EP-4736368-A1 - METHODS AND APPARATUS TO INCREASE PRIVACY FOR FOLLOW-ME SERVICES
Abstract
Methods, apparatus, systems, and articles of manufacture to migrate cloud-based workloads are disclosed. An example instructions cause programmable circuitry to at least cause transmission of anonymized information corresponding to a user device to a network device; and cause migration of a virtual execution environment from a first compute device to a second compute device based on a response from the network device, the virtual execution environment to execute at least a portion of a workload for an end user device.
Inventors
- THYAGATURU, Akhilesh
- Kesavan, Vijay Sarathi
- AGERSTAM, Mats
Assignees
- INTEL Corporation
Dates
- Publication Date
- 20260506
- Application Date
- 20231220
Claims (20)
- 1. A machine readable storage medium comprising instructions to cause programmable circuitry' to at least: cause transmission of anonymized information corresponding to a user device to a network device; and cause migration of a virtual execution environment from a first compute device to a second compute device based on a response from the network device, the virtual execution environment to execute at least a portion of a workload for the user device.
- 2. The machine readable storage medium of claim 1, wherein the instructions cause the programmable circuitry' to generate an evaluation key, the evaluation key to facilitate processing of the anonymized information without decrypting the anonymized information.
- 3. The machine readable storage medium of claim 2, wherein the evaluation key is to facilitate the processing of the anonymized information without the network device determining at least one of a location of the user device or an identity 7 of the user device.
- 4. The machine readable storage medium of claim 1, wherein the instructions cause the programmable circuitry to encrypt location information corresponding to the user device using an oblivious encryption technique, the encrypted location information included in the anonymized information.
- 5. The machine readable storage medium of claim 4, wherein the instructions cause the programmable circuitry to encrypt the location information after a location of the user device has changed by more than a threshold amount.
- 6. The machine readable storage medium of any one of claims 1-5, wherein the instructions cause the programmable circuitry to determine the second compute device based on the response from the network device.
- 7. The machine readable storage medium of any one of claims 1-5, wherein the instructions cause the programmable circuitry to track a location of the user device.
- 8. The machine readable storage medium of any one of claims 1-5, wherein the instructions cause the programmable circuitry to: obfuscate user traffic information corresponding to the user device; and cause transmission of the obfuscated user traffic information to the network device.
- 9. The machine readable storage medium of any one of claims 1-5, wherein the instructions cause the programmable circuitry' to: decry pt the response from the network device to identify candidate edge computing devices; and determine the second computing device based on at least one of a capability of the second computing device, a capacity' of the second computing device, or a location of the second computing device.
- 10. An apparatus to migrate cloud-based workloads, the apparatus comprising: interface circuitry; machine readable instructions; and programmable circuitry’ to at least one of instantiate or execute the machine readable instructions to: cause transmission of anonymized information corresponding to a user device to a network device; and cause migration of a virtual execution environment from a first compute device to a second compute device based on a response from the network device, the virtual execution environment to execute at least a portion of a workload for the user device.
- 11. The apparatus of claim 10, wherein the programmable circuitry is to generate an evaluation key, the evaluation key to facilitate processing of the anonymized information without decrypting the anonymized information.
- 12. The apparatus of claim 11, wherein the evaluation key is to facilitate the processing of the anonymized information without the network device determining at least one of a location of the user device or an identity of the user device.
- 13. The apparatus of claim 10, wherein the programmable circuitry is to encry pt location information corresponding to the user device using an oblivious encryption technique, the encrypted location information included in the anonymized information.
- 14. The apparatus of claim 13, wherein the programmable circuitry is to encry pt the location information after a location of the user device has changed by more than a threshold amount.
- 15. The apparatus of any one of claims 10-14, wherein the programmable circuitry is to determine the second compute device based on the response from the network device.
- 16. The apparatus of any one of claims 10-14, wherein the programmable circuitry is to track a location of the user device.
- 17. The apparatus of claim 10, wherein the programmable circuitry is to encrypt identification information corresponding to the user device, the encry pted identification information included in the anonymized information.
- 18. The apparatus of any one of claims 10-14, wherein the programmable circuitry is to: obfuscate user traffic information corresponding to the user device; and cause transmission of the obfuscated user traffic information to the network device.
