ArticlePDF Available

A review on Fog Computing: Issues, Characteristics, Challenges, and Potential Applications

Authors:

Abstract

Fog computing is a paradigm that utilizes the advantages of both the cloud and the edge devices providing quality services, reducing latency, providing mobility support, multi-tenancy, and many other functions that support modern computing systems. It is sometimes referred to as fog networking or fogging. This paper reviews and discusses cloud computing, briefly highlighting the implemented paradigms before fog computing. These paradigms include cloud, mobile cloud computing, and mobile edge computing. All the paradigms targeted improving the quality of service between the end devices and the cloud itself. A fog computing Taxonomy is presented based on contemporary fog computing research about security challenges, services issues, operational issues, and data management. The standard for elucidating the taxonomy is built on the functional and vital issues in fog computing. Challenges and potential applications are identified. The review shows that security, privacy, application, and communication challenges are prominent among scholars contributions. Potential applications in fog computing are also identified, including healthcare applications, innovative city applications, and farm applications.
Telematics and Informatics Reports 10 (2023) 100049
Contents lists available at ScienceDirect
Telematics and Informatics Reports
journal homepage: www.elsevier.com/locate/teler
A review on fog computing: Issues, characteristics, challenges, and
potential applications
Resul Das
a
, Muhammad Muhammad Inuwa
a
,
b
,
a
Department of Software Engineering, Technology Faculty, Firat University, Elazig, Türkiye.
b
Department of Software Engineering, Federal University Dutse, Jigawa State, Nigeria
Keywords:
Fog computing
Edge computing
Internet of Things (IoT)
Cyber security
Security threats
Fog computing is a paradigm that utilizes the advantages of both the cloud and the edge devices providing qual-
ity services, reducing latency, providing mobility support, multi-tenancy, and many other functions that support
modern computing systems. It is sometimes referred to as fog networking or fogging. This paper reviews and dis-
cusses cloud computing, briey highlighting the implemented paradigms before fog computing. These paradigms
include cloud, mobile cloud computing, and mobile edge computing. All the paradigms targeted improving the
quality of service between the end devices and the cloud itself. A fog computing Taxonomy is presented based
on contemporary fog computing research about security challenges, services issues, operational issues, and data
management. The standard for elucidating the taxonomy is built on the functional and vital issues in fog comput-
ing. Challenges and potential applications are identied. The review shows that security, privacy, application, and
communication challenges are prominent among scholars contributions. Potential applications in fog computing
are also identied, including healthcare applications, innovative city applications, and farm applications.
1. Introduction
Nowadays, the pointer of the trending paradigm is pointing at fog
computing. As eciency and quality of service stand as important ob-
jectives in the world of computing, security also continues to be a con-
cern. Before the fog, cloud computing was viewed as a promising ap-
plication due to its exible and scalable nature. Dierent stakeholders,
which include IBM, Microsoft, Google, Amazon, and others, enabled dif-
ferent cloud-based services to steer educational and enterprise compu-
tations concurrently. Some of these services include Software as a Ser-
vice (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service
(PaaS). But the cloud feature of being centralized became an obstacle
to latency-sensitive computations [1] . The increasing demand for cloud
computing services from IoT devices is prone to the ineciency of some
basic computing and communication requirements; these include loca-
tion awareness, mobility support, and low latency [2] . The signicant
challenges that obstruct IoT devices’ service quality today include com-
putational energy, battery durability, storage capacity, and bandwidth.
To compensate for the burden of IoT devices’ limited resources, the gi-
ant became the answer —that is, employing the services of the robust,
capable of dealing with the limitations. Cloud computing is thought to
be the hope for service delivery with exible resources at a low cost [3] .
However, latency, location awareness, geo-distribution, and security are
some issues of disturbance that led to the introduction of fog computing.
Corresponding author.
E-mail addresses: rdas@rat.edu.tr , resuldas@gmail.com (R. Das), muhammad.m@fud.edu.ng (M.M. Inuwa) .
According to the OpenFog Consortium
[4] , Edge devices face two sig-
nicant challenges from all cloud services. These are; 1) The data that
the IoT devices are creating is growing exponentially, which will cause
network congestion and drive performance problems at the edge of in-
frastructure. 2) There are many tasks for which a cloud-only solution
is insucient due to factors such as performance, security, bandwidth,
reliability, and many others. Performance control is the primary con-
cern in fog computing; latency and eciency have contributed to its
success.
1.1. Main contributions
Dierent research has been presented with a signicant amount of
eort dening and describing fog computing, each contributing to a
separate area of the paradigm. Many review and survey papers have
been published to provide general and classied issues in fog comput-
ing. Fifty (50) research papers have been studied thoroughly and ref-
erenced in Table 1 . This paper aims to provide a comprehensive ap-
proach to understanding the face of fog computing and the challenges
engulng the paradigm. Additionally, the article will provide a basic un-
derstanding and direction to researchers on the trending issues bedev-
iling the paradigm due to its being an intermediary between the cloud
and the edge. More specically, the contributions of this paper are the
following:
https://doi.org/10.1016/j.teler.2023.100049
Received 10 July 2022; Received in revised form 22 January 2023; Accepted 26 February 2023
2772-5030/© 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license
( http://creativecommons.org/licenses/by-nc-nd/4.0/ )
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 1
Existing review papers in literature.
Ref. Year Objectives and Topics Main Lesson Learned Contributions
[3] 2015 The denition of fog computing and related ideas
were examined. It identies several potentials and
challenges of fog computing.
Integration of SDN and NFV into the fog
paradigm will improve the fog’s services.
Fog computing concepts, applications, and
challenges in design and implementation.
[2] 2016 analyze fog computing applications concerning
real-time systems and broaden their motivation and
advantages. A discussion of security and privacy
issues are also included.
One factor that makes fog computing
susceptible to network attack is its
environment.
The advantages of fog computing in dierent areas
and a thorough discussion of security issues.
[1] 2018 examined the issues in fog computing and its current
state of the art. A taxonomy was provided based on
the stated issues and their fundamental attributes.
It is clear that even with the advances in the
fog paradigm, many insucient inputs are
required to improve its services.
Discussion on fog and other paradigms dierences,
challenges, and the presentation of taxonomy based
on the stated challenges.
[8] 2017 It provides a concise overview of the fog computing
architecture, key technologies, applications,
challenges, and unresolved issues.
The advent of fog computing has improved
the services of cloud computing.
Furthermore, there will be more to cultivate
with the invention of 5G technology.
a presentation of the characteristics of fog
architecture, a comparison of fog with edge and
cloud, a discussion of key technologies, and an
exploration of some problems and open topics
[12] 2020 Provided a comprehensive study of fogedge
computing to establish a baseline for solutions
oered in studies involving IoTFogCloud
environments.
Articial intelligence and machine learning
will improve fog computing services.
The article provided a baseline for solutions oered
in research involving IoT-Fog-Cloud environments
and examined the concepts, architectures, standards,
and tools for IoT-Fog-Cloud.
[57] 2018 The article gives an insight into the state of fog
computing, including concerns and challenges.
The fog computing security threats originate
from the cloud, as it is an extension of the
cloud, so the inheritance.
The article provided a summary of the fog’s security
and privacy issues.
[17] 2015 It provides a survey on fog computing challenges
and their matching solutions in a concise fashion.
Fog’s uniqueness attracted new challenges
apart from the inherited. Additionally, SDN
can be employed to help in managing the fog
nodes.
A discussion on various security and privacy
challenges in fog computing.
[5] 2018 The architectures of fog computing are discussed
and analyzed in this paper, as well as the security
and trust problems. Furthermore, open issues,
research trends, and future topics are highlighted.
One factor that makes fog computing
vulnerable to security threats is its nature of
being distributed and open-structured.
The contribution includes a specic analysis of fog
architecture, a summary and discussion of open
security and trust challenges, and future research
work.
[20] 2018 The concepts and ideas of the Fog paradigm, as well
as associated paradigms and technologies, were
discussed.
Cloudlets and Mobile Edge Computing are
more technologies that make up the larger
Fog paradigm.
The signicant contribution consists of providing
some broad basic information and perhaps some
constructive critique.
[58] 2018 Fog computing research trends, potential
architectures, and distinctions from cloud computing
were examined. A taxonomy is proposed, as well as
specic research gaps and genuine concerns.
A fog node can be any device with
computational power, network capacity, and
storage capacity.
The fog computing research trend was examined.
Dierent architectures of fog computing were
analyzed and provided a comprehensive
architecture. A taxonomy, research gaps, some
research aws, and open issues.
[59] 2018 The article reviewed basic fog architecture,
summarized service, resource allocation approach,
challenges, and research trends. And also about
current network applications.
Even though fog computing is a feasible
option for the long-term development of the
IoT industry, there are still numerous
unresolved diculties.
The logical relationship between dierent algorithms
and approaches in fog computing was presented, as
well as an organization of resource sharing, research
challenges in fog radio access network architecture,
and an organization of resource sharing.
[60] 2018 The paper assesses advancements in fog computing
using a simple criterion that covers architectures
and algorithms. Also, many issues and research
directions are being discussed.
The use of fog computing extends beyond IoT. A comprehensive analysis of fog computing, its
diculties, the signicance of fog in new
technologies, and future research prospects.
[14] 2019 Fog computing was compared with other relevant
concepts in this paper. A taxonomy is presented, and
a summary and categorization of works on fog
computing and other paradigms, obstacles, and
future research objectives.
Fog computing is one of the potential options
for dealing with the massive amounts of data
generated by the Internet of Things.
The article presented a lesson on fog computing and
its relationship to other systems, as well as a
taxonomy and overview of fog computing issues and
future directions.
[61] 2018 The study included a taxonomy, discussions on fog
architectures, technologies, features, security and
privacy, and diverse work done on them. Future
study areas and limitations are also discussed.
fog computing oers a wide range of
applications. As they are designed with the
necessary criteria, 5G cellular networking
components, for example, may readily
function as fog nodes.
The article oered an overview of fog computing,
taxonomy and the limits of previous works, future
research paths, and unique research challenges.
[62] 2019 The goal of this work is to provide a comprehensive
overview of fog computing, including the present
state-of-the-art.
Even the broad acceptance of fog computing
still suers from missing standards, node
ownership, limited simulation tools, etc.
The most signicant contribution to this work is
providing up-to-date fog computing technology.
[63] 2019 It provided an analysis of 876 journals and
conferences relevant to fog computing and discussed
the present state of research and issues in fog
computing.
There is a need to focus more on fog
computing’s eciency rather than its
robustness.
The article discussed the distinctions between fog
and cloud computing, an examination of fog-related
publications and conferences, and the current state
of research and its challenges.
[64] 2018 The paper provided an overview of fog computing’s
denition, architecture, potentials, and twelve
proposed applications. Also, the issues and future
research potential in fog computing are examined.
Integration of machine learning into fog
computing can improve its quality of service
and scalability.
The article presented an overview of fog’s denition,
contrasted its architecture and potential with cloud
computing, identied major fog implementations,
and emphasized obstacles and future research
possibilities.
[65] 2020 The study examines and discusses fog computing, as
well as identifying needed challenges and other
concerns. However, a potential research area is
being discussed.
The future of computing and automation will
rely heavily on fog computing, which will be
critical in emerging networks such as the IoT
and big data.
The study presented an overview and synopsis of fog
computing and a description of the problems and
future research issues.
( continued on next page )
2
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 1 ( continued )
[66] 2016 The paper examines the essential features of fog
computing, current research, and the constraints and
concerns that have arisen throughout the
advancement of its architecture.
Because fog is deployed at the network’s
edge, it is more exposed to security attacks.
The study examined the fundamental characteristics
of fog and emphasized the issues and concerns in the
development architecture.
[67] 2018 The study delves into the notion of fog computing,
addresses the signicant roadblocks to adoption, and
identies open research problems.
There is a long way to go in fog computing,
as some obstacles can hinder the adoption of
the paradigm, and it may incur a high cost of
implementation.
The article explored the notion of fog computing,
the barriers to its implementation, and open
research issues.
[68] 2021 The paper categorized recently published studies,
analyzed the fog’s current state, addressed
characteristics of fog computing frameworks and
found diculties linked to their architectural design,
provided taxonomy, and emphasized research
obstacles and prospects.
The advancement of fog computing will
trigger other paradigms integrated under its
domain for eective services.
The study reviewed fog computing research,
addressed current research status, presented a
taxonomy, compared previous studies, and
emphasized research obstacles and prospects.
Our Paper This paper reviews and discusses cloud computing,
highlighting the implemented paradigms before fog
computing. Taxonomy is proposed based on
contemporary fog computing research about security
challenges, services issues, operational issues, and
data management. Challenges and potential
applications are identied.
The paper shows that security and privacy
and application and communication
challenges are very prominent among the
scholars contributions.
The article provided a brief understanding of fog
computing, proposed a taxonomy, highlighted
trending issues and challenges, and discussed some
potential applications.
1. A brief but rich insight into fog computing.
2. A taxonomy based on research’s contemporary fog computing view-
points concerning security challenges, service issues, operational is-
sues, and data management.
3. A highlight of the trending issues and challenges in fog computing.
4. The paper underlined some of the potential applications of fog com-
puting.
The paper is organized as follows. In Section 3 , the background of
fog computing is introduced, which includes a review of cloudlet, mo-
bile cloud computing, mobile-edge computing, and fog computing archi-
tecture. Related works are summarised in 4 , which reviews the recent
articles on fog computing. Section 5 discusses the security threats of fog
computing, focusing more on the most troubling and those inherited
from the cloud. Section 6 presents the application areas of fog comput-
ing, providing a brief understanding of the fog’s presence in the area. In
Section 7 , issues and challenges in fog computing are being discussed.
The taxonomy of fog computing is proposed in the section. While 8 pre-
sented potential applications, the work is concluded in 9 .
2. Search methodology
This section describes the process for gathering papers and classify-
ing them according to dierent stages in the issues, characteristics, chal-
lenges, and potential applications of fog computing. Writing a review
article that is knowledge-rich requires nding, compiling, categorizing,
and reviewing numerous pertinent papers.
2.1. Search process and data collection
Online search databases are scoured as part of the search procedure.
This article used the following databases as research sources: Scopus,
Web of Science, Science Direct, ACM Digital Library, Semantic Scholar,
Springer Link, ArXiv e-print, and IEEE Xplore Library. During the search
process, a lot of terms were utilized, including ”cloud, ”or ”cloud com-
puting, ”or ”fog, ”or ”fog networking, ”and ”edge computing ”or ”edge
networking.
2.2. Inclusion criteria
The nal publication selection was ltered using the inclusion and
exclusion criteria after these keywords were used in relevant internet
databases. During the ltration process, the following inclusion crite-
ria were considered when choosing articles: English-language publica-
tions, high-impact journals, and conference publications; also included
are papers that look at mathematical frameworks, strategies, or models
for resource-intensive fog computing and related subjects.
2.3. Exclusion criteria
The following exclusion criteria were also taken into consideration
in addition to the inclusion criteria mentioned above: Publications that
are duplicated in the databases. Publications lacking in-depth coverage
of fog computing. Publications that outline already analyzed proposed
techniques The most recent publication is considered in this situation.
3. Background on fog computing
Fog computing is a promising paradigm that provides computational
services at the network edge, enabling new services and applications
for the Internet’s future [5] . Compared with other paradigms, such as
cloudlets, mobile cloud computing (MCC), and mobile edge computing
(MEC), fog computing has a better placement position as it is deployed
closer to the IoT nodes. Additionally, it supports the extension of cloud-
based services. Thus, it helps provide ecient services, including signif-
icant minimization of latency [1] . However, fog computing’s existence
does not replace the cloud service; somewhat, it improves it [5] . Con-
sidering the concept of edge and cloud computing, many computing
paradigms have already started to be used in computing technology.
Several computing paradigms have previously been created in com-
putation technology, taking the concepts of Edge and Cloud computing
into account. Mobile Edge Computing (MEC) and Mobile Cloud Com-
puting (MCC) are examples of prospective cloud and edge computing
developments. MEC is widely considered a critical enabler of the cur-
rent development of cellular base stations. At the same time, MCC oers
the processing resources required to facilitate the remote execution of
ooaded mobile applications closer to end users. Fog computing, like
MEC and MCC, can also enable edge computation. In addition to the
edge network, fog computing may extend to the core network. To be
more specic, edge and core networking components may be employed
as processing infrastructure in fog computing [1] . Fig. 1 presents a com-
parative gure that provides a quick insight into the dierences and
functions of the stated paradigms.
3.1. Cloudlet
Cloudlet is usually a tiny box data center, mounted at a wireless hop’s
distance from the mobile devices in a public place such as hospitals, of-
ce buildings, and shopping malls, to ease an appropriate application
[6] . A cluster of powerful multicore computers with high-speed inter-
net access and a high-bandwidth wireless LAN for use by surrounding
3
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Fig. 1. Computation domain of cloud, fog, edge, mobile cloud and mobile edge computing [1]
mobile devices make up the internal structure of a cloudlet. To assure
security in unsupervised regions, the cloudlets are housed in a tamper-
resistant box for safety reasons [7] . Cloud computing has eectively
processed data due to its powerful computational ability and sucient
storage capacity. Although cloud computing is a centralized system, this
necessitates transmitting all the requests and the data to the cloud for
processing. That brings ineciency to the cloud’s bandwidth, which in
turn becomes a problem for real-time processes due to the delay in trans-
ferring the data [8] . suggested that not all data require decision-making
and analysis. These challenges are due to the massive growth of IoT,
which needs eciency in latency, network bandwidth, reliability, and
security, depending on cloud computing, which cannot be suciently
met. In the search for a solution to the stated challenges, the cloudlet
was proposed to bring the resources closer to the edge devices to make
local processes and storage. Additionally, it would reduce the rate of
network transmission and latency [8] .
3.2. Mobile cloud computing
Mobile Cloud Computing (MCC) is another technology proposed to
provide a new framework with services to mobile subscribers by tak-
ing maximum advantage of cloud computing. Some operations and an-
alytical tasks are carried out on the edge device while the coordination
and data archiving are carried out on the cloud [8] . Mobile devices’
constraints on computational resources, storage, and energy engineered
the introduction of MCC. At the network’s edge, MCC frequently deploys
small, lightweight cloud servers known as ”cloudlets. ”A three-tier hi-
erarchical application deployment architecture for rich mobile apps is
developed using cloudlets in conjunction with mobile devices, and cloud
data centers [1] .
Mobile Cloud Computing combines all of the benets of cloud com-
puting, mobile internet, and mobile computing. Mobile cloud computing
allows the use of resources based on a request; these include network,
server, mobile application, storage, and computing resources in the mo-
bile environment. In MCC architecture, the cloud servers are placed far
away from the edge devices, making it inecient in a network environ-
ment with high computational requirements [6] .
