             by considering Service Requests (SRs) with a differ‑
                                                               trol in crowd‑sensing problem is the main objective of pa‑
             ent priority and hence, different cost and price. In
                                                               per [34], exploiting the human in the loop methodology to
             particular, the SP can accept the data SRs with low
                                                               propose a hierarchical crowd sensing framework with the
             priority if all the high priority  lows have been satis‑
                                                               aim of reducing cloud congestion and promoting the bal‑
              ied;
                                                               ancing of the data tr  ic.  Then, the distributed stochas‑
                                                               tic variance reduced gradient is applied in paper [35], in
            • Proposal of a VFs placement strategy and a suitable
                                                               which a target accuracy is  ixed, and the optimization of
             matching‑based SRs allocation algorithm based on
                                                               the number of collection points to make data analysis pro‑
             the considered FL and the previously provided VFs
                                                               vided.  Furthermore, paper [35] proposes the minimiza‑
             forecasting scheme;
                                                               tion of the amount of network traf ic sent towards the col‑
            • Performance evaluation of the proposed approach  lection   In a different way, the maximization of SP
             and the comparisons with a centralized Chaos The‑  pro it in a Mobile Edge Computing (MEC) blockchain net‑
             ory (CT)‑based prediction scheme, by resorting to  work has been studied in paper [31], in which an auction
             extensive computer simulation runs.               strat      deep      formulat  to

        2                                    © International Telecommunication Union, 2021
   9   10   11   12   13   14   15   16   17   18   19