- 19. The apparatus of any one of claims 10-14, wherein the programmable circuitry is to: decrypt the response from the network device to identify candidate edge computing devices; and determine the second computing device based on at least one of a capability of the second computing device, a capacity of the second computing device, or a location of the second computing device.
- 20. A machine readable storage medium comprising: interface circuitry to cause transmission of anonymized information corresponding to a user device to a network device; and edge device selection circuitry to cause migration of a virtual execution environment from a first compute device to a second compute device based on a response from the network device, the virtual execution environment to execute at least a portion of a workload for the user device.
Description
METHODS AND APPARATUS TO INCREASE PRIVACY FOR FOLLOW-ME SERVICES BACKGROUND [0001] In recent years, edge compute nodes have been implemented to execute tasks to provide services for end user devices. For example, when a user utilizes a service provided by a service provider (also referred to as a third-party service provider), instead of the edge compute node(s) execute the task(s) and provide the outputs to the end user device. In this manner, the resources of the end user device are conserved. If an end user device is a mobile device (e.g., a smart phone, a tablet, a laptop, etc.), the end user device can move away from the edge compute node that is currently executing the tasks for the end user device. As the end user device moves farther from the edge compute node, the performance, quality, experience, of the user of the service decreases (e.g.. latency increases, throughput decreases, etc ). BRIEF DESCRIPTION OF THE DRAWINGS [0002] FIG. 1 illustrates an overview of an edge cloud configuration for edge computing. [0003] FIG. 2 illustrates operational layers among endpoints, an edge cloud, and cloud computing environments. [0004] FIG. 3 is a block diagram of an example environment for networking and services in an edge computing system. [0005] FIG. 4 illustrates deployment of a virtual edge configuration in an edge computing system operated among multiple edge nodes and multiple tenants. [0006] FIG. 5 illustrates various compute arrangements deploying virtual execution environments in an edge computing system. [0007] FIG. 6 illustrates an example compute and communication use case involving mobile access to applications in an example edge computing system. [0008] FIG. 7 is a block diagram of an example system described in conjunction with example teachings disclosed herein to increase privacy for follow-me services. [0009] FIG. 8 is a block diagram of an example implementation of the processor circuitry' of FIG. 7. [0010] FIG. 9 is a block diagram of an example implementation of the radio access network intelligent controller circuitry' of FIG. 7. [0011] FIG. 10 is a flowchart representative of example machine readable instructions and/or operations that may be executed, instantiated, and/or performed by programmable circuitry to implement the example processor circuitry' of FIG. 8 and/or the example radio access network intelligent controller of FIG. 9. [0012] FIG. 11 is a block diagram of an example processor platform including programmable circuitry structured to execute, instantiate, and/or perform the computer readable instructions and/or perform the example operations of FIG. 10 to implement the example radio access network intelligent controller of FIG. 9. [0013] FIG. 12A is a block diagram of an example implementation of an example compute node that may be deployed in one of the edge computing systems illustrated in FIGS. 1 and/or 7. [0014] FIG. 12B is a block diagram of an example processor platform including programmable circuitry structured to execute, instantiate, and/or perform the computer readable instructions and/or perform the example operations of FIG. 10 to implement the example processor circuitry of FIG. 8. [0015] FIG. 13 is a block diagram of an example implementation of the programmable circuitry of FIGS. 8 and/or 9. [0016] FIG. 14 is a block diagram of another example implementation of the programmable circuitry' of FIGS. 8 and/or 9. [0017] FIG. 15 is a block diagram of an example software/firmware/instructions distribution platform (e.g., one or more servers) to distribute software, instructions, and/or firmware (e.g., corresponding to the example machine readable instructions of FIG. 10 to client devices associated with end users and/or consumers (e.g., for license, sale, and/or use), retailers (e.g., for sale, re-sale, license, and/or sub-license), and/or original equipment manufacturers (OEMs) (e.g., for inclusion in products to be distributed to, for example, retailers and/or to other end users such as direct buy customers). [0018] In general, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts. In general, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts. The figures are not necessarily to scale. DETAILED DESCRIPTION [0019] Descriptors "first," "second," "third," etc. are used herein when identifying multiple elements or components which may be referred to separately. Unless otherwise specified or understood based on their context of use, such descriptors are not intended to impute any meaning of priority or ordering in time but merely as labels for referring to multiple elements or components separately for ease of understanding the disclosed examples. In some examples, the descriptor "first" may be used to refer to an element in the detailed description, while the same element may be referred to