3.3. Mobile-edge computing
Mobile-Edge Computing (MEC) is a technology introduced to allow
mobile users access to the cloud and other information technology ser-
vices within close range of the Radio Access Network (RAN). The prin-
cipal target of MEC is to minimize latency by transferring storage and
4
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Fig. 2. Cloudlet Architecture.
Fig. 3. Mobile cloud computing architecture.
Fig. 4. Mobile-edge computing architecture.
computational capacity from the core network to the edge network. Mo-
bile Edge Computing is a model for enabling a business-oriented cloud
computing platform within the radio access network at the proximity of
mobile subscribers to serve delay-sensitive, context-aware applications
[1,6,9] .
MEC has been seen as one of the leading providers of the following
modern development of cellular base stations. It allows cellular base
stations and edge servers to run in tandem [1] . It also delivers real-time
RAN information (network load, user location, and network conges-
tion) to the application developers and content developers. This real-
Fig. 5. Fog computing architecture.
time network information provides context-sensitive services to mobile
subscribers, increases user satisfaction, and improves the quality of ex-
perience (QoE). MEC strengthens the edge network responsibility by
allowing the services and the computational activities to be carried out
at the edge network level to reduce the subscribers’ network latency and
bandwidth consumption. The technology allows the network operators
to let a third party handle the radio network edge; this paves the way
for the ow of new applications and edge services to the mobile sub-
scribers. MEC’s primary goal is to deliver applications and services with
low latency, and low bandwidth [10] .
3.4. The architecture and the environment of fog computing
Fog computing is not an independent paradigm but an extension of
cloud services to the edge. The fog environment comprises three layers:
the terminal layer, the fog layer, and the cloud layer, while the archi-
tecture consists of combinations of fog nodes [8] . Additionally, the fog
has the capacity to process data locally with a desirable latency [11] .
3.4.1. Terminal layer
This layer comprises dierent end devices, which are geographically
distributed. These devices take the responsibility of fetching data and
conveying it to a higher-level layer for data processing and storage. The
devices might include wearable devices, sensors, intelligent vehicles,
mobile phones, and others [8,12] .
3.4.2. Fog layer
This layer stands between the cloud and the terminal layer, situated
at the network’s edge. This layer device is known as a ”fog node, ”and
it is capable of data transmission, computation, and storage [13,14] . A
fog node can be mobile or non-mobile and placed in a xed, strategic
location. Some examples of these devices include access points, routers,
fog servers, switches, base stations, etc. The computational ability of
this layer optimizes the services of latency-sensitive applications, allow-
ing real-time processing and analysis to be realized. In addition, the
fog nodes’ proximity to the end devices allowed them to communicate
eectively. Moreover, the extension of cloud services to the fog layer al-
lowed the fog nodes to have increased computational, and storage power
[8,12] .
3.4.3. Cloud layer
This layer comprises storage devices and servers with high perfor-
mance and computational power. It is responsible for executing non-
latency-sensitive jobs sent by the lower layer (fog layer) [8] . Software,
platforms, and infrastructure are available as services in the cloud. Cloud
services include, for instance, IaaS and PaaS-based server hosting pro-
vided by DigitalOcean, network storage provided by Apple iCloud, IaaS
5
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
and PaaS-based server hosting provided by Google App Engine, and vir-
tual IT services provided by Amazon EC2 [12] .
Fog computing is a scenario where a vast number of heterogeneous
(wireless and sometimes autonomous) ubiquitous and decentralized de-
vices communicate and potentially cooperate among themselves and
with the network to perform storage and processing tasks without the
intervention of third parties [13] . These tasks can support basic network
functions or new services and applications that run in a sandboxed en-
vironment. Users who lease part of their devices to host these services
get incentives for doing so [3] .
Delay, eciency, agility, cognition, and the advent of the Internet
of Things (IoT), which requires mobility support and geo-distribution
[13] are the driving factors behind the call for fog computing. Further-
more, privacy, fault tolerance, and reliability are dened as among the
benets of fog computing [15] . As the cloud keeps growing with numer-
ous nodes requiring a quick response, the problems of location aware-
ness, mobility support, and latency remain [7] . Implementing the Fog
computing paradigm became a solution to the stated cloud problems
[5] . The control of data privacy using the cloud computing technique
can be complex as the data has to be transmitted outside the local net-
work boundary. However, for fog, there is only a need to transmit the
data to locally connected fog nodes [16] .
3.5. Characteristics of fog computing
The identied characteristics of fog computing include heterogene-
ity of fog nodes, and fog networks, the massive scale of geo-distributed
nodes, location awareness, the requirement of mobility support, and low
latency [17] .
3.5.1. Low latency
This refers to the minimal time to respond, analyze, and execute the
computational request. The fog nodes’ proximity to the edge devices
helps lead to faster computation tasks and analysis responses.
3.5.2. Heterogeneous end-user support
End-user support is maximized as the requesting IoT device is closer
to the processing node [13,18] .
3.5.3. Multi-tenancy
Refers to the ability of a system where multiple instances access and
share a single instance of the software. These systems are referred to as
shared systems. The fog platform embraced this because it is distributed
and highly virtualized.
3.5.4. Mobility support
It is a function that allows registering and deregistering IoT devices
from one access point to another. As missing or delayed data while the
device is on the move could be damaging, mobility support is an essen-
tial requirement for mobile IoT systems [19] . Thus, requiring unmedi-
ated transmission between the fog node and the IoT device [20] .
3.5.5. Real-time interaction
Real-time refers to a system that is required to respond within a spe-
cic time frame (deadline). This type of application in fog computing in-
cludes real-time e-health, trac transmission, airlines, industry-critical
process monitoring systems, and others. In addition, for providing qual-
ity of service (QoS), fog computing chooses real-time transmission over
batch processing [13,18] .
3.5.6. Context-awareness
This function allows fog nodes to learn about their networks through
fetching information, which can help the node execute certain decisions.
3.5.7. Wide geographical distribution
The architectural design of fog computing equipped the paradigm
with the ability of wide geographical distribution to ensure the delivery
of QoS [18,20] .
3.5.8. Wireless access network
This concerns wireless sensing systems that access network services
using the Wireless Access Protocol (WAP).
3.5.9. Interoperability and federation
To improve openness and interoperability in fog computing systems,
cover open standards, equipping third-party systems with the ability to
execute models and processes using web service calls, while at the same
time the results can be spread for the use of other services [3] .
3.5.10. Real-time analytic
Fog computing’s real-time analytics refers to gathering, examining,
and acting on data as it is generated rather than delaying its transmission
to a central point for processing. Instead of relying on a centralized data
center, this is accomplished by positioning small, lightweight computer
units closer to the data source at the network’s edge. The data can be
processed locally by these devices, which transfer the essential data to
the cloud for additional analysis. As a result, data processing can be done
more quickly and eectively, with less latency and bandwidth usage
[13] .
3.5.11. Support for industrial applications
With this function in fog computing, industries can be upgraded with
eective and ecient connection and communication. Data can also be
streamed through the fog node layer. If connected to a collection of
nearby sensors and actuators, a fog node at the bottom of the hierarchy,
for instance, one found on a single machine, can assess the data, inter-
pret an anomaly, and then, if given permission, autonomously react and
correct the issue [21] .
3.5.12. Broad-based sensor networks
This is intended to monitor the environment of the fog; another ex-
ample of an inherently distributed system that calls for distributed pro-
cessing and storage resources is the Smart Grid [13] .
3.5.13. Large population of nodes
This refers to the enormous number of nodes on the fog’s network
due to broad geo-distribution, as shown by sensor networks generally
and the Smart Grid specically [13] .
3.6. Different topics in fog computing research
A distributed computing paradigm known as fog computing often
referred to as ”edge computing, ”puts networking, storage, and comput-
ing capabilities closer to the network’s edge, where data is generated
and consumed. By lowering the latency and bandwidth needs for data
transmission and enabling real-time data processing at the edge of the
network, it aims to alleviate the constraints of conventional cloud com-
puting. In fog computing, some crucial topics include:
3.6.1. Resource scheduling
The act of allocating and managing resources (such as processing
power, storage, and network bandwidth) on fog nodes to satisfy the
needs of the applications and services they host is known as resource
scheduling in fog computing [13] . Utilizing optimization methods, such
as genetic algorithms, to determine the best resource allocation for a
given collection of applications and services is one resource scheduling
method in fog computing. Another option to forecast and enhance how
resources are used in real-time is to employ machine learning techniques
like neural networks [22–24] .
6
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
3.6.2. Task scheduling
Task scheduling in fog computing is the process of planning when
tasks should be completed on fog nodes while taking into account vari-
ables like resource availability, task location, and application or service
requirements [25] . One task scheduling method in fog computing uses
heuristic methods, such as the Ant Colony Optimization (ACO) algo-
rithm, to determine the best schedule for a given set of jobs. Game the-
ory, like the Stackelberg game, is another method for determining the
most eective approach to scheduling jobs by simulating how fog nodes
and their users interact [26,27] .
3.6.3. Load balancing
In fog computing, load balancing refers to dividing workloads and
resources among several devices in the fog network to maintain optimal
performance and prevent the overloading of any one unit. This can be
accomplished using various methods, including IP hashing, least connec-
tions, and round-robin. In conclusion, load balancing in fog computing
is essential to ensure adequate resource use and avoid network bottle-
necks [27,28] .
3.6.4. Offloading
The process of moving data and tasks from devices (such as smart-
phones or IoT devices) to fog nodes, which are placed closer to the edge
of the network, is known as ooading in fog computing. This makes pro-
cessing quicker and less demanding on the cloud. By keeping sensitive
data inside the fog network, ooading can also increase security and
privacy. Fog computing ooading improves the network’s eectiveness
and performance as a whole [29,30] .
3.6.5. Allocation
A distributed computing technology called fog computing brings
computation and data storage closer to users. In this paradigm, numer-
ous edge devices share resources like processing power, storage capac-
ity, and network bandwidth. To ensure that the system can meet end
users’ expectations while using resources eectively, fog computing re-
lies heavily on resource allocation [27,31,32] .
3.6.6. Resource management
Resource management in fog computing is the process of managing
and regulating the resources present in the system. This entails distribut-
ing resources to various programs, keeping an eye on how they’re being
used, and making sure the system can handle the demands of the end
users. For the system to be eective and trustworthy, resource manage-
ment is essential [7,29,30] .
3.6.7. Resource estimation
The process of guring out the resources (such as processing speed,
storage capacity, and bandwidth) accessible at a specic fog node is
known as resource estimate in fog computing. Decisions on where to
deploy apps and services and how to distribute resources to satisfy the
needs of various users and devices are made using this information [14] .
3.6.8. Green fog computing
Fog computing is used in ”green fog computing ”to minimize the
impact of computing systems on the environment and to conserve en-
ergy. This can be accomplished through a variety of strategies, including
power management, energy-ecient computation, and the utilization of
renewable energy sources [14,33,34] .
3.6.9. Security
The rules and policies implemented to safeguard information and
equipment in a fog computing environment are referred to as fog com-
puting security. This entails defending against cyber threats, including
hacking and malware, securing device connection, data storage, and
processing. Implementing access limits and keeping an eye out for ques-
tionable activity are also involved. The integrity, accessibility, and con-
dentiality of data and devices inside the fog computing ecosystem are
the main objectives of fog computing security [7,29,35] .
3.6.10. Privacy
Fog computing privacy refers to safeguarding private information
and data that is processed, communicated, and stored by fog comput-
ing systems. This includes ensuring data availability, condentiality,
integrity, and compliance with pertinent rules and laws. Encryption,
access restrictions, and system activity monitoring are a few privacy
safeguards in fog computing. In general, fog computing privacy aims to
maintain data security as it travels across and is processed by the fog
computing network [7,29,36,37] .
3.6.11. Data management
Fog computing is the decentralized method of storing, processing,
and analyzing data via edge devices and gateways. This eliminates the
need to send data to centralized cloud servers for processing and enables
real-time data processing, and analysis [1,7,37] .
3.6.12. Energy management
Fog computing entails the utilization of renewable energy sources
to power these devices while also optimizing the energy usage of edge
devices and gateways. Consequently, fog computing systems use less
energy overall and leave a smaller carbon imprint [1,38–40] .
3.6.13. Quality of service
The capacity to deliver a certain degree of performance for a given
service or application is referred to as quality of service (QoS). For ap-
plications and services to be supplied with the required level of per-
formance, reliability, and security in fog computing, quality of service
(QoS) is crucial [29,41,42] .
3.6.14. Mobile fog computing
A form of fog computing called ”mobile fog computing ”is created
specically for usage in moving cars or on portable electronic devices.
This kind of fog computing enables data processing and storage closer to
the data source, which can enhance application and service performance
and security [14,43,44] .
3.6.15. Cloud-fog integration
combines cloud and fog computing to create a hybrid computing
environment. Through this integration, it is possible to access the cloud’s
processing and storage resources while using fog computing resources
that are located closer to the network’s edge [45–47] .
3.6.16. Networking
In a fog computing environment, ”networking refers to data ex-
change and communication between various devices and components.
The fog nodes that gather and analyze the data must be connected to
edge devices, such as sensors and cameras, as well as the cloud or other
distant servers [1] . In fog computing, several essential technologies and
protocols allow networking. To connect edge devices to fog nodes, for
instance, low-power wireless protocols like Zigbee and LoRaWAN are
frequently employed. Additionally, data is transferred between devices
and nodes using industry-standard communication protocols, including
TCP/IP, MQTT, and CoAP. Security is a crucial component of network-
ing in fog computing. Encryption, authentication, and access control are
just a few security techniques used to safeguard data from illegal access
or manipulation. Overall, networking in fog computing is essential for a
fog computing environment’s ecient operation since it allows for the
secure and seamless movement of data between devices and components
[3] .
3.6.17. Fog device virtualization
The method of operating many virtual machines (VMs) on a single
physical fog device is known as fog device virtualization [14] . This en-
ables the separation of various applications or services and the eective
use of resources. Additionally, it enables the rollout of new services or
changes without aecting already-running services. Fog device virtual-
ization uses programs like OpenFog and OpenVirtex as examples [48] .
7
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
3.6.18. Application and service placement
The process of choosing the best location for hosting applications
and services within a fog computing environment is referred to as ap-
plication and service placement. This entails determining the ideal edge
device or fog node to host the application or service and the resources
required to run it [14] .
3.6.19. IoT Data processing
Fog computing technology handles and analyzes data produced in
real time by IoT devices. This is known as IoT data processing. This
comprises pre-processing, ltering, and aggregation of data using fog
nodes or edge devices, as well as analysis and interpretation of the data
using machine learning techniques [1,7,14] .
3.6.20. Reliability-aware
Reliability-aware fog computing systems are created to make sure
that data and services remain accessible and available even in the case of
network outages or other interruptions. Techniques like storing data in
many locations, distributing the load, and having fail-over mechanisms
can be used to achieve this [29,49–52] .
3.6.21. Delay-aware
The idea behind delay-aware fog computing is that the fog nodes
(also known as edge devices) in a fog computing architecture are made
aware of the delay requirements of the applications they are supporting
and utilize this knowledge to decide where to process data and how to
route data between nodes. This can enhance the overall performance of
the fog computing system and lessen the overall end-to-end delay that
consumers encounter [29,53–55] .
3.6.22. Context-aware
Fog computing systems’ capacity to dynamically adapt to the vary-
ing circumstances and context of their operating environment is called
”context-aware fog computing. ”The location, time, and resources avail-
able, as well as the particular demands and specications of the appli-
cations and devices linked to the fog network, are all included [42] .
Context-aware fog computing systems use machine learning and other
cutting-edge technologies to continuously monitor and analyze the envi-
ronment and make in-the-moment changes to the resources and services
the fog network oers. As a result, apps and devices that rely on the fog
network operate more eectively and eciently using their resources.
Overall, context-aware fog computing is a crucial idea that might sig-
nicantly enhance the functionality and eectiveness of linked devices
and applications while also assisting businesses in better use of their
resources [1,42] .
3.6.23. Mission critical application execution
Since data doesn’t need to travel far to reach a centralized data
center, fog computing enables mission-critical applications to process
and make decisions more quickly. Fog computing can decrease latency,
boost dependability, and speed up response times in mission-critical
applications. Industrial control systems, driverless vehicles, and emer-
gency response systems are a few examples of mission-critical applica-
tions that can prot from fog computing [56] .
3.6.24. Proactive service discovery
In fog computing, proactive service discovery is detecting and identi-
fying resources and services in the fog network before they are required.
This decreases latency and enhances overall performance by enabling
quicker and more eective access to these resources. There are many
ways to implement proactive service discovery, including employing
machine learning algorithms to forecast future resource requirements
or continuously checking and updating the network’s resource avail-
ability. In general, proactive service discovery in fog computing enables
more eective and ecient use of resources, improving performance
and decreasing delays [1] .
4. Related works
In this section, reviews and research articles published in recent
years on Fog Computing are examined and analyzed in detail. Then,
each is presented under separate headings by examining them as
Table 1 and Table 2 .
4.1. Analysis of review papers
Fog computing has received considerable contributions from dier-
ent topics. Taxonomies are presented from dierent views, where all the
views might be valid depending on the industrial and/or researcher’s
needs. Dierent papers contributed to the services provided by the fog,
which included security, privacy, application, and communication. Fur-
thermore, this paper reviews the paradigms before the fog to provide a
clear and brief understanding and then proposes a uniquely categorized
taxonomy based on the fog’s contemporary research about security chal-
lenges, service issues, operational issues, and data management. More-
over, challenges and applications with future potential are identied.
Table 1 below provides a comparative analysis between this article
and the existing survey papers. The stated contributions of the paper
are used as comparative attributes. The selection method was rened
using a custom range from 2015 to date and concentrated on articles
that focus more on general fog computing.
4.2. Analysis of research papers
After examining current works and contributions in fog comput-
ing, several researchers have proposed a fog computing taxonomy with
diverse points of view and classications. For example, [61] catego-
rized the academics’ contributions based on the system-level designs
and frameworks of fog computing, meeting the demands of end users,
the technological aspect, security and privacy, QoS, and application.
Another taxonomy is provided based on the problems mentioned in
the articles, which include fog node setup, nodal collaboration, re-
source/service provisioning networks, service level objectives, suitable
networking systems, and security considerations [1] . This continues
with the surveys that oered a fog computing taxonomy utilizing multi-
ple parameters to construct the taxonomy. Our Taxonomy is presented
based on the contemporary fog computing research on security chal-
lenges, services issues, operational issues, and data management. The
standard for elucidating the taxonomy is built on the functional and vi-
tal issues in fog computing. Table 2 below provides the highlights of the
papers used in concluding.
