E-HAMC: Leveraging Fog Computing for Emergency Alert Service Mohammad Aazam ([email protected]) Prof. Eui-Nam Huh Kyung Hee University, Korea Brief Bio • PhD scholar and Research Engineer • RmCRC, Computer Engineering Department, Kyung Hee University, Korea • Editor • Sensors & Transducers Journal • IEEE Communications Magazine (Assoc. Editor) • Reviewer Board Member (selected ones) • IEEE Trans. on Cloud Computing • IEEE Trans. on Multimedia • KSII Trans. on Internet and Information Systems • IEEE Communications Letters • ETRI Journal • Publications (66) • Journals • 7 • Conferences • 55 • IETF I-D • 1 • Book Chapters • 3 MOHAMMAD AAZAM - [email protected] Emergency situations • A situation that poses immediate risk to health, life, environment, or property • Accidents (data source: WHO, 2013) • • • • According to WHO stats, one person is killed every 25 seconds Only 28 countries (449 million people - 7% of the world’s population) have adequate laws Between 20 and 50 million sustain non-fatal injuries Of those dying on the world’s roads are vulnerable road users (23% motorcyclists, 22% pedestrians, 5% cyclists) • Young adults aged between 15 and 44 years account for 59% of global road traffic deaths • Fire (data source: The Geneva Association and WHO, 2014) • Average fatalities due to fire accidents is ~3000/yr in USA and ~1600/yr in Japan • Injuries are around 275,000/yr in USA, 16000/yr in Japan and 6800/yr in Australia • Other damages correspond to ~$16 billion in USA and $5 billion in Japan • Terrorism (data source: BBC, Institute for Economics and Peace) • The number of deaths from terrorism increased by 61% between 2012 and 2013 • 18,000 people died from terrorist attacks in 2013 • Murder (data source: UN Office on Drugs and Crime, 2013) • About 50% of terrorist attacks claim no lives, while 40 times more people are killed in murders than in terrorist attacks, according to a UN report for 2012 • 437,000 people were intentionally killed across the world in 2012 • More than a third of those (36 per cent) occurred in the Americas • Kidnapping (data source: IBTimes UK, 2014, Business Insider, ) • 60,000 children go missing every year in India • Asia and Pacific had 35% of global kidnaps-for-ransom in 2013 • Building collapsed Conventional emergency tackling process Emergency Help Alert Mobile Cloud (EHAMC) architecture • Provides an interface to quick notification • User has to press one button, based on the type of emergency event • The service itself contacts appropriate department(s) • Family members are also contacted, according to already stored list of contact details E-HAMC with Fog • Cloud extended to the edge • Micro Data Center (MDC) paradigm, where cloud services are brought closer to the underlying networks and nodes • Brings storage, processing, and other resources closer to the cloud customers • Targets the services with widely distributed deployments • Suits services: video streaming, latency sensitive, emergency and healthcare, augmented reality, and gaming Usage modes • Victim (default mode) • Once emergency event is selected, notification is sent • The service also contacts the family members or emergency contacts of the victim automatically • Witness • The service can be used in Witness mode, where any passerby can inform about the incident, by selecting witness mode • In this case, family members would not be contacted Location mapping and avoiding location spoofing • Location coordinates are also sent, along with event details • Location is mapped from the BTS radiolocation or GPS • It also helps avoid location spoofing Handling prank notifications • Prank notifications not only hold up the resources, but also, becomes a bother for emergency dealing departments • E-HAMC automatically sends picture of the event • The app asks to take a picture and then sends it automatically to the server • A witness can do that as well • This helps in minimizing pranks, if not completely countering it E-HAMC communication with the Cloud • E-HAMC does not entirely work on its own • The service utilizes the vastness of cloud computing as well • E-HAMC communicates the emergency event details to the cloud server • That data is used by relevant departments to further enhance the counter measures and plan • It also helps extend the service and provides basis for further services Contacts update • Since users are mobile, they can move to any location (another city or country) at any time • If the contact details of emergency dealing departments are different, they would be synced automatically through cloud Performance Evaluation • Performance is evaluated in the scenario when gateway communicates with the cloud • Data sets • Multimedia (audio/video file) • 20MB file • Represents the case when audio/video file is uploaded to the cloud • Bulk-data • 10MB, heterogeneous files • for the situation when images, location, text message, and other relevant data is uploaded in the cloud • Cloud has different scheduling algorithms for different types of files (Shortest-Job-First, FIFO, etc.) • No. of users • In the evaluation results on 86 different instances are presented • Overall, the evaluation was lasted for 6 weeks, during weekends and weekday, to ensure network conditions and server load do not significantly affect the performance • Final results are average of the total evaluation data • Scenarios • End node to fog • End node to cloud (without fog) End node to Fog - Upload delay • An average of 7.84 seconds duration is required to upload the 20MB video or multimedia data to the Fog Data size 20MB Upload delay 7.84 seconds End node to Fog – Bulk-data Upload delay • An average of 4.4 seconds duration is required to upload the 10MB bulk-data, consisting of heterogeneous files, to the Fog Data size 10MB Upload delay 4.4 seconds End node to Cloud – Upload delay • An average of 69.3 seconds duration is required to upload the 20MB multimedia file to the Fog Data size 20MB Upload delay 69.3 seconds Synchronization delay – within Cloud • When an already existing data is relocated or renamed • When multiple parties work in collaboration Data size All Synchronization delay 4 seconds Synchronization delay for collaborative work ~ 9 seconds End node to Cloud – Bulk-data Upload delay • An average of 27.82 seconds duration is required to upload the 10MB bulk-data, consisting of heterogeneous files, to the Fog Data size 10MB Upload delay 27.82 seconds Bulk-data Synchronization delay – within Cloud • When an already existing data is relocated or renamed • When multiple parties work in collaboration Data size All Synchronization delay 9 seconds Conclusion • The world is growing very fast, so are the emergency situations • Notifying in time helps rescue and recovery quick and avoid making the damage more severe • Many deaths are caused because of delayed or unprofessional response • A simple and efficient mechanism is required in this regard • E-HAMC provides a way to notify and analyze the situation in a much more efficient yet details manner • It utilizes the enormity of cloud computing which makes the ultimate services more enhanced, useful, and quick References • [1] Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Cloud of Things: Integrating Internet of Things with Cloud Computing and the Issues Involved”, in the proceedings of 11th IEEE IBCAST, Islamabad, Pakistan, 14-18 January, 2014.. • [2] Mohammad Aazam, Pham Phuoc Hung, Eui-Nam Huh, “Smart Gateway Based Communication for Cloud of Things”, In the proceedings of 9th IEEE ISSNIP, Singapore, 21-24 April, 2014. • [3] Mohammad Aazam, Eui-Nam Huh, "Fog Computing and Smart Gateway Based Communication for Cloud of Things", in the proceedings of IEEE Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 27-29 August, 2014. • [4] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli, "Fog Computing and Its Role in the Internet of Things", in the proceedings of ACM SIGCOMM, August 17, 2012, Helsinki, Finland. • [5] Jrad, Foued,et al. "SLA based Service Brokering in Intercloud Environments." CLOSER. 2012. • [6] Rogers, Owen, and Dave Cliff. "A financial brokerage model for cloud computing." Journal of Cloud Computing 1.1, 1-12, 2012. • [7] Shadi Ibrahim, Bingsheng He, Hai Jin, “Towards Pay-As-You-Consume Cloud Computing”, IEEE International Conference on Services Computing, Washington, USA, July 4-9, 2011. • [8] Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud", Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012. • [9] http://en.wikipedia.org/wiki/List_of_countries_by_traffic-related_death_rate • [10] http://www.who.int/violence_injury_prevention/road_safety_status/2013/en/ • [11] http://www.bbc.com/news/world-30086435 • [12] http://www.ibtimes.co.uk/top-five-countries-highest-rates-kidnapping-1441648 • [13] http://www.businessinsider.com/top-20-countries-by-kidnapping-2013-12 Questions • [email protected] Thank You
© Copyright 2024