skip to main content
10.1145/3434770.3459731acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Edgedancer: Secure Mobile WebAssembly Services on the Edge

Published: 26 April 2021 Publication History

Abstract

Edge computing brings services and data closer to their users. It targets applications where low latency is key, such as cloud-based gaming, augmented reality, and connected cars. In these scenarios mobile users are often the norm, and services need to follow their users to continuously ensure the benefits of edge computing. Mobile edge computing addresses this demand, however, we identified three open challenges: First, edge computing facilities are sparse so far and achieving good connectivity requires a seamless transfer of workloads between different edge providers. Second, migration of edge services needs to be lightweight to make relocation transparent to users. Third, using geo-distributed edge resources of various providers demands for security measures to ensure service integrity and confidentiality.; B@We present E'dgedancer, a platform that offers infrastructure support for portable, provider-independent, and secure migration of edge services. E'dgedancer offers a lightweight and generic execution environment by utilising WebAssembly, which features an efficient, easy to transfer bytecode format. To make edge services self-migratable, and independent from the provider, E'dgedancer supports the notion of mobile agents offering weak and strong migration support. It utilises trusted execution to ensure the security of edge services during execution and migration. Finally, we shows that E'dgedancer features a lower migration time compared to previously proposed virtual machine migration while offering better security and platform independence.

References

[1]
Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'keeffe, Mark L Stillwell, et al. [n.d.]. SCONE: Secure linux containers with intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation 16).
[2]
T. Benjaponpitak, M. Karakate, and K. Sripanidkulchai. [n.d.]. Enabling Live Migration of Containerized Applications Across Clouds. In IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[3]
Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield. [n.d.]. Live Migration of Virtual Machines. In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05).
[4]
Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive (2016), 86.
[5]
David Goltzsche, Manuel Nieke, Thomas Knauth, and Rüdiger Kapitza. 2019. Acctee: A webassembly-based two-way sandbox for trusted resource accounting. In Proceedings of the 20th International Middleware Conference.
[6]
Robert S. Gray. [n.d.]. Agent Tcl: A Flexible and Secure Mobile-Agent System. In Fourth Annual USENIX Tcl/Tk Workshop.
[7]
Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, and Jinming Li. [n.d.]. Secure live migration of SGX enclaves on untrusted cloud. In 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[8]
Andreas Haas, Andreas Rossberg, Derek L Schuff, Ben L Titzer, Michael Holman, Dan Gohman, Luke Wagner, Alon Zakai, and JF Bastien. [n.d.]. Bringing the web up to speed with WebAssembly. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM.
[9]
Danny B. Lange and Oshima Mitsuru. 1998. Programming and Deploying Java Mobile Agents Aglets (1st ed.). Addison-Wesley Longman Publishing Co., Inc.
[10]
A. Machen, S. Wang, K. K. Leung, B. J. Ko, and T. Salonidis. 2018. Live Service Migration in Mobile Edge Clouds. IEEE Wireless Communications 25 (2018).
[11]
Shripad Nadgowda, Sahil Suneja, Nilton Bila, and Canturk Isci. [n.d.]. Voyager: Complete container state migration. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[12]
Carlo Puliafito, Carlo Vallati, Enzo Mingozzi, Giovanni Merlino, Francesco Longo, and Antonio Puliafito. [n.d.]. Container migration in the fog: A performance evaluation. Sensors 19 ([n. d.]).
[13]
Paulo Souza Junior, Daniele Miorandi, and Guillaume Pierre. [n.d.]. Stateful Container Migration in Geo-Distributed Environments. In CloudCom 2020 - 12th IEEE International Conference on Cloud Computing Technology and Science.
[14]
Tarik Taleb, Adlen Ksentini, and Pantelis Frangoudis. 2016. Follow-me cloud: When cloud services follow mobile users. IEEE Transactions on Cloud Computing (2016).
[15]
Shangguang Wang, Jinliang Xu, Ning Zhang, and Yujiong Liu. 2018. A survey on service migration in mobile edge computing. IEEE Access 6 (2018).
[16]
Qi Zhang, Quanyan Zhu, Mohamed Faten Zhani, Raouf Boutaba, and Joseph L Hellerstein. 2013. Dynamic service placement in geographically distributed clouds. IEEE Journal on Selected Areas in Communications 31, 12 (2013).

Cited By

View all
  • (2024)NimbleNet: Serverless Computing for the Extreme Edge in Factory EnvironmentsProceedings of the 10th International Workshop on Serverless Computing10.1145/3702634.3702953(19-24)Online publication date: 2-Dec-2024
  • (2024)Wappler: Sound Reachability Analysis for WebAssembly2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00025(249-264)Online publication date: 8-Jul-2024
  • (2024)Extreme Edge Computing Challenges on the Edge-Cloud Continuum2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE59415.2024.10667328(99-100)Online publication date: 6-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
EdgeSys '21: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking
April 2021
84 pages
ISBN:9781450382915
DOI:10.1145/3434770
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Edge Computing
  2. Trusted Computing
  3. WebAssembly

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

EuroSys '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 10 of 23 submissions, 43%

Upcoming Conference

EuroSys '25
Twentieth European Conference on Computer Systems
March 30 - April 3, 2025
Rotterdam , Netherlands

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)78
  • Downloads (Last 6 weeks)12
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)NimbleNet: Serverless Computing for the Extreme Edge in Factory EnvironmentsProceedings of the 10th International Workshop on Serverless Computing10.1145/3702634.3702953(19-24)Online publication date: 2-Dec-2024
  • (2024)Wappler: Sound Reachability Analysis for WebAssembly2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00025(249-264)Online publication date: 8-Jul-2024
  • (2024)Extreme Edge Computing Challenges on the Edge-Cloud Continuum2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)10.1109/CCECE59415.2024.10667328(99-100)Online publication date: 6-Aug-2024
  • (2023)Enabling Trusted TEE-as-a-Service Models with Privacy Preserving Automatons2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom)10.1109/CloudCom59040.2023.00048(252-260)Online publication date: 4-Dec-2023
  • (2022)A fast in-place interpreter for WebAssemblyProceedings of the ACM on Programming Languages10.1145/35633116:OOPSLA2(646-672)Online publication date: 31-Oct-2022
  • (2022)Security risks of porting C programs to webassemblyProceedings of the 37th ACM/SIGAPP Symposium on Applied Computing10.1145/3477314.3507308(1713-1722)Online publication date: 25-Apr-2022
  • (2022)Towards Trustworthy Edge Intelligence: Insights from Voice-Activated Services2022 IEEE International Conference on Services Computing (SCC)10.1109/SCC55611.2022.00043(239-248)Online publication date: Jul-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media