5. Security threats of fog computing
Most of the fog computing applications are inuenced by their crav-
ing for functional services and or the user needs, ignoring security re-
quirements, or considering them as second thoughts [114] . Security
challenges in fog computing were not given proper attention [82] . With
the inheritance of cloud computing security challenges, fog computing
might be vulnerable to exploitation [57] . Security in the OpenFog RA is
not a one-size-ts-all architecture. Rather, it describes all of the mech-
anisms that can be applied to make a fog node secure from silicon to
software application [12] . Many scholars have been trying to propose
solutions in dierent areas of fog computing. However, the issue of secu-
rity in fog computing is still a bedeviling problem in both academic and
industrial environments [72] . Additionally, the security solution imple-
mented on cloud computing may not be eective on fog computing as
they both work from dierent layers and their architecture diers [8] .
Fog computing is prone to security attacks as it is built on a tradi-
tional network. Authentication and privacy can be troubling issues in
Fog. Fog node collaboration might pose security threats on the network
as an infected node can infect others [5] . Security exposure in fog com-
puting is termed very high for its environment lies between cloud data
8
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 2
A taxonomy of the research papers in fog computing.
A taxonomy of the research papers in Fog Computing
Ref. Aim and Objectives Used Technology Application Tools Results Domain
[69] A team of scholars has proposed an
application meant to help provide and
implement a Quality of Experience (QoE)
policy by prioritizing application
placement requests based on user
projections and computing the ability of
Fog instances in consideration of their
present condition.
Fuzzy logic rules,
and multi-constraint
single objective
optimization
technique.
iFogSim, Fog nodes,
cloud data center,
and edge devices.
The results from the simulation indicated
that the proposed policy outperformed
the other policies in goal achievement.
That remarkably enhances data
processing time, service quality, network
congestion, and resource aordability.
Context Awareness
[70] Proposed a multi-tier architectural design
named Fog Computing Architecture
Network, in which it integrates the
applications running on IoT devices and
cooperatively directs, computes, and
communicates with each other through
the smart city environment.
Fog Network
Architecture, wired
and wireless
technology
iFogSim, Fog Nodes
(FNs), and IoT
devices.
The outcome shows a decrease in latency,
improved provision of energy, and
eective application management.
Context Awareness
[71] The paper presented a fog computing
context-aware framework for the
intelligent transport system, providing
multiple intelligent systems to support
services with the ability to extend to IoT
services.
Cloud, fog, edge
computing paradigm
Fog nodes, cloud
gateways, and edge
devices (vehicles).
The result showed that the proposed
CFC-ITS is resilient in real ITS
applications.
Context Awareness
[72] The paper proposed a context-aware
framework to address the shortcomings in
accessing and controlling data and
information resources from multiple
sources.
Fog computing
paradigm, and
modeling.
Web Ontology
Language,
Description Logics,
and Protg-OWL
graphical.
The result was a positive outcome, which
is eective, exible, and implementable.
Context
Awareness/Privacy,
Security and Trust
[73] The paper proposed a general architecture
and a proof-of-concept structure using fog
computing to implement mobility
applications in the vehicular and ad-hoc
networks (VANET) environment to take
care of trac inconsistency detection and
the estimation of travel time.
Vehicular and
ad-hoc Networks
(VANET), cloud, and
fog computing.
On-Bord system
Units, Road Side
system Units, fog
nodes, and cloud
data center.
The results indicated that even with a
small data set, the applications could allot
reliable information quickly. It’s possible
to use fog nodes’ computing abilities and
communication. They can be deployed in
real-time.
Context
Awareness/Service
and Application
[74] The scholars proposed an architecture to
provide services which include city-wide
trac modeling and prediction built on a
fog computing model.
Deep learning
technique, and fog
computing.
Control plane, data
store, analytical
engine, and fog
nodes.
The results revealed that executing data
processing in fog nodes provides strong
back-haul connectivity. Also, the
forecasting system and trac modeling
behavior are more appealing when
executed in the fog than in the cloud.
Context
Awareness/Service
and Application
[75] The paper proposed the implementation
of Ubiquitous Resource Management for
Interference and Latency-Aware services
(URMILA) for managerial decisions on
dynamic resources for achieving
successful trade-os between fog and
edge resources while ensuring that IoT
service latency requirements are met.
Cloud, fog, and edge
computing
paradigm.
Centralized data
center (cloud),
Micro-data center
(fog node), and edge
devices.
A new approach for managing resources
over the cloud, fog, and edge spectrum
has been developed.
Context-Awareness
[76] The scholars presented a conceptual
architecture that accounts for context
changes by adding a node controller
feature that, when context changes are
identied, triggers relocation behavior on
dedicated processing components.
Lightweight
container
technology, dataow
programming
pattern, cloud, fog,
and edge computing.
Virtual machines,
processing elements
(PE), and
interconnections.
A fog cluster management system that
spans the cloud-edge spectrum.
Context-Awareness
[77] The IoT-BSFCAN platform is proposed for
continuously monitoring the smart
environment via smart computing devices
over cloud-enabled networks.
Cloud, and fog
computing
paradigm.
Fog nodes, cloud
servers, and edge
devices.
The illustrative result shows that the
proposed IoT-BSFCAN system
outperforms the other alternative
solutions in terms of ecient execution.
Context-Awareness
[78] The paper proposes MobMBAR, a
mobility-aware task scheduling, and
allocation approach. It distributes
healthcare activities between cloud and
fog devices in a dynamically balanced
manner.
Cloud, fog
computing
paradigm, hand o,
WiFi,
Cloud data center,
fog nodes, and
sensors.
The proposed solution ensures QoS by
executing healthcare tasks on time and
allowing the execution of heterogeneous
healthcare tasks with varying processing
speeds, data sizes, and numbers.
Context-Awareness/
Services and
Applications
[79] the paper proposed an energy- and
performance-aware vehicular fog
distributed computing approach to
eciently process IoT jobs using a
cluster-enabled capacity-based load
balancing approach.
Cloud, and fog
computing
paradigm.
vehicles, the
state-of-the-art NS2
simulator, fog nodes,
and cloud data
center.
The proposed scheme achieves balanced
network energy usage, decreased network
latency, and increased network eciency,
according to the results.
Context-Awareness/
Services and
Applications
( continued on next page )
9
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 2 ( continued )
A taxonomy of the research papers in Fog Computing
Ref. Aim and Objectives Used Technology Application Tools Results Domain
[80] Implementation of fog computing
approach to tackling DDOS attacks on the
Industrial Internet of Things (IIoT).
Cloud, fog, network
function
virtualization (NFV),
and Modbus
protocol.
Industrial devices,
IIoT controllers,
serial
communication
devices, onsite
cameras, and trac
simulators.
The Fog computing approach has been
implemented successfully on a testbed to
handle the DDoS attack on IIoT, to
improve the real-time response and device
computational capabilities of the IIoT.
Privacy, Security
and Trust
[81] The scholars proposed a protocol for
authentication between cloud, fog, and
edge devices using key initiation.
The 3-layered
architecture of
cloud-fog-edge, and
encryption
techniques.
Scyther simulator,
cloud data center,
fog nodes, and edge
devices.
The security proposal claimed to provide
maximum protection against the relevant
attacks. However, the proposed protocol
is more eective in computation and
communication.
Privacy, Security
and Trust
[82] The scholar proposed a security
architecture model handling privacy
preservation in fog computing, utilizing
the support of device-to-device
communication, and introduced three
lightweight anonymous authentication
protocols (LAAPs).
Cloud, fog,
lightweight
cryptography,
one-way function,
and exclusive OR
operations.
Edge devices,
Network Access
Devices (Fog nodes),
and Centralized
cloud server.
The proposed system is claimed to provide
eective security and be realizable on IoT
devices with limited resources.
Privacy, Security
and Trust
[83] A system is proposed in which DDoS
attack trac is created with various tools
and then routed through the fog defender
to the cloud, and identies and lters
DDoS attack trac directed at the cloud.
Cloud computing
and Fog computing.
Cloud data center,
fog nodes, Linux,
and windows
systems.
Recorded success as the Cloud server only
forwarded valid requests. Response times
and resource usage in the cloud have
increased.
Privacy, Security
and Trust
[84] The paper proposed a method for
detecting DDoS attacks and eciently
provisioning resources in a cloud
environment using fog computing and an
ecient algorithm to service cloud
requests by intermediate fog servers
eectively.
Cloud and fog
computing
Cloud server and fog
servers
The majority of requests are delivered by
the intermediate fog layer, which detects
and mitigates harmful trac.
Privacy, Security
and Trust
[85] The paper centered on the extension of
the Attribute Based Access Control
(ABAC) model. A new prediction model
was proposed. It describes the
authentication process of fog computing
access control’s uncertainty problem.
Decision Tree,
Random Forest, and
Logistic Regression.
Machine learning.
MATLAB,
sci-kit-learn package,
and Python.
The model outperforms other algorithms
in terms of accuracy while having a
reduced computational cost.
Privacy, Security
and Trust
[86] Focusing on the randomness of HTTP GET
requests for every source IP address, a
unique approach for detecting
application-layer DDoS attacks is
suggested.
Hyper Text Transfer
Protocol (HTTP),
and time series.
Support Vector
Machine (SVM),
Adaptive
Autoregressive
(AAR), NS-2 network
simulator and Linux
platform.
The results suggest that this method may
eciently detect application-layer DDoS
assaults.
Privacy, Security
and Trust
[87] The scholars implemented a technique
using fog computing to improve medical
data security.
Cloud, fog
computing, and
Advance Encryption
Standard (AES).
Fog nodes, edge
devices, and cloud
data centers.
The implementation result shows that
medical data security can be improved
using fog computing.
Privacy, Security
and Trust
[36] To safeguard IoT data, this article
presents a decentralized access control
system based on blockchain and fog
computing technology.
Fog, blockchain,
mixed and nonlinear
spatiotemporal
chaotic systems, and
the least signicant
bit.
IoT devices, and
edge nodes.
The technique’s experiments showed that
this could eectively secure the privacy of
IoT data.
Privacy, Security
and Trust
[88] Using fog computing technology, the
researchers suggested the FONICA (Fog
Node as an Intermediate Certication
Authority) certicate verication
technique.
Cloud and Fog
computing.
Fog nodes and edge
devices.
When compared to other recently
presented systems, the proposed system
yields ecient results based on storage
and transmission overhead characteristics.
Privacy, Security
and Trust
[89] The paper focused on preserving privacy
in vehicular crowdsensing. Designed a
two-tier architecture for fog computing
that could be used in fog-based vehicular
crowd sensing systems and proposed a
secure approach for data collection that
could maintain both privacy and access
control and data traceability.
Fog computing, and
Cloud computing
paradigm.
Cloud data centers,
data requesters, fog
buses, Participating
vehicles, and trust
authorities.
According to the paper, the simulation of
the proposed approach showed that the
approach is ecient in both
communication and computation.
Privacy, Security
and Trust/Service
and Application
[90] To safeguard data and manage mobility,
the paper provided a data protection
paradigm for fog computing by
implementing a Region-Based
Trust-Aware (RBTA) and a Fog-based
Privacy-aware Role-Based Access Control
(FPRBAC).
Cloud, and fog
computing
paradigm.
Cloud data center,
fog nodes, and edge
devices.
The model’s viability and eciency were
proven by the results of the experiments.
Privacy, Security
and Trust/Service
and Application
( continued on next page )
10
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 2 ( continued )
A taxonomy of the research papers in Fog Computing
Ref. Aim and Objectives Used Technology Application Tools Results Domain
[91] Designed an IoT architecture based on
cloud and fog computing, and then
proposed a system for how to place the
IoT data into the cloud and fog data
centers of the stated architecture.
Cloud, and fog
computing
paradigm.
Cloud and fog
computing data
centers, and IoT
nodes.
Designed an IoT architecture based on
cloud and fog computing and then
proposed a system for placing the IoT
data into the cloud and fog data centers of
the stated architecture.
Service and
Application
[92] The purpose of the study is to provide a
resource provisioning scheme for
partitioning a given workload between
multiple computing layers that are subject
to reliability and real-time requirements.
Virtual Machine,
1-to-2 mapping, and
fog computing.
gEDF scheduler,
Compositional
Schedulability
Analysis (CSA),
AUTOSAR-based
application.
The software tool can allow the designers
to decide on the minimum number of
local servers that can be harmonized with
the fog nodes for the execution of
real-time jobs. It can also help the
designer select the appropriate bandwidth
size linking the factory and the cloud data
center.
Service and
Application
[93] The paper focused on task scheduling of
fog-based IoT applications to minimize
term service delays and computation costs
under resource and deadline limitations.
Double Deep
Q-Learning (DDQL)
algorithm, Task
Scheduling Scheme,
and First come, rst
serve (FCFS).
Cloud, fog
Computing, virtual
Machine, Fog Nodes,
Cloud Data Centers,
IoT devices, Keras,
and SimPy.
Based on the experimental results, the
proposed algorithm trades between
transmission, propagation, waiting, and
execution delays of tasks by allocating
each incoming task to more suitable VMs.
Service and
Application
[94] Dual energy sources were employed to
power the fog nodes, with solar power as
the primary source and grid power as
backup. An analytic framework for
integrating green energy sources was
presented to support IoT and fog
computing-based systems operation. Also,
LOTEC (Lyapunov Optimization on Time
and Energy Cost) was developed.
Cloud, fog systems,
Lyapunov
optimization, and
discrete event
simulation.
SimPy, cloud
servers, fog servers,
and edge devices.
The proposed algorithm appears to be
promising based on the simulation
performance.
Service and
Application
[95] The scholars proposed an Energy-Ecient
Cluster Routing Method for Cross-Layer
Sensing. The algorithm projects fog nodes
onto the sensing layer using a
sensing-event-driven mechanism and
creates a strong virtual control node. The
Particles Swarm Optimization algorithm
was introduced to select a group of
optimal nodes to serve as cluster heads.
Fog, clustering
technique, PSO
algorithm, and
Wireless Sensor
Networks.
Fog nodes, and
sensors.
The proposed ECCM algorithm performed
wonderfully. As a result, the proposed
ECCM algorithm’s ecacy and reliability
have been demonstrated.
Service and
Application
[96] In fog computing, a mixed-task approach
was introduced to solve the joint
computation and communication resource
allocation challenge.
Fog computing,
Logistic regression,
Split-spectrum, and
Quasi-static.
Fog nodes and end
users (devices)
The suggested approach could provide a
considerable increase in energy eciency,
according to the ndings.
Service and
Application
[97] A tree-based fog computing (TBFC) model
is proposed for distributing processes and
data to servers and fog nodes in the IoT,
with the goal of lowering node total
electricity consumption.
Tree-based fog
computing model
and tree-based cloud
computing model.
Edge devices
(sensors and
actuators), fog
nodes, and cloud
servers.
The overall electric energy consumption
of nodes in the TBFC model is lower than
in the cloud computing model, according
to the assessment.
Service and
Application
[98] A mobile caching network with
energy-ecient edge nodes called
CachinMobile was proposed by leveraging
social networking and device-to-device
communication.
Cloud Computing,
Fog Computing,
Wired
communication, and
Wireless
Communication.
Edge node, fog
servers, base station,
routers, and cloud
servers.
The proposed paradigm is claimed to have
signicantly improved energy eciency
while maintaining the quality of service.
Service and
Application
[40] The scholars proposed an energy-ecient
caching and node association algorithm
for cache-aided fog networks.
Caching technology
and node-to-node
communication.
Fog nodes, and
access points.
The technique outperforms the standard
caching strategy in terms of energy
eciency when the modulation modes
and caching are implemented
simultaneously.
Service and
Application
[99] This paper develops a three-layer
ooading architecture for the intelligent
Internet of Vehicles (IoV) to reduce total
energy consumption while meeting users’
delay constraints. The formulated
problem is divided into two sections: 1)
ow redirection and 2) ooading
decision, and then solved using a deep
reinforcement learning-based scheme.
Three-layer network
model, Fog
computing, and deep
reinforcement
learning-based
scheme.
Fog nodes (vehicles),
cloudlets, and
roadside units
(RSUs).
The success of the approaches is
demonstrated by performance assessment
based on real-world footprints, whereby
the energy usage may be reduced by
roughly 60 percent compared to the
default algorithm.
Service and
Application
[100] The paper covered some of the
fundamental issues that a system architect
can think about when developing,
implementing, and deploying an
end-to-end healthcare framework that
incorporates IoT nodes and cloud
computing backend resources and takes
advantage of the Fog computing
approach.
Cloud, and fog
computing
paradigm.
mobile devices,
wearable and
sensors, Spark IoT
Platform Core, cloud
data center, and fog
nodes.
Because of the large number of networked
devices, comprehensive solutions are
required to eectively tackle the
diculties of massive data transfer across
network nodes.
Service and
Application
( continued on next page )
11
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 2 ( continued )
A taxonomy of the research papers in Fog Computing
Ref. Aim and Objectives Used Technology Application Tools Results Domain
[101] The study suggests a smart home
approach based on fog computing to
provide an optimal healthcare
environment for domesticated animals.
Cloud, fog systems,
wireless
communication
protocol, SSL,
credential mapping,
and CNN.
Cloud data centre,
fog nodes, sensors,
IoT devices.
According to the comparison results, the
proposed model outperformed other
state-of-the-art approaches for veterinary
healthcare provisioning.
Service and
Application
[102] The paper built an end-to-end Internet of
Things application that uses advanced
machine learning and data analytics
technology to control calves in real-time
and detect defective livestock early.
Cloud, fog
computing
paradigm, and
Message Queue
Telemetry Transport.
Radio-based Long
Range Pedometer
(sensor), fog nodes,
and cloud data
centre.
The ndings show that lameness can be
detected three days earlier than its
appearance. With fog computing, a
reduction in data transferred to the cloud
is recorded.
Service and
Application
[103] By utilizing dierent parameters, a
mechanism for task ooading to fog
nodes and cloud data centers was
presented.
Cloud, and fog
computing paradigm
(theoretically)
Cloud data centre,
fog nodes, and edge
devices
(theoretically)
The proposed technique proved ecient
theoretically.
Service and
Application
[104] An ooading standard depending on the
work’s computational requirements is
presented, where those with high
computational requirements are ooaded
to the fog. At the same time, those with
less are handled locally.
Cloud and fog
computing.
Cloud node, fog
node, and mobile
device.
In average latency, the load is
appropriately distributed between mobile
devices and the fog node at minimal
points.
Service and
Application
[105] Designed and proposed a platform called
Fog-as-a-Service, proposing a new
knowledge-centered and service-based
service model and granting the denition
of self-adaptive and composition-friendly
services, which can be implemented on
either the edge device or the cloud.
AWS Cloud platform,
AMI Linux. And a
Raspberry Pi 3
Single Board.
