E-HAMC: Leveraging Fog Computing for Emergency Alert Service

E-HAMC: Leveraging Fog Computing for
Emergency Alert Service
Mohammad Aazam ([email protected])
Prof. Eui-Nam Huh
Kyung Hee University, Korea
Brief Bio
• PhD scholar and Research Engineer
• RmCRC, Computer Engineering Department, Kyung Hee University, Korea
• Editor
• Sensors & Transducers Journal
• IEEE Communications Magazine (Assoc. Editor)
• Reviewer Board Member (selected ones)
• IEEE Trans. on Cloud Computing
• IEEE Trans. on Multimedia
• KSII Trans. on Internet and Information Systems
• IEEE Communications Letters
• ETRI Journal
• Publications (66)
• Journals
• 7
• Conferences
• 55
• IETF I-D
• 1
• Book Chapters
• 3
MOHAMMAD AAZAM - [email protected]
Emergency situations
• A situation that poses immediate risk to health, life, environment, or property
• Accidents (data source: WHO, 2013)
•
•
•
•
According to WHO stats, one person is killed every 25 seconds
Only 28 countries (449 million people - 7% of the world’s population) have adequate laws
Between 20 and 50 million sustain non-fatal injuries
Of those dying on the world’s roads are vulnerable road users (23% motorcyclists, 22%
pedestrians, 5% cyclists)
• Young adults aged between 15 and 44 years account for 59% of global road traffic deaths
• Fire (data source: The Geneva Association and WHO, 2014)
• Average fatalities due to fire accidents is ~3000/yr in USA and ~1600/yr in Japan
• Injuries are around 275,000/yr in USA, 16000/yr in Japan and 6800/yr in Australia
• Other damages correspond to ~$16 billion in USA and $5 billion in Japan
• Terrorism (data source: BBC, Institute for Economics and Peace)
• The number of deaths from terrorism increased by 61% between 2012 and 2013
• 18,000 people died from terrorist attacks in 2013
• Murder (data source: UN Office on Drugs and Crime, 2013)
• About 50% of terrorist attacks claim no lives, while 40 times more people are killed in
murders than in terrorist attacks, according to a UN report for 2012
• 437,000 people were intentionally killed across the world in 2012
• More than a third of those (36 per cent) occurred in the Americas
• Kidnapping (data source: IBTimes UK, 2014, Business Insider, )
• 60,000 children go missing every year in India
• Asia and Pacific had 35% of global kidnaps-for-ransom in 2013
• Building collapsed
Conventional emergency tackling process
Emergency Help Alert Mobile Cloud (EHAMC) architecture
• Provides an interface to quick notification
• User has to press one button, based on the type of
emergency event
• The service itself contacts appropriate department(s)
• Family members are also contacted, according to
already stored list of contact details
E-HAMC with Fog
• Cloud extended to the edge
• Micro Data Center (MDC) paradigm, where cloud services are brought
closer to the underlying networks and nodes
• Brings storage, processing, and other resources closer to the cloud
customers
• Targets the services with widely distributed deployments
• Suits services: video streaming, latency sensitive, emergency and
healthcare, augmented reality, and gaming
Usage modes
• Victim (default mode)
• Once emergency event is selected, notification
is sent
• The service also contacts the family members or
emergency contacts of the victim automatically
• Witness
• The service can be used in Witness mode,
where any passerby can inform about the
incident, by selecting witness mode
• In this case, family members would not
be contacted
Location mapping and avoiding location
spoofing
• Location coordinates are also sent, along with event details
• Location is mapped from the BTS radiolocation or GPS
• It also helps avoid location spoofing
Handling prank notifications
• Prank notifications not only hold up the resources, but also, becomes
a bother for emergency dealing departments
• E-HAMC automatically sends picture of the event
• The app asks to take a picture and then sends it automatically to the
server
• A witness can do that as well
• This helps in minimizing pranks, if not completely countering it
E-HAMC communication with the Cloud
• E-HAMC does not entirely work on its own
• The service utilizes the vastness of cloud computing as well
• E-HAMC communicates the emergency event details to
the cloud server
• That data is used by relevant departments to
further enhance the counter measures and plan
• It also helps extend the service and provides
basis for further services
Contacts update
• Since users are mobile, they can move to any location (another city or
country) at any time
• If the contact details of emergency dealing departments are different,
they would be synced automatically through cloud
Performance Evaluation
• Performance is evaluated in the scenario when gateway communicates with the
cloud
• Data sets
• Multimedia (audio/video file)
• 20MB file
• Represents the case when audio/video file is uploaded to the cloud
• Bulk-data
• 10MB, heterogeneous files
• for the situation when images, location, text message, and other relevant data is uploaded in the cloud
• Cloud has different scheduling algorithms for different types of files (Shortest-Job-First, FIFO, etc.)