The testbed consists
of a root controller,
2 SPF platforms, a
Wireless Sensor
Network, and
Programmable IoT
Gateways.
The model oers signicant advantages
for self-adaptive and composition-friendly
fog services. An information-centered and
valuable service model presented by the
Fog-as-a-Service platform provides
aerodynamic development and
management.
Services and
Applications
[106] A proposal for secure computational
ooad in the IoT, fog, and cloud
environments to reduce latency and
energy consumption.
Cloud, fog, and
load-input data ratio
(LDR) to set the
dierences between
jobs with high
computational
intensity and those
without.
Smart gateway, IoT
mobile devices, Fog
nodes, a hybrid
cloud server, and
Network Simulator
(NS3.26) with Java
programming.
The Scholars’ Ooading Scheme proposal
shows signicant improvement compared
to the reviewed ooading schemes. It
executes ooading with minimal latency
and energy consumption. It also claimed
to be secure and eective in balancing the
tradeo between latency and energy
consumption.
Services and
Applications
[107] The scholars introduced Quantum
Computing-inspired (QCi), an optimized
technique for load scheduling in a fog
computing environment targeting
real-time IoT applications. Additionally,
the QCi-Neural Network Model was
integrated to predict and determine the
node with optimal computation to enable
real-time service delivery.
Fog computing,
Quantum
Computing-inspired
(QCi) and
QCi-Neural Network
Model.
Fog nodes, personal
computer and
iFogSim toolkit.
The result shows that the system
presented high eciency in predicting the
optimum fog node for tasks depending on
the availability of the respective node.
Services and
Applications
[16] The scholars give a comparison of cloud
and fog computing based on the reliable
performance and latency of
cyber-physical interfaces, using Industry 4
to execute real-time embedded machine
learning engineering applications.
Cloud, Fog
computing
paradigm, and
Amazon Web
Services (AWS).
Cloud server, fog
nodes,
PMML-encoded
machine learning
models, Jmeter,
wireless router,
OpenScoring engine,
Raspberry Pi3,
Python, Cylon BMS,
and OPC Driver.
The results showed that the fog computing
paradigm is more consistent, reliable, and
secure than the cloud paradigm.
Services and
Applications
[108] The paper proposed a fog-assisted health
monitoring system in consideration of the
services fog computing provides. These
include latency, network usage, and
power consumption.
Cloud, and fog
computing paradigm
WiFi, medi-
cal/environmental
sensors, actuators,
cloud server, fog
server, and an
application running
on the Raspberry Pi
Zero W board from
Adafruit.
The result indicated that the proposed
could help minimize data trac and
improve the system’s security as it can
hold private and sensitive data within the
organization.
Services and
Applications
[109] Experimented on the signal quality and
comfortability of electrocardiogram
(ECG), optimizing and balancing the
quality of signals and the comfort of
usage by the patient.
Fog computing
paradigm, knitting,
and
electrocardiogram.
Fog nodes, elastic
fabrics, and E7.2
STOLL CMS 530
computerized at.
The result shows that the material with
70% nylon ber coated silver and 30%
cotton provided well-balanced user
comfort and signal quality with less air
resistance.
Services and
Applications
[110] The aim was to nd the Fog Node with
the shortest delay, which was unknown at
the time, while also ensuring that
switching costs between Fog Nodes were
as low as possible.
Multi-armed bandits,
Block-based
technique, and
greedy selection
technique.
Python, fog node,
access points, and
edge devices.
The two methods considerably increase
fog node selection eciency, according to
the ndings.
Services and
Applications
( continued on next page )
12
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 2 ( continued )
A taxonomy of the research papers in Fog Computing
Ref. Aim and Objectives Used Technology Application Tools Results Domain
[111] For interconnected Fog–Cloud
environments, a prot-aware application
placement strategy was suggested. It is
formulated using a constraint Integer
Linear Programming model that
maximizes benets while maintaining
QoS when applications are placed on
computing instances. In addition, it
compensates customers for any breaches
of the Service Level Agreement (SLA) and
prices instances based on their willingness
to reduce service delivery time.
Cloud, fog system,
Integer Linear
Programming,
Application Protocol,
SNM Protocol, and
cybersecurity
frameworks.
Cloud datacentres,
fog nodes, iFogSim,
and edge devices.
The proposed policy increases gross and
net prot, wait time, and QoS satisfaction
rate. They also showed that heuristic
policy implementation gets you closer to
the best solution in the shortest time, and
their results justify fog instance pricing.
Services and
Applications
[112] In a real-world test-bed, the paper looked
at the impact of fog computing on
response time and Internet trac for a
WBSN-based (Wireless Body Sensor
Network) healthcare application.
Cloud, fog
computing
paradigm, and
delay-sensitive
application.
Cloud datacentres,
fog servers, sensors,
and mobile devices.
According to the ndings, the fog-based
architecture decreases response time and
Internet trac by 46 percent and 77
percent, respectively, compared to the
cloud.
Services and
Applications
[113] The paper presented how to secure a
prover’s position location privacy using
cryptographic protocols in the bounded
retrieval model.
Cryptography Bounded-retrieval
model, and a
personal computer.
The result indicated that the proposed
protocol is implementable.
Services and
Applications/
context-awareness
centers and the devices. The study shows that the security topic of dis-
cussion in fog computing is bending more on authentication, secured
data exchange, denial of service attacks, and privacy issues [1] . Limited
network visibility, ineective way of attack detection, absence of user
selective data collection, virtualization issues, multitenancy issues, and
malicious fog nod issues are some of the security and privacy challenges
in fog computing [115] . According to [82] , mutual authentication, se-
cure key exchange, and anonymity must be appropriately addressed to
provide adequate security and privacy in fog computing tiers. Addition-
ally, [72] stated that access control is one of the popular preventive
measures used in the cyberspace domain to protect against unautho-
rized access and reduce the eect of security breaks. These will guar-
antee a good quality of service in dierent IoT services [5] . added that
having the fog node as the rst processor that most of the time data en-
counter made it necessary for the nodes to have hardware root of trust
implemented to avert incessant rate of attacks.
5.1. Forgery
It is a kind of attack where the attacker tries to emulate a particular
node and fool the end-users into executing actions of his/her choice.
Unfortunately, that can aect the networks quality of service as it might
slow the performance through the excess use of bandwidth, storage, and
energy [57] .
5.2. Tampering
It is a type of attack where the attackers create a delay in data trans-
mission or drop the data, or even sometimes modify it. Due to the mobil-
ity nature of fog computing, this kind of attack becomes more dicult
to gure out the attack immediately, as the network itself can cause a
delay and failure in the data transmission [90] .
5.3. Spam
Spam is often used to describe undesired, trash communications de-
livered to an Internet user’s mailbox [116] . This attack is where the
attacker fools the victim with unwanted data to seize the opportunity to
use the victims network resource and expose privacy. Spam is seen as a
signicant danger to the Internet and society. Internet users are exposed
to security risks when they receive spam communications, and children
are exposed to unlawful and inappropriate information. Furthermore,
spam communications use necessary storage, bandwidth, and produc-
tivity resources.
5.4. Sybil
In a Sybil attack, an attacker generates many false identities, disrupts
the reputation system of network service, and exploits it disproportion-
ately to achieve a more signicant impact. The impersonating node is
referred to as the malicious node or Sybil attacker, while the identity
spoofed node is referred to as the Sybil node [117] . The harsh impact
of a Sybil attack is that it creates bogus crowdsensing reports since the
ndings produced by these reports are untrustworthy [57] .
5.5. Eavesdropping
This type of attack is sometimes called snooping or sning, where
the attacker monitors and steals the victims data over the network. Due
to the open nature of the channel, data transmission in wireless mode is
vulnerable to eavesdropping. As a result, the eavesdropper can decode
important private information [118] .
5.6. Denial of service
This attack denies the rightful users the right to access the net-
work. The attack preoccupies the network resources, which leads to the
poor performance of fog computing. Because fog nodes have limited re-
sources, they struggle to manage a high volume of concurrent queries.
Fog productivity might suer signicantly in this situation. Denial-of-
Service (DoS) attacks can be crucial in causing signicant service inter-
ruptions in fog computing. Fog nodes may be kept active for extended
periods by issuing many unrelated service requests simultaneously. As a
result, resources for hosting helpful services are no longer available [1] .
5.7. Collusion
This type of attack aims to cheat and or mislead a legitimate group
from accessing their rightful resources by cooperating with multiple
numbers of groups. Additionally, this attack can expose the victims se-
curity key for the attacker to access les and other documents [57] .
13
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
5.8. Man-in-the-Middle
As the name implies, the man-in-the-middle attack occurs when A
and B nodes communicate, and another node is in between them, ac-
tively observing, recording, and exercising control of the data in com-
munication transparently [119] . This attack will only require minimal
resources in Fog devices, such as low CPU and memory usage. As a
result, standard anomaly detection algorithms are unlikely to detect a
man-in-the-middle threat if no discernible characteristics of the attack
are acquired from the Fog [2] .
5.9. Impersonation
It is a type of attack in which the attacker successfully acquires the
identity of a legitimate fog node and executes the services as if it comes
from the genuine node. This type of attack has become a severe problem
in cloud systems due to the vast quantities of system resources, dierent
deployment patterns, and the dispersion of user audits and activities
across numerous virtual servers with diverse settings [120] .
5.10. Identity privacy
This type of privacy ensures the safety of the identity information
of the parties in communication. On the other hand, fog authentication,
which requires the users basic information, including name, address,
phone number, etc., might expose the user to a particular threat [57] .
5.11. Data privacy
They are also referred to as information privacy. It is responsible
for dening how the information can be handled appropriately. Poor
data privacy on fog networks can expose the user’s preferences and ide-
ologies to nodes that are not trusted. This can be controlled using the
proposed scheme of [121] , where a lightweight privacy-preserving ag-
gregation technique in fog computing is presented. The system is built on
the divide-and-conquer strategy. The suggested privacy method neces-
sitates data encryption, consisting primarily of lightweight symmetric
cryptographic operations, and encrypted data division depends on the
data-chosen owner’s level of privacy.
5.12. Usage privacy
This refers to the model or layout in which the user uses fog services,
ensuring the privacy of the user’s status and operational deals on the
network. One nave option would be for the fog client to create false
jobs and ooad them to several fog nodes, concealing its actual duties
amid the dummy ones. This method, however, will raise the fog client’s
payment while also wasting resources and energy. Another option would
be to devise a clever way of dividing the program to ensure that the
ooaded resource usages do not reveal sensitive information [17] .
5.13. Location privacy
It refers to the user’s ability to control their past and present location
access. As the fog supports mobility, the edge devices keep using the
current or saved location, where such exposure might make the user
vulnerable to some threats. One method for preserving location privacy
is identity obfuscation, which means that even if the fog node detects
the presence of a fog client nearby, the fog client cannot be identied
[5,17] .
6. Application areas of fog computing
Fog computing’s target is to decentralize the computational pro-
cesses and provide eciency to the IoT nodes. The Fog provides its
services at the LAN network layer [5] . Thus, exposing self to security,
trust, and privacy challenges as IoT devices and data keep growing ex-
ponentially. Many IT executives and Chief Information Ocers rejected
cloud computing due to its security and privacy risk [17] . Many contri-
butions were made in the security area of fog computing, those include
[80] , which implemented a fog computing approach to tackle DDOS
attacks in an Industrial Internet of Things (IIoT). The approach was im-
plemented successfully on a testbed to handle the DDoS attack in IIoT,
to improve the real-time response and device computational capabilities
in the IIoT. Also, [81] proposed a protocol for authentication between
cloud, fog, and edge devices using key initiation. The security proposal
is implemented in ve phases simulated using an informal method with
nine dierent forms of attacks, and it is claimed to provide maximum
protection to the relevant attacks. However, the proposed protocol is
more eective in computation and communication.
6.1. Healthcare management
The benet of having multiple servers in a fog environment with the
ability to run a particular application became the advantage of deliver-
ing improved healthcare services. Fog computing provides a healthcare
system with many advantages, including reducing energy consumption
and minimizing delays and data trac. In addition, analyzing and stor-
ing data locally at the fog’s layer enhances security as it stores vital and
private data within the organization [108] .
6.2. Traffic light systems
Fog computing and vehicular networks replaced conventional phys-
ical trac light systems with virtual trac light systems, which are
more cost-eective. In addition, fog computing provides an easy way
to reduce the trac crowd using trac signals adjustment based on the
trac situation or through vehicular communications guiding drivers
to non-crowded routes [122] .
6.3. Medical wearables:
The use of these devices by healthcare providers is becoming per-
vasive. It is used in delivering telemedicine, monitoring the condition
of patients, and directing on-site sta in surgery procedures [20] . Fog
computing does not only reduce medical expenses but has become a
cornerstone of modern healthcare systems [109] .
6.4. Connected vehicles:
With the help of context awareness, fog computing provides a secure
and ecient real-time interaction between cars, trac lights, and access
points. Thus, providing vehicle-to-vehicle communication due to the fog
nodes’ proximity with the IoT devices [20] . The vehicles in VANET’s
environments require services with minimal latency and short-distance
domestic connections through fog computing [73] .
6.5. Smart grids:
Smart grids help manage the connected devices’ operational activ-
ities through machine-to-machine and human-to-machine communica-
tion [20] , leading to quality of service maximization, minimizing the
rate of failure, improving the ecient use of energy, and optimizing
security[ 138 ].
6.6. Smart homes and cities
The main goal of smart-city applications is to enhance the opera-
tion of the city ows and grant real-time feedback to problems that may
emerge in users’ operational activities. Nevertheless, the available so-
lutions to smart cities using the cloud approach reach many require-
ments, however, with so many shortcomings that include latency, mo-
bility support, scalability, and localization. Although the intervention of
14
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
fog computing extends cloud computing services close to the edge de-
vices, which leads to the decrease in latency, improves the QoS, context-
awareness, load balancing, and ecient distribution of data [ 73,139 ].
6.7. Latency management
Latency management refers to the time taken to respond, analyze,
and execute the computational request. The fog nodes’ proximity with
the edge devices helps in leading to faster computation tasks and anal-
ysis responses. All possible techniques need to be employed to manage
latency, including monitoring and adopting network design that could
do away with and force the drop of latency [123] . In addition, initi-
ating structured nodal cooperation can help provide eective latency
management. The distribution of tasks and the computation between
the fog and the clients are built on achieving minimal communication,
and computational latency [1] .
6.8. Data management
As the number of IoT nodes keeps increasing also, the volume of data
keeps increasing rapidly. That made cloud computing and other previ-
ous paradigms ineective in implementing the proper way of managing
the data, making fog suitable as it is placed close to the edge devices
[18] .
6.9. Network management
Management of networks in fog computing encompasses Software-
Dened Network (SDN)/Network Function Virtualization (NFV) sup-
port, decongestion of core-network, and guaranteeing reliable network
connectivity. SDN’s popular function is equipping NFV. Therefore, SDN
is regarded to be among the signicant backbone of virtualized net-
works. NFV is a notion of network architecture that virtualizes the con-
ventional functions to enable its implementation of the software. some
of these functions include; Network Address Translation (NAT), Domain
Name Service (DNS), caching, intrusion detection, and the rest [1] .
6.10. Computation management
Commitment towards managing the fog computing computational
resources is an essential aspect. Resource management encompasses the
estimation of resources, allocation of workload, and coordination of re-
sources. Estimating resources tackles allocating computational resources
based on some given policies to guide proper allocation and reach the
desired QoS. The workload allocation helps in maximizing the ratio of
resource utilization and reducing the long computation period. While
in resource coordination, large-scale applications are distributed to bal-
ance computational ability because of the fog nodes’ limitations and
variation in computational power and storage [1] .
It is a vital issue in the fog computing paradigm which includes mo-
bility support, and situation awareness [124] . These include; The pro-
posed application meant to help provide and implement the Quality of
Experienced (QoE) policy by prioritizing application placement requests
based on user projection and computing the ability of Fog instances in
consideration of their present condition. Also, it can ease the placement
of applications to the appropriate fog instances, which will maximize
the user QoE concerning service delivery, utility access, and resource
consumption [69] . Proposal of multi-tier architectural design Named
Fog Computing Architecture Network integrates the applications run-
ning on the IoT devices and cooperatively direct, compute and commu-
nicate with each other through the innovative city environment [70] .
These contributions are referenced in Table 3 .
7. Issues and challenges
Fog computing faces structural challenges due to its heterogeneous
nature. As the edge and or the core network can be used as a fog node,
some nodes might not be designed to serve a general-purpose computa-
tion. Therefore, integrating the general-purpose function from its tradi-
tional role might be an issue. Furthermore, in the face of service orienta-
tion, the evolution of large-scale applications might be an issue because
of the limited resources of some fog nodes. Therefore there is a need
for a programming platform that will help in the development of dis-
tributed applications. The execution of a security system for data-centric
integrity can signicantly aect the fog’s QoS. Additionally, access au-
thentication on services and maintenance for preserving the privacy of
such an extensive distribution network might prove dicult [1] .
Even with the overwhelming features of fog computing, it still faces
a shortcoming in device-to-device (D2D) communications [82] . Accord-
ing to [12] , many studies on fog computing concentrated on IoT to Fog
and Fog to Cloud solutions. However, there is a need to include research
on fog-to-fog communication, which is an open issue in fog computing.
Some examples were fog-to-fog selection, task prediction from historical
data, fog-to-fog resource utilization, scalability, robustness, and mobil-
ity of the fog nodes. Other topics that have been discovered but need to
be understood include the performance of fog ecosystems, robustness,
storage, energy savings, use of distributed fog through a combination
of device-to-device (D2D) and cellular network, mobility and node se-
lection, trust and security issues at all levels of the fog paradigm. New
technologies are topics that researchers have addressed for a long time.
Integrating IoT and fog services has started improving the quality
of services in health industries. These improve operational eciency,
optimize power consumption, and minimize the cost of operation. With
fog e-Health applications, the quality of service on patient management
can be improved, and some medical complications that could even lead
to the patient’s death can be minimized. Moreover, the generated data
from the applications can research and prevent epidemics and or pan-
demic diseases [108] . It is being highlighted that healthcare industries
will witness the deployment of robust solutions using fog computing for
quality of service delivery. However, the challenges it faces include; se-
curing sensitive data, system failure management, the conguration of
multiple systems, and the management of diverse systems having nu-
merous dimensions [12] .
In the smart city infrastructure, management of information and
communication resources needs to increase to perform real-time analy-
sis of big data close to the user and guarantee the security of the infras-
tructure and the generated information. The infrastructure has not yet
been fully resolved in terms of reliability, robustness, and durability to
process large amounts of data on the edge of the network to improve
node failure, service quality, and the performance of the smart city due
to slow convergence or malicious attack, trac congestion and the re-
liability and availability of services [12] . With the function of FC of
delivering application awareness to satisfy crowd-sourcing/sensing ap-
plications, FC needs to make some arrangements to set the resources
that could provide mobility services. However, the challenge here is
that the mobile node may experience some issues due to the variation
of computation, storage, bandwidth, and latency [8] .
8. Future research directions
Fog computing is a platform between the cloud and the edge nodes
to provide computing, storage, and network services between the two
[5] . Thus, many crucial application services are developed to serve a
generic or particular service. Transportation, placement, storage, and
ecient and eective computation of a large amount of data is the most
crucial issue in cloud, and edge computing [91] . Thus, serving as a future
research direction.
8.1. Healthcare applications
Before the introduction of fog computing, healthcare management
was already a success in cloud computing. However, any network failure
or inadequate bandwidth in a Cloud-based architecture results in a long
15
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Table 3
A taxonomy of the research papers in fog computing.
Taxonomy Description References
Services and
Applications
Proposed an application, protocol, and service to improve the quality of service in fog
computing.
[16,40,71,73,74,78,79,89–100,102–113,125]
Context-Awareness Proposed a system that works based on the collected data about the environment and
analyzes it to guide the response of the proposed system.
[69,70,72–79,113,126]
Security, Privacy,
and Trust
Advances in securing the paradigm, provision of privacy protection, detection, and
mitigation of attacks.
[36,72,80–90]
response time. It is unsuitable for healthcare applications because it af-
fects the patient’s quality of life, even leading to death. It may be argued
that cloud computing does not always oer a high enough standard of
quality of service for healthcare applications [100,112,127] . The World
Health Organization predicts that by 2035, there will be a distressing
shortage of 12.9 million healthcare workers worldwide. To address the
shortage of healthcare workers, energy-ecient, low-cost, and scalable
healthcare technologies are needed to promote disease prevention, and
treatment [128] .
The fog is now used to optimize traditional services by improving the
response time, access control, privacy, etc., and enriching the environ-
ment with device proximity to the user and the patient [20] . If fog com-
puting’s latest features are eectively applied to time-sensitive health-
care applications, they can speed up the discovery of early warning
of emergencies, allowing for better decision-making. In time-sensitive
applications, fog computing outperforms cloud computing in provid-
ing easy access to data and making intelligent decisions in emergencies
[129] . Fog computing functions can be exploited to minimize the patient
data retrieval latency [40] .
8.2. Smart city applications
In comparison to cloud-based models, fog computing oers improved
real-time response. Due to the weak communication abilities of Wireless
Sensor Networks (WSNs), transmission from intelligent devices (e.g.,
sensors) to the cloud becomes a bottleneck, particularly for cloud-based
latency-sensitive IoT applications. This bottleneck has the potential to
undermine application eciency and stie future growth. Fog com-
puting strategies control resource use, minimize costs, increase system
eciency, and link IoT devices more eectively in sustainable smart
cities. Integrating multiple IoT technologies creates many opportunities
for management, growth, and governance of consumer services. Cities
are essential places that portray the life standard of humans and are
full of routine activities, social amenities, businesses, industries, health
services, and governmental and non-governmental infrastructures. With
these characteristics, it becomes a critical stage that shows human de-
velopment. Thus, making it easier for the fog to be adopted and imple-
mented for the development of society. The increased demand for new
technology like smartphones, IoT, and big data analytics leads to the
introduction of smart cities [12] .
8.3. Farm applications
The agricultural sector is gradually adopting the Internet and certain
networking technologies to enhance the services they provide to end-
users. It is widely acknowledged that the Internet has aws, especially
when dealing with large networked devices (IoT) or stakeholders [130] .
But it isn’t falling behind in fog computing, as the fog is making its way
into production control, keeping up the standard of farm production,
keeping an eye on the health of crops and livestock in real-time, and
making the market bigger. Fog computing farm applications can also
be used to predict climate state, livestock management, and crop man-
agement [12] . It can also be used to improve pest detection systems
through the use of image alignment analysis [131] . The use of smart
agriculture can be used to choose an appropriate time for disease treat-
ment and help the farmer monitor the farm without being there [130] .
According to [102,107] , people worldwide have been concerned about
the welfare of domesticated animals. Domestic pets are being infected
with lethal diseases due to poor treatment. As a solution, a smart home
based on fog computing could be used to give domesticated animals the
best possible healthcare environment.
It’s important to remember that fog computing is still developing and
that much more research is required. Overall, fog computing has a lot
of interesting research areas, and in the coming years, we may nd out
a lot more. These could consist of the following:
Resource Allocation and Optimization: In fog computing settings,
practical algorithms and strategies are required for resource alloca-
tion. For fog computing systems to work better and be more reliable,
research in this area may focus on making techniques for dynamic
resource allocation and optimization [132,133] .
Privacy and Security: Fog computing systems are vulnerable to
several security risks, including denial-of-service assaults and data
leaks. The aim of this research could be to nd solutions to maintain
security and privacy in fog computing environments [17,89] .
Edge Intelligence: By using fog computing, machine learning and
articial intelligence (AI) algorithms can be implemented nearer to
the data source at the network’s edge. The performance and eec-
tiveness of fog computing systems can be enhanced through research
into edge intelligence, and analytics [134,135] .
Real-time and distributed applications: IoT and 5G systems, for ex-
ample, can be deployed with the help of fog computing’s distributed
and real-time capabilities. Research in this eld might concentrate
on creating techniques for real-time and distributed computing in
fog environments while also guring out new use cases and applica-
tions for fog computing [136] .
Augmented reality (AR): is a type of technology that improves how
the user sees the outside environment by superimposing digital infor-
mation on top of it. Smartphones or head-mounted displays (HMDs)
can be used to accomplish this. In recent years, the growing interest
in combining augmented reality (AR) and fog computing to produce
more responsive and immersive experiences has been observed. The
combination of AR and fog computing provides numerous advan-
tages, including real-time processing, minimal latency, and scalabil-
ity. Particularly in the context of smart cities and industrial appli-
cations, this technology has the potential to produce more immer-
sive and responsive experiences [137] . Research in augmented real-
ity with fog computing might concentrate on enhancing the latency
and responsiveness of augmented reality apps and creating new aug-
mented reality use cases that use fog computing’s capabilities. Such
application cases include intelligent transportation systems, smart
cities, and industrial automation. Additionally, security and privacy
concerns unique to AR should be considered while designing and
implementing fog-based AR systems.
9. Conclusion
Fog computing is a new paradigm that receives wide acceptance
and recognition due to its signicant contribution to modern computing
technology. This paper reviews and discusses cloud computing, briey
highlighting the implemented paradigms before fog computing. These
paradigms include cloudlet, mobile cloud computing, and mobile edge
16
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
computing. All the paradigms targeted improving the quality of service
between the end devices and the cloud itself. The Taxonomy is pre-
sented based on contemporary fog computing research about security
challenges, services issues, operational issues, and data management.
The standard for elucidating the taxonomy is built on the functional and
vital issues in fog computing. Challenges and potential applications are
identied. The paper shows that security, privacy, application, and com-
munication challenges are prominent among the scholars contributions.
Potential applications in fog computing are also identied, including
healthcare applications, innovative city applications, and farm applica-
tions.
Declaration of competing interest
The authors declare that they have no known competing nancial
interests or personal relationships that could have appeared to inuence
the work reported in this paper.
Data availability
No data was used for the research described in the article.
References
[1] R. Mahmud, R. Kotagiri, R. Buyya, Fog computing: a taxonomy, survey and future
directions, in: B. Di Martino, K.-C. Li, L.T. Yang, A. Esposito (Eds.), Internet of
Everything: Algorithms, Methodologies, Technologies and Perspectives, Springer
Singapore, Singapore, 2018, pp. 103–130, doi: 10.1007/978- 981- 10- 5861- 5 _ 5
.
[2] I. Stojmenovic, S. Wen, X. Huang, H. Luan, An overview of fog computing and
its security issues, Concurr. Comput. 28 (10) (2016) 2991–3005, doi: 10.1002/cpe.
3485
. _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.3485 .
[3] S. Yi, C. Li, Q. Li, A survey of fog computing: concepts, applications and issues,
in: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, Hangzhou China,
2015, pp. 37–42, doi: 10.1145/2757384.2757397
.
[4] O. Foundation, OpenFog, https://opcfoundation.org/markets-collaboration/
openfog/
.
[5] P. Zhang, M. Zhou, G. Fortino, Security and trust issues in fog computing: asurvey,
Future Generat. Comput. Syst. 88 (2018) 16–27, doi: 10.1016/j.future.2018.05.
008
. https://www.sciencedirect.com/science/article/pii/S0167739X17329722 .
[6] N. Abbas, Y. Zhang, A. Taherkordi, T. Skeie, Mobile edge computing: a survey,
IEEE Internet Things J. 5 (1) (2018) 450–465, doi: 10.1109/JIOT.2017.2750180
.
Conference Name: IEEE Internet of Things Journal.
[7] K. Bilal, O. Khalid, A. Erbad, S.U. Khan, Potentials, trends, and prospects in
edge technologies: fog, cloudlet, mobile edge, and micro data centers, Com-
put. Netw. 130 (2018) 94–120, doi: 10.1016/j.comnet.2017.10.002
. https://www.
sciencedirect.com/science/article/pii/S1389128617303778
.
[8] P. Hu, S. Dhelim, H. Ning, T. Qiu, Survey on fog computing: architecture, key tech-
nologies, applications and open issues, J. Netw. Comput. Appl. 98 (2017) 27–42,
doi: 10.1016/j.jnca.2017.09.002
. https://www.sciencedirect.com/science/article/
pii/S1084804517302953
.
[9] L. Li, Y. Li, R. Hou, A novel mobile edge computing-based architecture for future
cellular vehicular networks, in: 2017 IEEE Wireless Communications and Network-
ing Conference (WCNC), 2017, pp. 1–6, doi: 10.1109/WCNC.2017.7925830
. ISSN:
1558-2612.
[10] A. Ahmed, E. Ahmed, A survey on mobile edge computing, in: 2016 10th Inter-
national Conference on Intelligent Systems and Control (ISCO), 2016, pp. 1–8,
doi: 10.1109/ISCO.2016.7727082
.
[11] G. Caiza, M. Saeteros, W. Oñate, M.V. Garcia, Fog computing at industrial level,
architecture, latency, energy, and security: a review, Heliyon 6 (4) (2020), doi: 10.
1016/j.heliyon.2020.e03706
. 2020 v.6 no.4. PubAg AGID: 6926621.
[12] A.A. Alli, M.M. Alam, The fog cloud of things: a survey on concepts, archi-
tecture, standards, tools, and applications, Internet Things 9 (2020) 100177,
doi: 10.1016/j.iot.2020.100177
. https://www.sciencedirect.com/science/article/
pii/S2542660520300172
.
[13] F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet
of things, in: Proceedings of the rst edition of the MCC workshop on Mobile cloud
computing, in: MCC ’12, Association for Computing Machinery, New York, NY,
USA, 2012, pp. 13–16, doi: 10.1145/2342509.2342513
.
[14] A. Yousefpour, C. Fung, T. Nguyen, K. Kadiyala, F. Jalali, A. Niakanlahiji,
J. Kong, J.P. Jue, All one needs to know about fog computing and related
edge computing paradigms: a complete survey, J. Syst. Archit. 98 (2019) 289–
330, doi: 10.1016/j.sysarc.2019.02.009
. https://www.sciencedirect.com/science/
article/pii/S1383762118306349
.
[15] O. Salman, I. Elhajj, A. Chehab, A. Kayssi, IoT Survey: an SDN and fog computing
perspective, Comput. Netw. 143 (2018) 221–246, doi: 10.1016/j.comnet.2018.07.
020
. https://www.sciencedirect.com/science/article/pii/S1389128618305395 .
[16] P. O’Donovan, C. Gallagher, K. Leahy, D.T.J. O’Sullivan, A comparison of
fog and cloud computing cyber-physical interfaces for industry 4.0 real-
time embedded machine learning engineering applications, Comput. Ind. 110
(2019) 12–35, doi: 10.1016/j.compind.2019.04.016 . https://www.sciencedirect.
com/science/article/pii/S016636151830366X
.
[17] S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: a survey, in: In-
ternational Conference on Wireless Algorithms, Systems, and Applications, volume
vol 9204, Springer, Cham, 2015, pp. 685–695, doi: 10.1007/978- 3- 319- 21837-
3 _ 67 .
[18] M.R. Anawar, S. Wang, M. Azam Zia, A.K. Jadoon, U. Akram, S. Raza, Fog comput-
ing: an overview of big IoT data analytics, Wirel. Commun. Mobile Comput. 2018
(2018) e7157192, doi: 10.1155/2018/7157192
. Publisher: Hindawi.
[19] T. Nguyen Gia, A.M. Rahmani, T. Westerlund, P. Liljeberg, H. Tenhunen, Fog com-
puting approach for mobility support in internet-of-things systems, IEEE Access
6 (2018) 36064–36082, doi: 10.1109/ACCESS.2018.2848119
. Conference Name:
IEEE Access.
[20] Z. Mahmood, M. Ramachandran, Fog computing: concepts, principles and related
paradigms, in: Z. Mahmood (Ed.), Fog Computing: Concepts, Frameworks and
Technologies, Springer International Publishing, Cham, 2018, pp. 3–21, doi: 10.
1007/978- 3- 319- 94890- 4 _ 1
.
[21] C. Byers, Control engineering | Fog computing for industrial automation, 2018,
https://www.controleng.com/articles/fog- computing- for- industrial- automation/
.
[22] A.V. Dastjerdi, H. Gupta, R.N. Calheiros, S.K. Ghosh, R. Buyya, Chapter 4
- fog computing: Principles, Architectures, and Applications, in: R. Buyya,
A. Vahid Dastjerdi (Eds.), Internet of Things, Morgan Kaufmann, 2016, pp. 61–
75, doi: 10.1016/B978- 0- 12- 805395- 9.00004- 6
. https://www.sciencedirect.com/
science/article/pii/B9780128053959000046
.
[23] R.O. Aburukba, T. Landolsi, D. Omer, A heuristic scheduling approach for fog-
cloud computing environment with stationary IoT devices, J. Netw. Comput. Appl.
180 (2021) 102994, doi: 10.1016/j.jnca.2021.102994
. https://www.sciencedirect.
com/science/article/pii/S1084804521000217
.
[24] D. Javaheri, S. Gorgin, J.-A. Lee, M. Masdari, An improved discrete harris hawk
optimization algorithm for ecient workow scheduling in multi-fog computing,
Sustain. Comput. 36 (2022) 100787, doi: 10.1016/j.suscom.2022.100787
. https://
www.sciencedirect.com/science/article/pii/S2210537922001184
.
[25] M.R. Hossain, M. Whaiduzzaman, A. Barros, S.R. Tuly, M.J.N. Mahi, S. Roy,
C. Fidge, R. Buyya, A scheduling-based dynamic fog computing frame-
work for augmenting resource utilization, Simul. Modell. Pract. Theory 111
(2021) 102336, doi: 10.1016/j.simpat.2021.102336 . https://www.sciencedirect.
com/science/article/pii/S1569190X21000538
.
[26] D. Harkut, P. Thakar, L. Mutneja, An adaptive task scheduling in fog computing |
IntechOpen, 2022. https://www.intechopen.com/online-rst/84920
.
[27] M. Ashraf, M. Shiraz, A. Abbasi, S. Albahli, Distributed application execution in
fog computing: a taxonomy, challenges and future directions, J. King Saud Univ.
- Comput. Inf. Sci. 34 (7) (2022) 3887–3909, doi: 10.1016/j.jksuci.2022.05.002
.
https://www.sciencedirect.com/science/article/pii/S1319157822001513
.
[28] S.P. Singh, Eective load balancing strategy using fuzzy golden eagle optimiza-
tion in fog computing environment, Sustain. Comput. 35 (2022) 100766, doi: 10.
1016/j.suscom.2022.100766
. https://www.sciencedirect.com/science/article/pii/
S2210537922000981
.
[29] S. Rathi, R. Nagpal, D. Mehrotra, G. Srivastava, A metric focused performance
assessment of fog computing environments: a critical review, Comput. Electr.
Eng. 103 (2022) 108350, doi: 10.1016/j.compeleceng.2022.108350
. https://www.
sciencedirect.com/science/article/pii/S0045790622005687
.
[30] L.-A. Phan, D.-T. Nguyen, M. Lee, D.-H. Park, T. Kim, Dynamic fog-to-fog of-
oading in SDN-based fog computing systems, Future Generat. Comput. Syst. 117
(2021) 486–497, doi: 10.1016/j.future.2020.12.021
. https://www.sciencedirect.
com/science/article/pii/S0167739X20330831
.
[31] M. Tay, A. Senturk, A research on resource allocation algorithms in content of
edge, fog and cloud, Mater. Today:. Proc. (2022), doi: 10.1016/j.matpr.2022.11.
232
. https://www.sciencedirect.com/science/article/pii/S2214785322070845 .
[32] N. Sharma, C. Prabha, S.B. Goyal, Resource allocation in FC environment: a re-
view, AIP Conf. Proc. 2555 (1) (2022) 050024, doi: 10.1063/5.0124592
. Publisher:
American Institute of Physics.
[33] F. Jalali, K. Hinton, R. Ayre, T. Alpcan, R.S. Tucker, Fog computing may help to save
energy in cloud computing, IEEE J. Sel. Areas Commun. 34 (5) (2016) 1728–1739,
doi: 10.1109/JSAC.2016.2545559
. Conference Name: IEEE Journal on Selected Ar-
eas in Communications.
[34] K. Kaur, T. Dhand, N. Kumar, S. Zeadally, Container-as-a-service at the edge: trade-
o between energy eciency and service availability at fog nano data centers, IEEE
Wirel. Commun. 24 (3) (2017) 48–56, doi: 10.1109/MWC.2017.1600427
. Confer-
ence Name: IEEE Wireless Communications.
[35] S. Javanmardi, M. Shojafar, R. Mohammadi, A. Nazari, V. Persico, A. Pescapè,
FUPE: a security driven task scheduling approach for SDN-based IoT–fog net-
works, J. Inf. Secur. Appl. 60 (2021) 102853, doi: 10.1016/j.jisa.2021.102853
.
https://www.sciencedirect.com/science/article/pii/S2214212621000879
.
[36] Y. Liu, J. Zhang, J. Zhan, Privacy protection for fog computing and the internet
of things data based on blockchain, Cluster Comput. 24 (2) (2021) 1331–1345,
doi: 10.1007/s10586- 020- 03190- 3
.
[37] D. Koo, J. Hur, Privacy-preserving deduplication of encrypted data with dy-
namic ownership management in fog computing, Future Generat. Comput. Syst. 78
(2018) 739–752, doi: 10.1016/j.future.2017.01.024
. https://www.sciencedirect.
com/science/article/pii/S0167739X17301309
.