• No. of users
• In the evaluation results on 86 different instances are presented
• Overall, the evaluation was lasted for 6 weeks, during weekends and weekday, to
ensure network conditions and server load do not significantly affect the
performance
• Final results are average of the total evaluation data
• Scenarios
• End node to fog
• End node to cloud (without fog)
End node to Fog - Upload delay
• An average of 7.84 seconds duration is required to upload the 20MB
video or multimedia data to the Fog
Data size
20MB
Upload delay
7.84 seconds
End node to Fog – Bulk-data Upload delay
• An average of 4.4 seconds duration is required to upload the 10MB
bulk-data, consisting of heterogeneous files, to the Fog
Data size
10MB
Upload delay
4.4 seconds
End node to Cloud – Upload delay
• An average of 69.3 seconds duration is required to upload the 20MB
multimedia file to the Fog
Data size
20MB
Upload delay
69.3 seconds
Synchronization delay – within Cloud
• When an already existing data is relocated or renamed
• When multiple parties work in collaboration
Data size
All
Synchronization delay
4 seconds
Synchronization delay for
collaborative work
~ 9 seconds
End node to Cloud – Bulk-data Upload delay
• An average of 27.82 seconds duration is required to upload the 10MB
bulk-data, consisting of heterogeneous files, to the Fog
Data size
10MB
Upload delay
27.82 seconds
Bulk-data Synchronization delay – within
Cloud
• When an already existing data is relocated or renamed
• When multiple parties work in collaboration
Data size
All
Synchronization delay
9 seconds
Conclusion
• The world is growing very fast, so are the emergency situations
• Notifying in time helps rescue and recovery quick and avoid making
the damage more severe
• Many deaths are caused because of delayed or unprofessional
response
• A simple and efficient mechanism is required in this regard
• E-HAMC provides a way to notify and analyze the situation in a much
more efficient yet details manner
• It utilizes the enormity of cloud computing which makes the ultimate
services more enhanced, useful, and quick
References
•
[1] Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Cloud of Things: Integrating Internet of Things with Cloud Computing and the Issues
Involved”, in the proceedings of 11th IEEE IBCAST, Islamabad, Pakistan, 14-18 January, 2014..
•
[2] Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Smart Gateway Based Communication for Cloud of Things”, In the proceedings of 9th IEEE
ISSNIP, Singapore, 21-24 April, 2014.
•
[3] Mohammad Aazam, Eui-Nam Huh, "Fog Computing and Smart Gateway Based Communication for Cloud of Things", in the proceedings of IEEE
Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 27-29 August, 2014.
•
[4] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli, "Fog Computing and Its Role in the Internet of Things", in the proceedings of ACM
SIGCOMM, August 17, 2012, Helsinki, Finland.
•
[5] Jrad, Foued,et al. "SLA based Service Brokering in Intercloud Environments." CLOSER. 2012.
•
[6] Rogers, Owen, and Dave Cliff. "A financial brokerage model for cloud computing." Journal of Cloud Computing 1.1, 1-12, 2012.
•
[7] Shadi Ibrahim, Bingsheng He, Hai Jin, “Towards Pay-As-You-Consume Cloud Computing”, IEEE International Conference on Services Computing,
Washington, USA, July 4-9, 2011.
•
[8] Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud", Security and
Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012.
•
[9] http://en.wikipedia.org/wiki/List_of_countries_by_traffic-related_death_rate
•
[10] http://www.who.int/violence_injury_prevention/road_safety_status/2013/en/
•
[11] http://www.bbc.com/news/world-30086435
•
[12] http://www.ibtimes.co.uk/top-five-countries-highest-rates-kidnapping-1441648
•
[13] http://www.businessinsider.com/top-20-countries-by-kidnapping-2013-12
Questions
• [email protected]
Thank You