[38] O.-K. Shahryari, H. Pedram, V. Khajehvand, M. Dehghan TakhtFooladi, Energy-
ecient and delay-guaranteed computation ooading for fog-based IoT networks,
Comput. Netw. 182 (2020) 107511, doi: 10.1016/j.comnet.2020.107511
. https://
www.sciencedirect.com/science/article/pii/S1389128620311762
.
[39] S. V, P. M, M.K. P, Energy-ecient task scheduling and resource allocation for
improving the performance of a cloud–fog environment, Symmetry (Basel) 14 (11)
17
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
(2022) 2340, doi: 10.3390/sym14112340 . Number: 11 Publisher: Multidisciplinary
Digital Publishing Institute.
[40] K. Wang, J. Li, Y. Yang, W. Chen, L. Hanzo, Content-centric heterogeneous fog net-
works relying on energy eciency optimization, IEEE Trans. Veh. Technol. 69 (11)
(2020) 13579–13592, doi: 10.1109/TVT.2020.3013020
. Conference Name: IEEE
Transactions on Vehicular Technology.
[41] M.Z. Nayyer, I. Raza, S.A. Hussain, ClpyZ: a Testbed for Cloudlet Federation, Ad-
vances in Computers, Elsevier, 2022, doi: 10.1016/bs.adcom.2022.09.002
. https:
//www.sciencedirect.com/science/article/pii/S0065245822000833
.
[42] M.S.U. Islam, A. Kumar, Y.-C. Hu, Context-aware scheduling in fog computing:
asurvey, taxonomy, challenges and future directions, J. Netw. Comput. Appl.
180 (2021) 103008, doi: 10.1016/j.jnca.2021.103008
. https://www.sciencedirect.
com/science/article/pii/S1084804521000357
.
[43] H. Zhang, Y. Qiu, X. Chu, K. Long, V.C. Leung, Fog radio access networks: mobil-
ity management, interference mitigation, and resource optimization, IEEE Wireless
Commun. 24 (6) (2017) 120–127, doi: 10.1109/MWC.2017.1700007
. Conference
Name: IEEE Wireless Communications.
[44] L.F. Bittencourt, J. Diaz-Montes, R. Buyya, O.F. Rana, M. Parashar, Mobility-aware
application scheduling in fog computing, IEEE Cloud Comput. 4 (2) (2017) 26–35,
doi: 10.1109/MCC.2017.27
. Conference Name: IEEE Cloud Computing.
[45] A. Mijuskovic, Towards integration of logistics processes from a cloud/fog-
edge computing perspective, in: 2021 IEEE 25th International Enterprise Dis-
tributed Object Computing Workshop (EDOCW), 2021, pp. 349–355, doi: 10.1109/
EDOCW52865.2021.00069
. ISSN: 2325-6605.
[46] R.K. Johney, E. Shelry, K.R. Remesh Babu, Enhanced security through cloud-
fog integration, in: 2019 International Conference on Communication and Elec-
tronics Systems (ICCES), 2019, pp. 1530–1535, doi: 10.1109/ICCES45898.2019.
9002058
.
[47] S.K. Dwivedi, J. Yadav, S.A. Ansar, M.W. Khan, D. Pandey, R.A. Khan, A novel
paradigm: cloud-fog integrated IoT approach, in: 2022 3rd International Confer-
ence on Computation, Automation and Knowledge Management (ICCAKM), 2022,
pp. 1–5, doi: 10.1109/ICCAKM54721.2022.9990519
.
[48] J. Li, J. Jin, D. Yuan, H. Zhang, Virtual fog: a virtualization enabled fog computing
framework for internet of things, IEEE Internet Things J. 5 (1) (2018) 121–131,
doi: 10.1109/JIOT.2017.2774286
. Conference Name: IEEE Internet of Things Jour-
nal.
[49] M.G. Mortazavi, M.H. Shirvani, A. Dana, A discrete cuckoo search algorithm
for reliability-aware energy-ecient iot applications multi-service deployment in
fog environment, in: 2022 International Conference on Electrical, Computer and
Energy Technologies (ICECET), 2022, pp. 1–6, doi: 10.1109/ICECET55527.2022.
9873056
.
[50] J. Yao, N. Ansari, Fog resource provisioning in reliability-aware IoT networks, IEEE
Internet Things J. 6 (5) (2019) 8262–8269, doi: 10.1109/JIOT.2019.2922585
. Con-
ference Name: IEEE Internet of Things Journal.
[51] J. Yao, N. Ansari, Reliability-aware fog resource provisioning for deadline-driven
IoT services, in: 2018 IEEE Global Communications Conference (GLOBECOM),
2018, pp. 1–6, doi: 10.1109/GLOCOM.2018.8647378
. ISSN: 2576-6813.
[52] M. Ibrar, L. Wang, N. Shah, O. Rottenstreich, G.-M. Muntean, A. Akbar, Reliability-
aware ow distribution algorithm in SDN-enabled fog computing for smart
cities, IEEE Trans. Veh. Technol. 72 (1) (2023) 573–588, doi: 10.1109/TVT.2022.
3202195
. Conference Name: IEEE Transactions on Vehicular Technology.
[53] M. Mukherjee, V. Kumar, J. Lloret, Q. Zhang, Revenue maximization in delay-aware
computation ooading among service providers with fog federation, IEEE Com-
mun. Lett. 24 (8) (2020) 1799–1803, doi: 10.1109/LCOMM.2020.2992781
. Con-
ference Name: IEEE Communications Letters.
[54] I. Sarkar, S. Kumar, Delay-aware intelligent task ooading strategy in vehicular fog
computing, in: 2022 International Conference on Connected Systems & Intelligence
(CSI), 2022, pp. 1–6, doi: 10.1109/CSI54720.2022.9924066
.
[55] N. Siasi, M. Jasim, A. Aldalbahi, N. Ghani, Delay-aware SFC provisioning in hybrid
fog-cloud computing architectures, IEEE Access 8 (2020) 167383–167396, doi: 10.
1109/ACCESS.2020.3021354
. Conference Name: IEEE Access.
[56] M. Barzegaran, P. Pop, Extensibility-aware fog computing platform congura-
tion for mixed-criticality applications, J. Syst. Archit. 133 (2022) 102776, doi: 10.
1016/j.sysarc.2022.102776
. https://www.sciencedirect.com/science/article/pii/
S1383762122002612
.
[57] A. Aljumah, T.A. Ahanger, Fog computing and security issues: a review, in: 2018
7th International Conference on Computers Communications and Control (ICCCC),
2018, pp. 237–239, doi: 10.1109/ICCCC.2018.8390464
.
[58] R.K. Naha, S. Garg, D. Georgakopoulos, P.P. Jayaraman, L. Gao, Y. Xiang,
R. Ranjan, Fog computing: survey of trends, architectures, requirements, and re-
search directions, IEEE Access 6 (2018) 47980–48009, doi: 10.1109/ACCESS.2018.
2866491
. Conference Name: IEEE Access.
[59] M. Mukherjee, L. Shu, D. Wang, Survey of fog computing: fundamental, network
applications, and research challenges, IEEE Commun. Surv. Tutor. 20 (3) (2018)
1826–1857, doi: 10.1109/COMST.2018.2814571
. Conference Name: IEEE Commu-
nications Surveys Tutorials.
[60] C. Mouradian, D. Naboulsi, S. Yangui, R.H. Glitho, M.J. Morrow, P.A. Polakos, A
comprehensive survey on fog computing: state-of-the-art and research challenges,
IEEE Commun. Surv. Tutor. 20 (1) (2018) 416–464, doi: 10.1109/COMST.2017.
2771153
. Conference Name: IEEE Communications Surveys Tutorials.
[61] S.B. Nath, H. Gupta, S. Chakraborty, S.K. Ghosh, A survey of fog computing and
communication: current researches and future directions, arXiv:1804.04365 [cs]
(2018)
. ArXiv: 1804.04365, http://arxiv.org/abs/1804.04365 .
[62] M.I. Bala, M.A. Chishti, Survey of applications, challenges and opportunities in fog
computing, Int. J. Pervas. Comput. Commun. 15 (2) (2019) 80–96, doi: 10.1108/
IJPCC- 06- 2019- 059
. Publisher: Emerald Publishing Limited.
[63] R. Huang, Y. Sun, C. Huang, G. Zhao, Y. Ma, A survey on fog computing, in:
G. Wang, J. Feng, M.Z.A. Bhuiyan, R. Lu (Eds.), Security, Privacy, and Anonymity
in Computation, Communication, and Storage, Lecture Notes in Computer Sci-
ence, Springer International Publishing, Cham, 2019, pp. 160–169, doi: 10.1007/
978- 3- 030- 24900- 7 _ 13 .
[64] F. Haouari, R. Faraj, J.M. AlJa’am, Fog computing potentials, applications, and
challenges, in: 2018 International Conference on Computer and Applications
(ICCA), 2018, pp. 399–406, doi: 10.1109/COMAPP.2018.8460182
.
[65] C. Arivazhagan, V. Natarajan, A survey on fog computing paradigms, challenges
and opportunities in IoT, in: 2020 International Conference on Communication
and Signal Processing (ICCSP), 2020, pp. 0385–0389, doi: 10.1109/ICCSP48568.
2020.9182229
.
[66] M.A. Nadeem, M.A. Saeed, Fog computing: an emerging paradigm, in: 2016 Sixth
International Conference on Innovative Computing Technology (INTECH), 2016,
pp. 83–86, doi: 10.1109/INTECH.2016.7845043
.
[67] D. Bermbach, F. Pallas, D.G. Prez, P. Plebani, M. Anderson, R. Kat, S. Tai, A research
perspective on fog computing, in: L. Braubach, J.M. Murillo, N. Kaviani, M. Lama,
L. Burgueño, N. Moha, M. Oriol (Eds.), Service-Oriented Computing –ICSOC 2017
Workshops, Lecture Notes in Computer Science, Springer International Publishing,
Cham, 2018, pp. 198–210, doi: 10.1007/978- 3- 319- 91764- 1 _ 16 .
[68] J. Singh, P. Singh, S.S. Gill, Fog computing: a taxonomy, systematic review, current
trends and research challenges, J. Parallel. Distrib. Comput. 157 (2021) 56–85,
doi: 10.1016/j.jpdc.2021.06.005
. https://www.sciencedirect.com/science/article/
pii/S0743731521001349
.
[69] R. Mahmud, S.N. Srirama, K. Ramamohanarao, R. Buyya, Quality of experience
(QoE)-aware placement of applications in fog computing environments, J. Parallel
Distrib. Comput. 132 (2019) 190–203, doi: 10.1016/j.jpdc.2018.03.004
. https://
www.sciencedirect.com/science/article/pii/S0743731518301771
.
[70] P.G.V. Naranjo, Z. Pooranian, M. Shojafar, M. Conti, R. Buyya, FOCAN: A
fog-supported smart city network architecture for management of applica-
tions in the internet of everything environments, J. Parallel Distrib. Comput.
132 (2019) 274–283, doi: 10.1016/j.jpdc.2018.07.003
. https://www.sciencedirect.
com/science/article/pii/S0743731518304775
.
[71] Q.T. Minh, E. Kamioka, S. Yamada, CFC-ITS: context-aware fog computing for in-
telligent transportation systems, IT Prof. 20 (6) (2018) 35–45, doi: 10.1109/MITP.
2018.2876978
. Conference Name: IT Professional.
[72] A.S.M. Kayes, W. Rahayu, P. Watters, M. Alazab, T. Dillon, E. Chang, Achieving
security scalability and exibility using fog-based context-aware access control,
Future Generat. Comput. Syst. 107 (2020) 307–323, doi: 10.1016/j.future.2020.02.
001
. https://www.sciencedirect.com/science/article/pii/S0167739X19323349 .
[73] J. Pereira, L. Ricardo, M. Luís, C. Senna, S. Sargento, Assessing the reliability of
fog computing for smart mobility applications in VANETs, Future Generat. Com-
put. Syst. 94 (2019) 317–332, doi: 10.1016/j.future.2018.11.043
. https://www.
sciencedirect.com/science/article/pii/S0167739X18307076
.
[74] J.L. Prez, A. Gutierrez-Torre, J.L. Berral, D. Carrera, A resilient and distributed near
real-time trac forecasting application for fog computing environments, Future
Generat. Comput. Syst. 87 (2018) 198–212, doi: 10.1016/j.future.2018.05.013
.
https://www.sciencedirect.com/science/article/pii/S0167739X1732678X
.
[75] S. Shekhar, A. Chhokra, H. Sun, A. Gokhale, A. Dubey, X. Koutsoukos, G. Kar-
sai, URMILA: dynamically trading-o fog and edge resources for performance
and mobility-aware IoT services, J. Syst. Archit. 107 (2020) 101710, doi: 10.
1016/j.sysarc.2020.101710
. https://www.sciencedirect.com/science/article/pii/
S1383762120300047
.
[76] P. Wiener, P. Zehnder, D. Riemer, Towards context-aware and dynamic man-
agement of stream processing pipelines for fog computing, in: 2019 IEEE 3rd
International Conference on Fog and Edge Computing (ICFEC), 2019, pp. 1–6,
doi: 10.1109/CFEC.2019.8733145
.
[77] B.D. Deebak, F. Al-Turjman, M. Aloqaily, O. Alfandi, IoT-BSFCAN: a smart context-
aware system in IoT-cloud using mobile-fogging, Future Generat. Comput. Syst. 109
(2020) 368–381, doi: 10.1016/j.future.2020.03.050
. https://www.sciencedirect.
com/science/article/pii/S0167739X19320874
.
[78] R.M. Abdelmoneem, A. Benslimane, E. Shaaban, Mobility-aware task schedul-
ing in cloud-fog IoT-based healthcare architectures, Comput. Netw. 179
(2020) 107348, doi: 10.1016/j.comnet.2020.107348
. https://www.sciencedirect.
com/science/article/pii/S1389128619313106
.
[79] A.R. Hameed, S.u. Islam, I. Ahmad, K. Munir, Energy- and performance-aware load-
balancing in vehicular fog computing, Sustain. Comput. 30 (2021) 100454, doi: 10.
1016/j.suscom.2020.100454
. https://www.sciencedirect.com/science/article/pii/
S2210537920301797
.
[80] L. Zhou, H. Guo, G. Deng, A fog computing based approach to DDos mitigation
in IIot systems, Comput. Secur. 85 (2019) 51–62, doi: 10.1016/j.cose.2019.04.017
.
https://www.sciencedirect.com/science/article/pii/S0167404818311349
.
[81] R. Amin, S. Kunal, A. Saha, D. Das, A. Alamri, CFSec: password based secure com-
munication protocol in cloud-fog environment, J. Parallel. Distrib. Comput. 140
(2020) 52–62, doi: 10.1016/j.jpdc.2020.02.005
. https://www.sciencedirect.com/
science/article/pii/S0743731520301076
.
[82] P. Gope, LAAP: lightweight anonymous authentication protocol for D2D-
aided fog computing paradigm, Comput. Secur. 86 (2019) 223–237,
doi: 10.1016/j.cose.2019.06.003
. https://www.sciencedirect.com/science/article/
pii/S016740481831160X
.
[83] Deepali, K. Bhushan, DDoS attack defense framework for cloud using fog com-
puting, in: 2017 2nd IEEE International Conference on Recent Trends in Elec-
tronics, Information Communication Technology (RTEICT), 2017, pp. 534–538,
doi: 10.1109/RTEICT.2017.8256654
.
[84] Deepali, K. Bhushan, DDoS attack mitigation and resource provisioning in cloud
using fog computing, in: 2017 International Conference On Smart Technologies For
18
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
Smart Nation (SmartTechCon), 2017, pp. 308–313, doi: 10.1109/SmartTechCon.
2017.8358387
.
[85] M. Heydari, A. Mylonas, V. Katos, E. Balaguer-Ballester, V.H.F. Tafreshi, E. Benkhe-
lifa, Uncertainty-aware authentication model for fog computing in IoT, in:
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC),
2019, pp. 52–59, doi: 10.1109/FMEC.2019.8795332 .
[86] T. Ni, X. Gu, H. Wang, Y. Li, Real-time detection of application-layer DDos attack
using time series analysis, J. Control Sci. Eng. 2013 (2013) e821315, doi: 10.1155/
2013/821315
. Publisher: Hindawi.
[87] Y. Winnie, U. E, D.M. Ajay, Enhancing data security in IoT healthcare services using
fog computing, in: 2018 International Conference on Recent Trends in Advance
Computing (ICRTAC), 2018, pp. 200–205, doi: 10.1109/ICRTAC.2018.8679404
.
[88] S. Mahmood, M. Gohar, J.-G. Choi, S.-J. Koh, H. Alquhayz, M. Khan, Digital cer-
ticate verication scheme for smart grid using fog computing (FONICA), Sustain-
ability 13 (5) (2021) 2549, doi: 10.3390/su13052549
. Number: 5 Publisher: Mul-
tidisciplinary Digital Publishing Institute.
[89] G. Sun, S. Sun, J. Sun, H. Yu, X. Du, M. Guizani, Security and privacy preservation
in fog-based crowd sensing on the internet of vehicles, J. Netw. Comput. Appl. 134
(2019) 89–99, doi: 10.1016/j.jnca.2019.02.018
. https://www.sciencedirect.com/
science/article/pii/S1084804519300694
.
[90] T.D. Dang, D. Hoang, A data protection model for fog computing, in: 2017 Sec-
ond International Conference on Fog and Mobile Edge Computing (FMEC), 2017,
pp. 32–38, doi: 10.1109/FMEC.2017.7946404
.
[91] F. Karatas, I. Korpeoglu, Fog-based data distribution service (f-DAD) for inter-
net of things (IoT) applications, Future Generat. Comput. Syst. 93 (2019) 156–
169, doi: 10.1016/j.future.2018.10.039
. https://www.sciencedirect.com/science/
article/pii/S0167739X18315310
.
[92] S. Dehnavi, H.R. Faragardi, M. Kargahi, T. Fahringer, A reliability-aware resource
provisioning scheme for real-time industrial applications in a fog-integrated smart
factory, Microprocess Microsyst. 70 (2019) 1–14, doi: 10.1016/j.micpro.2019.05.
011
. https://www.sciencedirect.com/science/article/pii/S0141933118304629 .
[93] P. Gazori, D. Rahbari, M. Nickray, Saving time and cost on the scheduling of
fog-based IoT applications using deep reinforcement learning approach, Future
Generat. Comput. Syst. 110 (2020) 1098–1115, doi: 10.1016/j.future.2019.09.060
.
https://www.sciencedirect.com/science/article/pii/S0167739X19308702
.
[94] Y. Nan, W. Li, W. Bao, F.C. Delicato, P.F. Pires, Y. Dou, A.Y. Zomaya, Adaptive
energy-aware computation ooading for cloud of things systems, IEEE Access
5 (2017) 23947–23957, doi: 10.1109/ACCESS.2017.2766165
. Conference Name:
IEEE Access.
[95] Z. Sun, L. Wei, C. Xu, T. Wang, Y. Nie, X. Xing, J. Lu, An energy-ecient cross-layer-
sensing clustering method based on intelligent fog computing in WSNs, IEEE Ac-
cess 7 (2019) 144165–144177, doi: 10.1109/ACCESS.2019.2944858
. Conference
Name: IEEE Access.
[96] X. Chen, Y. Zhou, L. Yang, L. Lv, An energy-ecient mixed-task paradigm in re-
source allocation for fog computing, in: 2020 IEEE Wireless Communications and
Networking Conference (WCNC), 2020, pp. 1–6, doi: 10.1109/WCNC45663.2020.
9120527
. ISSN: 1558-2612.
[97] R. Oma, S. Nakamura, D. Duolikun, T. Enokido, M. Takizawa, An energy-ecient
model for fog computing in the internet of things (IoT), Internet of Things 1–
2 (2018) 14–26, doi: 10.1016/j.iot.2018.08.003
. https://www.sciencedirect.com/
science/article/pii/S2542660518300386
.
[98] S. Wang, X. Huang, Y. Liu, R. Yu, CachinMobile: an energy-ecient users
caching scheme for fog computing, in: 2016 IEEE/CIC International Conference
on Communications in China (ICCC), 2016, pp. 1–6, doi: 10.1109/ICCChina.2016.
7636852
.
[99] Z. Ning, P. Dong, X. Wang, L. Guo, J.J.P.C. Rodrigues, X. Kong, J. Huang,
R.Y.K. Kwok, Deep reinforcement learning for intelligent internet of vehicles: an
energy-ecient computational ooading scheme, IEEE Trans. Cognit. Commun.
Networking 5 (4) (2019) 1060–1072, doi: 10.1109/TCCN.2019.2930521 . Confer-
ence Name: IEEE Transactions on Cognitive Communications and Networking.
[100] O. Akrivopoulos, I. Chatzigiannakis, C. Tselios, A. Antoniou, On the deployment
of healthcare applications over fog computing infrastructure, in: 2017 IEEE 41st
Annual Computer Software and Applications Conference (COMPSAC), volume 2,
2017, pp. 288–293, doi: 10.1109/COMPSAC.2017.178 . ISSN: 0730-3157.
[101] M. Bhatia, S.K. Sood, A. Manocha, Fog-inspired smart home environment
for domestic animal healthcare, Comput. Commun. 160 (2020) 521–533,
doi: 10.1016/j.comcom.2020.07.004
. https://www.sciencedirect.com/science/
article/pii/S0140366419312496
.
[102] M. Taneja, J. Byabazaire, N. Jalodia, A. Davy, C. Olariu, P. Malone, Ma-
chine learning based fog computing assisted data-driven approach for early
lameness detection in dairy cattle, Comput. Electron. Agric. 171 (2020)
105286, doi: 10.1016/j.compag.2020.105286
. https://www.sciencedirect.com/
science/article/pii/S016816991931840X
.
[103] R. Jindal, N. Kumar, H. Nirwan, MTFCT: a task ooading approach for fog comput-
ing and cloud computing, in: 2020 10th International Conference on Cloud Com-
puting, Data Science Engineering (Conuence), 2020, pp. 145–149, doi: 10.1109/
Conuence47617.2020.9058209
.
[104] E. Sopin, A. Daraseliya, L. Correia, Performance Analysis of the ooading scheme
in a fog computing system, in: 2018 10th International Congress on Ultra Modern
Telecommunications and Control Systems and Workshops (ICUMT), 2018, pp. 1–5,
doi: 10.1109/ICUMT.2018.8631245
. ISSN: 2157-023X.
[105] M. Tortonesi, M. Govoni, A. Morelli, G. Riberto, C. Stefanelli, N. Suri, Tam-
ing the IoT data deluge: an innovative information-centric service model for
fog computing applications, Future Generat. Comput. Syst. 93 (2019) 888–
902, doi: 10.1016/j.future.2018.06.009
. https://www.sciencedirect.com/science/
article/pii/S0167739X17306702
.
[106] A.A. Alli, M.M. Alam, Seco-FCIot: machine learning based secure ooading
in fog-cloud of things for smart city applications, Internet of Things 7 (2019)
100070, doi: 10.1016/j.iot.2019.100070
. https://www.sciencedirect.com/science/
article/pii/S2542660518301938
.
[107] M. Bhatia, S.K. Sood, S. Kaur, Quantum-based predictive fog scheduler for IoT ap-
plications, Comput. Ind. 111 (2019) 51–67, doi: 10.1016/j.compind.2019.06.002
.
https://www.sciencedirect.com/science/article/pii/S016636151930140X
.
[108] P.H. Vilela, J.J.P.C. Rodrigues, P. Solic, K. Saleem, V. Furtado, Performance evalu-
ation of a fog-assisted IoT solution for e-health applications, Future Generat. Com-
put. Syst. 97 (2019) 379–386, doi: 10.1016/j.future.2019.02.055
. https://www.
sciencedirect.com/science/article/pii/S0167739X18323458
.
[109] W. Wu, S. Pirbhulal, A.K. Sangaiah, S.C. Mukhopadhyay, G. Li, Optimization of sig-
nal quality over comfortability of textile electrodes for ECG monitoring in fog com-
puting based medical applications, Future Generat. Comput. Syst. 86 (2018) 515–
526, doi: 10.1016/j.future.2018.04.024
. https://www.sciencedirect.com/science/
article/pii/S0167739X18300621
.
[110] Z. Rejiba, X. Masip-Bruin, E. Marín-Tordera, Towards user-centric, switching cost-
aware fog node selection strategies, Future Generat. Comput. Syst. 117 (2021) 359–
368, doi: 10.1016/j.future.2020.12.006
. https://www.sciencedirect.com/science/
article/pii/S0167739X20330685
.
[111] R. Mahmud, S.N. Srirama, K. Ramamohanarao, R. Buyya, Prot-aware applica-
tion placement for integrated fog–cloud computing environments, J. Parallel Dis-
trib. Comput. 135 (2020) 177–190, doi: 10.1016/j.jpdc.2019.10.001
. https://www.
sciencedirect.com/science/article/pii/S0743731519300346
.
[112] M. Pourkiani, M. Abedi, M.A. Tahavori, Improving the quality of service in WBSN
based healthcare applications by using fog computing, in: 2019 International
Conference on Information and Communications Technology (ICOIACT), 2019,
pp. 266–270, doi: 10.1109/ICOIACT46704.2019.8938448
.
[113] R. Yang, Q. Xu, M.H. Au, Z. Yu, H. Wang, L. Zhou, Position based cryptog-
raphy with location privacy: a step for fog computing, Future Generat. Com-
put. Syst. 78 (2018) 799–806, doi: 10.1016/j.future.2017.05.035
. https://www.
sciencedirect.com/science/article/pii/S0167739X17311032
.
[114] S. Khan, S. Parkinson, Y. Qin, Fog computing security: a review of current appli-
cations and security solutions, J. Cloud Comput. 6 (1) (2017) 19, doi: 10.1186/
s13677- 017- 0090- 3
.
[115] S. Parikh, D. Dave, R. Patel, N. Doshi, Security and privacy issues in
cloud, fog and edge computing, Procedia Comput. Sci. 160 (2019) 734–
739, doi: 10.1016/j.procs.2019.11.018
. https://www.sciencedirect.com/science/
article/pii/S1877050919317181
.
[116] H. Faris, A.M. Al-Zoubi, A.A. Heidari, I. Aljarah, M. Mafarja, M.A. Hassonah, H. Fu-
jita, An intelligent system for spam detection and identication of the most rel-
evant features based on evolutionary random weight networks, Inf. Fusion 48
(2019) 67–83, doi: 10.1016/j.inus.2018.08.002
. https://www.sciencedirect.com/
science/article/pii/S1566253518303968
.
[117] A. Anwar, T. Halabi, M. Zulkernine, Cloud-based sybil attack detection scheme for
connected vehicles, in: 2019 3rd Cyber Security in Networking Conference (CSNet),
2019, pp. 114–121, doi: 10.1109/CSNet47905.2019.9108923
.
[118] D.R. Pattanayak, V.K. Dwivedi, V. Karwal, On the physical layer security of hybrid
RF-FSO system in presence of multiple eavesdroppers and receiver diversity, Opt.
Commun. 477 (2020) 126334, doi: 10.1016/j.optcom.2020.126334
. https://www.
sciencedirect.com/science/article/pii/S0030401820307513
.
[119] G. GeeksForGeeks, Basic network attacks in computer network, 2017, https://
www.geeksforgeeks.org/basic- network- attacks- in- computer- network/
.
[120] H.A. Kholidy, Detecting impersonation attacks in cloud computing environments
using a centric user proling approach, Future Generat. Comput. Syst. 117
(2021) 299–320, doi: 10.1016/j.future.2020.12.009
. https://www.sciencedirect.
com/science/article/pii/S0167739X20330715
.
[121] K. Sarwar, S. Yongchareon, J. Yu, S. ur Rehman, Lightweight, divide-and-conquer
privacy-preserving data aggregation in fog computing, Future Generat. Com-
put. Syst. 119 (2021) 188–199, doi: 10.1016/j.future.2021.02.013
. https://www.
sciencedirect.com/science/article/pii/S0167739X21000650
.
[122] M. Banikhalaf, M.A. Ottom, M. Obiedat, N. Hamadneh, A framework for fog virtual
trac light system, . Vol. (02) (2005) 11
.
[123] C. Corporation, A sensible guide to latency management, 2015, https://business.
comcast.com/community/browse- all/details/a- sensible- guide- to- latency-
management
.
[124] R. Rapuzzi, M. Repetto, Building situational awareness for network threats in
fog/edge computing: emerging paradigms beyond the security perimeter model,
Future Generat. Comput. Syst. 85 (2018) 235–249, doi: 10.1016/j.future.2018.04.
007
. https://www.sciencedirect.com/science/article/pii/S0167739X17327978 .
[125] X. Peng, K. Ota, M. Dong, A broad learning-driven network trac analysis system
based on fog computing paradigm, China Commun. 17 (2) (2020) 1–13, doi: 10.
23919/JCC.2020.02.001
. Conference Name: China Communications.
[126] K.N. Tun, A.M. Myat Paing, Resource aware placement of IoT devices in
fog computing, in: 2020 International Conference on Advanced Informa-
tion Technologies (ICAIT), 2020, pp. 176–181, doi: 10.1109/ICAIT51105.2020.
9261787
.
[127] Y. Shi, G. Ding, H. Wang, H.E. Roman, S. Lu, The fog computing service for health-
care, in: 2015 2nd International Symposium on Future Information and Communi-
cation Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015, pp. 1–5,
doi: 10.1109/Ubi- HealthTech.2015.7203325
.
[128] M. Asif-Ur-Rahman, F. Afsana, M. Mahmud, M.S. Kaiser, M.R. Ahmed, O. Kai-
wartya, A. James-Taylor, Toward a heterogeneous mist, fog, and cloud-based
framework for the internet of healthcare things, IEEE Internet Things J. 6 (3) (2019)
4049–4062, doi: 10.1109/JIOT.2018.2876088
. Number: 3 Conference Name: IEEE
Internet of Things Journal.
19
R. Das and M.M. Inuwa Telematics and Informatics Reports 10 (2023) 100049
[129] S. Chakraborty, S. Bhowmick, P. Talaga, D.P. Agrawal, Fog networks in healthcare
application, in: 2016 IEEE 13th International Conference on Mobile Ad Hoc and
Sensor Systems (MASS), 2016, pp. 386–387, doi: 10.1109/MASS.2016.065
. ISSN:
2155-6814.
[130] S. Trilles, J. Torres-Sospedra, Ó. Belmonte, F.J. Zarazaga-Soria, A. Gonzlez-Prez,
J. Huerta, Development of an open sensorized platform in a smart agriculture con-
text: a vineyard support system for monitoring mildew disease, Sustain. Comput. 28
(2020) 100309, doi: 10.1016/j.suscom.2019.01.011 . https://www.sciencedirect.
com/science/article/pii/S2210537918302270
.
[131] T.-C. Hsu, H. Yang, Y.-C. Chung, C.-H. Hsu, A creative IoT agriculture platform
for cloud fog computing, Sustain. Comput. (2018), doi: 10.1016/j.suscom.2018.10.
006
. http://www.sciencedirect.com/science/article/pii/S2210537918303275 .
[132] G.M.S. Rahman, T. Dang, M. Ahmed, Deep reinforcement learning based computa-
tion ooading and resource allocation for low-latency fog radio access networks,
Intell. Converg. Netw. 1 (3) (2020) 243–257, doi: 10.23919/ICN.2020.0020
. Con-
ference Name: Intelligent and Converged Networks.
[133] B. Jia, H. Hu, Y. Zeng, T. Xu, Y. Yang, Double-matching resource allocation strat-
egy in fog computing networks based on cost eciency, J. Commun. Netw. 20
(3) (2018) 237–246, doi: 10.1109/JCN.2018.000036
. Conference Name: Journal
of Communications and Networks.
[134] Q.D. La, M.V. Ngo, T.Q. Dinh, T.Q.S. Quek, H. Shin, Enabling intelligence in
fog computing to achieve energy and latency reduction, Digit. Commun. Netw. 5
(1) (2019) 3–9, doi: 10.1016/j.dcan.2018.10.008
. https://www.sciencedirect.com/
science/article/pii/S2352864818301081
.
[135] T. Zhang, Z. Shen, J. Jin, X. Zheng, A. Tagami, X. Cao, Achieving democracy in
edge intelligence: afog-based collaborative learning scheme, IEEE Internet Things
J. 8 (4) (2021) 2751–2761, doi: 10.1109/JIOT.2020.3020911
. Conference Name:
IEEE Internet of Things Journal.
[136] E. Gomes, F. Costa, C. De Rolt, P. Plentz, M. Dantas, A survey from real-time to near
real-time applications in fog computing environments, Telecom 2 (4) (2021) 489–
517, doi: 10.3390/telecom2040028
. Number: 4 Publisher: Multidisciplinary Digital
Publishing Institute, https://www.mdpi.com/2673-4001/2/4/28
.
[137] S.M. Salman, T.A. Sitompul, A.V. Papadopoulos, T. Nolte, Fog computing for aug-
mented reality: trends, challenges and opportunities, in: 2020 IEEE International
Conference on Fog Computing (ICFC), 2020, pp. 56–63, doi: 10.1109/ICFC49376.
2020.00017 .
[138] M. Z. Gunduz and R. Das, Cyber-security on smart grid: Threats and potential so-
lutions, Elsevier, Computer Networks, vol. 169, p. 107094, Mar. 2020
[139] R. Das, G. Tuna, Machine-to-machine communications for smart homes, Interna-
tional Journal of Computer Networks and Applications 2 (4) (2015) 196–202
.
Resul Das is a professor and chair in the Department of
Software Engineering, Technology Faculty, Firat University,
where he has been a faculty member since 2011. He grad-
uated with B.Sc. and M.Sc. degrees from the Department of
Computer Science at Firat University in 1999 and 2002 respec-
tively. Then he completed his Ph.D. degree at the Department
of Electrical-Electronics Engineering at the same university in
2008. He served as both lecturer and network administrator at
the Department of Informatics at Firat University from 2000
to 2011. In addition, he is the CCNA and CCNP instructor and
the coordinator of the
Cisco Networking Academy Program
since 2002 at this university. He worked between September
2017 and June 2018 as a visiting professor at the Department
of Computing Science at the University of Alberta, Edmonton,
Canada supported by the TÜB İ TAK-BIDEB 2219 Post-Doctoral
Fellowship. He has many journal papers and international con-
ference proceedings. he served as Associate Editor for the
Journal of IEEE Access and the Turkish Journal of Electrical
Engineering and Computer Science from 2018 to 2021. He en-
tered the 2% of the "World’s Most Inuential Scientists" list
published by Stanford University researchers in 2020, 2021,
and 2022. His
current research areas include computer net-
works and security, cyber-security, software design methods,
software testing, IoT/M2M applications, graph visualization,
knowledge discovery, and data fusion.
M. Muhammad Inuwa obtained his B.Sc. degree from the De-
partment of Computer Science at Bayero University in Kano in
2010. Then he completed his Master’s degree at Firat Univer-
sity’s Department of Software Engineering in 2018, and cur-
rently, he is a Ph.D. student in the same department. Addi-
tionally, he works as a lecturer in the Department of Software
Engineering, Federal University Dutse, Jigawa State, Nigeria.
His current research areas include fog computing, communi-
cation networks, cyber-security, and internet of things.
20
... As efficiency and quality of service stand as important objectives in the world of computing, it is viewed as a promising application (Das et al. 2023). ...
... Just as the natural phenomena of fog are perceived when a cloud is close to the earth, FC was conceived to describe the computational principle that aims to bring the benefits of the cloud closer to end-devices or users. For this purpose, it is considered a highly distributed and decentralized computing model, combined with the cloud, but with processing also being executed at the edge of the network, facilitating operation of applications not previously feasible due to the high latency in communication between the cloud and a vast multitude of devices (Hazra et al. 2023;Li et al. 2023;Tomar et al. 2023; for a recent review, see Das et al. 2023;Srirama 2024). Compared with macro-data cloud centers, the fog consists of lightweight micro-cloud or nano-datacenters (m/nDCs). ...
... Due to the widespread use of smart gadgets, colossal amounts of data are being generated and transmitted via the internet. Thus, the need for efficient algorithms to manage data, fog devices, and cloud servers is also expected to grow (Das and Inuwa 2023). In this regard, there are several fundamental challenges that marketing science and informatics will have to investigate. ...
Article
Full-text available
Marketing and consumer research use a variety of data and electronic measurement devices for research, theory-building, and applied decision-making. Managing data deluge produced by ‘smart devices’ and internet of things (IoT) actuators and sensors is one of the challenges faced by managers when using IoT systems. With the advent of the cloud-based IoT and artificial intelligence, which are advancing a ‘smart world’ and introducing automation in many application areas, such as ‘smart marketing,’ a need has arisen for various modifications to support the IoT devices that are at the center of the automation world, including recent language models like, ChatGPT and Bart, and technologies like nanotechnology. The article introduces the marketing community to a recent computing development: IoT-driven fog computing (FC)—an emerging concept that decentralizes operations, management, and data into the network utilizing a distributed and federated computing paradigm. Although numerous research studies have been published on ‘smart’ applications, none hitherto have been conducted on fog-based smart marketing. FC is considered a novel computational system, which can mitigate latency and improve bandwidth utilization for autonomous marketing applications requiring real-time processing of ‘big data’ typical of smart marketing ecosystems.
... Furthermore, the 5G network's mMTC capabilities ensure reliable and efficient communication between these devices and fog/cloud resources. Fog computing brings security and authentication challenges that must be carefully addressed [10]. Security and authentication challenges in fog computing arise due to the distributed and heterogeneous nature of the environment, where a variety of devices, communication protocols, and data processing locations are involved. ...
... • Fog computing has limited physical resources, including processing power and memory. This limitation makes it challenging to implement strong security measures, leaving resources more vulnerable to attacks [10]. • ...
Article
Full-text available
The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and fog computing offloads IoT processing. Integrating 5G and fog computing can address cloud computing’s deficiencies, but security challenges remain, especially in Authentication and Key Agreement aspects due to the distributed and dynamic nature of fog computing. This study presents an innovative mutual Authentication and Key Agreement protocol that is specifically tailored to meet the security needs of fog computing in the context of the edge–fog–cloud three-tier architecture, enhanced by the incorporation of the 5G network. This study improves security in the edge–fog–cloud context by introducing a stateless authentication mechanism and conducting a comparative analysis of the proposed protocol with well-known alternatives, such as TLS 1.3, 5G-AKA, and various handover protocols. The suggested approach has a total transmission cost of only 1280 bits in the authentication phase, which is approximately 30% lower than other protocols. In addition, the suggested handover protocol only involves two signaling expenses. The computational cost for handover authentication for the edge user is significantly low, measuring 0.243 ms, which is under 10% of the computing costs of other authentication protocols.
... The advent of emerging distributed computing systems has made possible the execution of computationally demanding, data-intensive, and time-sensitive applications, significantly enhancing users' quality of experience (QoE) across diverse domains. 1,2 These applications include virtual and augmented reality, interactive gaming, video streaming, healthcare, entertainment, big data analytics, blockchain, cryptocurrencies, content delivery, and several similar. [3][4][5][6][7] These applications mainly use conventional networking infrastructures such as cloud computing, edge computing, and fog computing which are established and extensively utilized approaches. ...
Article
Full-text available
Recent advancements in distributed computing systems have shown promising prospects in enabling the effective usage of many next‐generation applications. These applications include a wide range of fields, such as healthcare, interactive gaming, video streaming, and other related technologies. Among such solutions are the evolving vehicular fog computing (VFC) frameworks that make use of IEEE and 3GPP protocols and use advanced optimization algorithms. However, these approaches often rely on outdated protocols or computationally intensive mathematical techniques for solving or representing their optimization models. Additionally, some of these frameworks have not thoroughly considered the type of application during their evaluation and validation phases. In response to these challenges, we have developed the “predictive analytics and modules” (PAM) framework, which operates on a time and event‐driven basis. It utilizes up‐to‐date 3GPP protocols to address the inherent unpredictability of VFC‐enabled distributed computing systems required in smart healthcare systems. Through a combination of a greedy heuristic approach and a distributed offloading architecture, PAM efficiently optimizes decisions related to task offloading and computation allocation. This is achieved through specialized algorithms that provide support to computationally weaker devices, all within a time frame of under 100 ms. To assess the performance of PAM in comparison to three benchmark methodologies, the evaluation pathways that we employed are average response time, probability density function, pareto‐analysis, algorithmic run time, and algorithmic complexity.
... This context data, such as the resources of the infrastructure to optimize, the services that are executed, the number of users connected, etc., determines the template of the solutions of the GA. Consequently, this phase could be performed with some kind of context-awareness process in each worker that joins the execution of the optimization algorithm [30]. Alternatively, the context data could be provided by a central entity that stores these data, avoiding the context-aware discovering process. ...
Preprint
Full-text available
The increasing complexity of fog computing environments calls for efficient resource optimization techniques. In this paper, we propose and evaluate three distributed designs of a genetic algorithm (GA) for resource optimization in fog computing, within an increasing degree of distribution. The designs leverage the execution of the GA in the fog devices themselves by dealing with the specific features of this domain: constrained resources and widely geographical distribution of the devices. For their evaluation, we implemented a benchmark case using the NSGA-II for the specific problem of optimizing the fog service placement, according to the guidelines of our three distributed designs. These three experimental scenarios were compared with a control case, a traditional centralized version of this GA algorithm, considering solution quality and network overhead. The results show that the design with the lowest distribution degree, which keeps centralized storage of the objective space, achieves comparable solution quality to the traditional approach but incurs a higher network load. The second design, which completely distributes the population between the workers, reduces network overhead but exhibits lower solution diversity while keeping enough good results in terms of optimization objective minimization. Finally, the proposal with a distributed population and that only interchanges solution between the workers' neighbors achieves the lowest network load but with compromised solution quality.
... FC, a pivotal concept in the realm of distributed computing, is engineered to support Internet of Things (IoT) applications efficiently, especially those demanding realtime responses [44]. As a complement to traditional cloud computing, it aspires to leverage edge resources strategically positioned closer to end-users [12]. The core objective is reducing reliance on remote cloud data centers, reducing latency, and decreasing network bandwidth requirements. ...
Article
Full-text available
Load balancing is crucial in distributed systems like fog computing, where efficiency is paramount. Offloading with different approaches is the key to balancing the load in distributed environments. Static offloading (SoA) falls short in heterogeneous networks, necessitating dynamic offloading to reduce latency in time-sensitive tasks. However, prevalent dynamic offloading (PoA) solutions often come with hidden costs that impact sensitive applications, including decision time, networks congested and distance offloading. This paper introduces the Hybrid Offloading (HybOff) algorithm, which substantially enhances load balancing and resource utilization in fog networks, addressing issues in both static and dynamic approaches while leveraging clustering theory. Its goal is to create an uncomplicated low-cost offloading approach that enhances IoT application performance by eliminating the consequences of hidden costs regardless of network size. Experimental results using the iFogSim simulation tool show that HybOff significantly reduces offloading messages, distance, and decision-offloading consequences. It improves load balancing by 97%, surpassing SoA (64%) and PoA (88%). Additionally, it increases system utilization by an average of 50% and enhances system performance 1.6 times and 1.4 times more than SoA and PoA, respectively. In summary, this paper tries to introduce a new offloading approach in load balancing research in fog environments.
... This context data, such as the resources of the infrastructure to optimize, the services that are executed, the number of users connected, etc., determines the template of the solutions of the GA. Consequently, this phase could be performed with a context-awareness process in each worker that joins the execution of the optimization algorithm [49]. Alternatively, the context data could be provided by a central entity that stores these data, avoiding the context-aware discovering process. ...
... The most important of these criteria include energy consumption, priority, delay, throughput and cost. Service placement techniques try to maximize (or minimize) the values of these criteria based on their proposed design and system performance [49]. In this paper, while introducing, reviewing and comparing the latest available methods of service placement in IoT, MEC 1 and VANET networks, a taxonomy of these methods based on the optimization strategies used by them is introduced. ...
Article
Full-text available
With the rapid expansion of the Internet of Things and the surge in the volume of data exchanged in it, cloud computing became more significant. To face the challenges of the cloud, the idea of fog computing was formed. The heterogeneity of nodes, distribution, and limitation of their resources in fog computing in turn led to the formation of the service placement problem. In service placement, we are looking for the mapping of the requested services to the available nodes so that a set of Quality-of-Service objectives are satisfied. Since the problem is NP-hard, various methods have been proposed to solve it, each of which has its advantages and shortcomings. In this survey paper, while reviewing the most prominent state-of-the-art service placement methods by presenting a taxonomy based on their optimization strategy, the advantages, disadvantages, and applications of each category of methods are discussed. Consequently, recommendations for future works are presented.
... The main advantage of fog computing system compared to the traditional cloud computing paradigm and replication management in cloud storage systems [5] is that, it provides computing resources geographically close to IoT devices [6]. Therefore, the IoT devices prefer to offload their time-sensitive and performance-hungry tasks to the fog servers deployed at the edge of the network rather than sending them to a distant cloud [7][8][9][10][11]. Although fog computing is a promising solution to improve the performance of IoT applications and reduce the power consumption of IoT devices, designing an efficient algorithm for offloading the computation to achieve these goals is a challenging issue [12][13][14]. ...
Article
Full-text available
In light of the rapidly growing and advancing Internet of Things (IoT) technology, delay sensitive tasks, deadline aware tasks, and power intensive IoT applications are on the rise, the adoption of fog computing has emerged as a promising solution for problems in IoT technology. Task offloading in the Edge-Fog-Cloud environment is difficult due to the inherent limits of IoT devices in terms of computing and storage capacity, the diversity of fog servers, and the varying characteristics of IoT tasks, such as their sensitivity to delays. However, the most challenging issue is finding the best suitable device to compute the task within the deadlines, reduce the total power consumption and minimize the computation time. The proposed IOTD algorithm aims to meet the deadlines of all tasks while minimizing the total computation time and energy consumption. The results of simulation experiments confirmed that the proposed method improves the reliability of meeting deadlines, total execution time, utilization of fog devices and total energy, compared with the state-of-the-art algorithms: Artificial Bee Colony and Osmotic Approach.
Chapter
Artificial intelligence (AI) systems are systems designed by humans that, given a complex goal, act in the physical or digital dimension by perceiving their environment through data acquisition, interpreting the collected structured or unstructured data, reasoning on the knowledge, or processing the information, derived from this data and deciding the best action(s) to take to achieve the given goal. It is precisely AI's ability to carry out speedy processing and analysis of datasets that is one of its key strengths. The recent renaissance in AI largely has been driven by the successful application of deep learning — which involves training an artificial neural network with many layers (that is, a ‘deep' neural network) on huge datasets. The rise and dissemination of AI in clinical medicine will refine our diagnostic accuracy and rule-out capabilities. In this Book Chapter, we focus on the AI applications that could augment or change clinical practice, identify the impact arising from the development of AI diagnostic systems and suggest future research directions.
Conference Paper
Full-text available
The recent age of cloud computing (CC) has witnessed significant breakthroughs, notably in IoT (Internet of Things), Edge computing, Fog computing, 5G, and subsequently 6G technology. CC allows individuals and businesses to store, process, and manage their data via cloud-enabled systems to facilitate scalability, adaptability, and interconnectivity. The appropriate implementation of numerous cloud computing models aids firms in digital transformation and development with maximum productivity. However, CC integration with IoT allows an extraordinary capability and boosts economies’ ability to develop at a fast pace. Meanwhile, due to the rapid expansion of IoT, the current cloud network cannot keep abreast of the growing data loads and processing extremities, particularly in real-time. Even the most cutting-edge cloud providers are experiencing an inordinate strain as a result of the growing number of consumer and corporate devices connected to the IoT. While it has a centralized design, it lacks bandwidth and has downtime issues. High latency, lack of location awareness, outage concerns, etc., are among the issues that cloud services for IoT confront. Furthermore, due to uninterrupted operating states, the massive volume of data created by the IoT is increasing enormously. IoT devices are creating a flood of data, disrupting predictable data processing and analytics capabilities well managed by the cloud. As a result, securing this ocean of data has become an elite concern for researchers and cyber experts, as organizations jeopardize their reputation and users’ privacy and security. Fog computing (FC) technology has been used, which analyses and acts on the data by bringing the cloud close to the commodities, ultimately reducing the response time. This paper aims to explore various other challenges and issues of incorporating FC into analyzing IoT data.
Chapter
Full-text available
Internet applications generate massive amount of data. For processing the data, it is transmitted to cloud. Time-sensitive applications require faster access. However, the limitation with the cloud is the connectivity with the end devices. Fog was developed by Cisco to overcome this limitation. Fog has better connectivity with the end devices, with some limitations. Fog works as intermediate layer between the end devices and the cloud. When providing the quality of service to end users, scheduling plays an important role. Scheduling a task based on the end users requirement is a tedious thing. In this paper, we proposed a cloud-fog task scheduling model, which provides quality of service to end devices with proper security.
Article
Full-text available
Inadequate resources and facilities with zero latency affect the efficiencies of task scheduling (TS) and resource allocation (RA) in the fog paradigm. Only the incoming tasks can be completed within the deadline if the resource availability in the cloud and fog is symmetrically matched with them. A container-based TS algorithm (CBTSA) determines the symmetry relationship of the task/workload with the fog node (FN) or the cloud to decide the scheduling workloads (whether in the fog or a cloud). Furthermore, by allocating and de-allocating resources, the RA algorithm reduces workload delays while increasing resource utilization. However, the unbounded cloud resources and the computational difficulty of finding resource usage have not been considered in CBTSA. Hence, this article proposes an enhanced CBTSA with intelligent RA (ECBTSA-IRA), which symmetrically balances energy efficiency, cost, and the performance-effectiveness of TS and RA. Initially, this algorithm determines whether the workloads are accepted for scheduling. An energy-cost–makespan-aware scheduling algorithm is proposed that uses a directed acyclic graph (DAG) to represent the dependency of tasks in the workload as a graph. Workloads are prioritized and selected for the node to process the prioritized workload. The selected node for processing the workload might be a FN or cloud and is decided by an optimum efficiency factor that trades off the schedule length, cost, and energy. Moreover, a Markov decision process (MDP) was adopted to allocate the best resources using the reinforcement learning scheme. Finally, the investigational findings reveal the efficacy of the presented algorithms compared to the existing CBTSA in terms of various performance metrics.
Article
The importance of the big data concept, which emerged with the developments in the Internet of Things (IoT) field and the increase in the number of devices connected to the Internet, is increasing day by day. To achieve the expected improvement in speed, bandwidth, and delay with the new generation cellular technology (5G), the necessary software and hardware studies in this area gain importance. With the new generation of network technology, the number of sensors used in mission-critical and delay-sensitive systems is also increasing. Fog and edge computing technologies can offer effective solutions in solving the problems (latency, bandwidth, energy consumption) brought about by this increase. These technologies, developed for the analysis, storage, rationalization, and calculation of big data, address the distributed network structure rather than the centralized network structure. In addition, thanks to its proximity to the point where the data is generated, it is seen that it produces important solutions for delay, energy-saving, and effective use of bandwidth. Working between IoT and Cloud (big data storage and processing centers like Hadoop, Spark, Flink, etc.), effective resource allocation (RA) is an important problem for this systems to produce effective solutions in real-time data processing and response. In this study, optimization algorithms developed for RA are mentioned. Advantages and disadvantages are expressed through analyzing the studies examined, the purpose of use, calculation tool, the method, and comparison criteria.
Chapter
In the field of computing, the research conducted is largely of applied nature and for an applied research it is very vital to conduct experimentations and present results. These experimentations can be conducted using simulators, emulators, or real time testbeds. The data used to conduct these experiments can be synthetic or real. The researchers are often faced with challenges of finding a suitable instrument and environment to conduct and validate their research. This chapter presents a similar challenge of finding a suitable virtualization platform to mimic cloudlet federation and provides a viable solution by proposing a novel virtualization platform by the name of ClPyZ. The focus of this study is to highlight the fact that there is a lack of availability of simulators, emulators and virtualization platforms to conduct experimentations in this domain and a new virtualization platform is thus required. Cloudlet Computing is a variant of Mobile Edge Computing (MEC) that aims to provide the computational facility in closer proximity of the user to enhance Quality of Services (QoS) and Quality of Experience (QoE) for the resource constrained mobile devices. The concept of federation is used to pool resources among different cloudlets. ClPyZ does not only mimic a cloudlet federation but also offers resource sharing and load balancing at the cloudlet level to avoid remote request forwarding that results in improved performance. ClPyZ is an open source virtualization platform developed at Advanced Communication Networks Lab for research purposes. It can manage multiple cloudlets even if they belong to different clouds. A central broker manages all the affairs of the cloudlet federation such as cloudlet registration, finding an optimal cloudlet for task offloading and information exchange between member cloudlets. The required features for the inception of a federated cloudlet model include multi-cloud management, scalability, resource sharing, monitoring, Virtual Machine (VM) migration, and load balancing.
Article
In this paper, we consider that critical control applications and Fog applications share a Fog Computing Platform (FCP). Critical control applications are implemented as periodic hard real-time tasks and messages and have stringent timing and safety requirements, and require safety certification. Fog applications are implemented as aperiodic tasks and messages and are not critical. Such applications need different approaches to guarantee their timing and dependability requirements. We formulate an optimization problem for the joint configuration of critical control and Fog applications, such that (i) the deadlines and Quality-of-Control (QoC) of control applications are guaranteed at design-time, (ii) the configuration is extensible and supports the addition of future new control applications without requiring costly re-certification, and (iii) the design-time configuration together with the runtime Fog resource management mechanisms, can successfully accommodate multiple dynamic responsive Fog applications. We evaluate our approach on several test cases assuming scenarios for hosting both Fog applications and future critical control applications. The results show that our approach generates extensible schedules which enables Fog nodes to handle Fog applications with a shorter response time and a larger number of future control applications.
Conference Paper
Cloud computing has already demonstrated its effectiveness in managing IoT applications’ computationally intensive operations. Despite its demand, cloud is not advised for delay demanding services due to the considerable delay contributed at communication networks via data centers, and massive flow of data it may congest the network. Fog computing was created to solve this problem by increasing Cloud computing capability and improving service quality of latency-critical applications. Fog computing has gotten a lot of attention in academia, and it’s now being used in industry and healthcare. Fog computing is ideal in some cases where resources are extremely restricted and the environment is complicated, and problems like data loss, and cooperation hazards are likely to take place. One of the most difficult parts of deploying IoT services in a fog based computing model is allocation of resources. The aim of this research is to look at current load on resource allocation in a fog computing environment by considering various factors. We then examined all of these metrics to perform a comparative assessment based on various parameters in order to determine the proficiency of various resource allocation algorithms. The major goal of this study is to examine why fog computing is necessary, why resource allocation is crucial in FC, and what metrics and methods are used to solve the fog computing allocation of resource issues.
Article
The usage of connected Internet of Things (IoT) devices has increased exponentially. The data generated from these devices is used for real-time analysis to address real-world problems after processing with the help of fog servers. Various metrics are proposed in the literature to access fog servers’ performance. This paper presents a detailed review of papers focusing on fog computing metrics like offloading, resource management, QoS, and privacy & security with their parameters such as latency, execution time, makespan, etc. Fog metrics are classified as general metrics and green IoT metrics, which affect the performance of fog environments in multiple ways. The critical analysis highlights the dependency of fog environments on multiple parameters and a trade-off between these parameters is necessary while creating an optimized environment. This paper explores the tools used and optimized parameters and limitations for deeper insight. The analysis is extended for the applicability of fog environments in different application areas and future directions.