A review report on challenges and opportunities of edge, fog and cloud computing by employing IoT technology

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In the future, various information and things will be connected to the network. People can now live more convenient and comfortable life where the things and information coordinated together. A world where things are connected to network is referred as IOT (Internet of Things). A huge amount of incomplete data is generated by IOT need to process and responded to very short time. This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed. To achieve this objective, cloud computing is a treated as one of the popular choice due to its scalability, storage, computational and other capabilities. However current cloud models are not intended to handle the essentials of IOT– volume, variety, and velocity of data. Moreover, as the physical distance between cloud and user increases, transmission latency increases with it, increasing response time and stressing of the user. In addition to that, the processing speed in this environment is largely dependent on the performance of user device. The viable solution to these problems is identified as Edge Computing. The Edge Computing platform works by allowing some application processing to be performed by a small edge server position between the cloud and user, and crucially in a location physically closed to the user. This paper comprehensively presents various research trends that are available in Edge, Fog computing along with a comparison is made among Cloud. Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.

     

     


  • Keywords


    IOT; Cloud Computing; Fog Computing; Edge Computing; Software Defined Networking (SDN); Network Function Virtualization (NFV); Content Distributed Networking (CDN).

  • References


      [1] Shubhashis Sengupta, Vikrant Kaulgud, VibhuSayanya Sharma; Cloud Computing Security- Trends and Research Directions; IEEE World Congress on Services 2011. David C. Chou, Amy Y Chou; Software as a Service (SaaS) as an outsourcing model: An economic Analysis.

      [2] “Cloud Computing: A Survey on its limitations and Potential Solutions” by Mohammad Manzurul Islam , Sarwar Morshed and ParijatGoswami, IJCSI, Vol 10, issue 4, No 2, July 2013, ISSN : 1694- 0784.

      [3] Nisha Peter, “FOG Computing and Its Real Time Applications”, IJE TAE, Volume 5, Issue 6, June 2015, ISSN 2250 – 2459.

      [4] Prateeksha Varshney and Yogesh Simmhan “Demystifying Fog Computing: Characterizing Architectures, Applications and Abstractions” 21-Feb-2017.

      [5] OpenFog Consortium. OpenFog Reference Architecture. https://www. openfogconsortium.org/ra/, 2017. [Online; accessed 05-Sep-2017].

      [6] A Survey on the Edge Computing for the Internet of Things Wei Yu, Fan Liang , Xiaofei He, William G. Hatcher , Chao Lu, Jie Lin, and Xinyu Yang. DOI 10.1109/ACCESS.2017.2778504, IEEE Access.

      [7] Nebbiolo Technologies -pioneers of fog Computing -difference between Fog and Edge Computing.

      [8] “Research on Key Technologies of Cloud Computing” Shufen Zhang, Hongcan Yan, Xuebin Chen, published by Elesiver, ICMPBE, 2012.

      [9] “Fog Computing: Platform and Applications” Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li published in IEEE Computer Society, DOI: 10.1109/HotWeb.2015.22, 2015.

      [10] “Key Technologies and Application of Edge Computing” by TU Yaofeng, DONG Zhenjiang, and YANG Hongzhang , DOI: 10.3969/j. issn. 1673- 5188, April 19, 2017.

      [11] “A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications” by Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo Yang, Wenbo Wang, IEEE, mar,2017.

      [12] “Fog Computing: Focusing on Mobile Users at the Edge” Tom H. Luan, Longxiang Gao, Zhi Li , Yang Xiang , Guiyi We , and Limin Sun , march-2016.

      [13] Shabnam Kumari, Surender Singh and Radha, “Fog Computing: Characteristics and Challenges”, IJETTCS, Volume 6, Issue 2, March- April, 2017, ISSN 2278 – 6856.

      [14] Fog Computing for Sustainable Smart Cities: A Survey” by Charith Perera, Yongrui Qin, Julio C. Estrella, Stephan Reiff-Marganiec, Athanasios V. Vasilakos, ACM Computing Surveys, DOI: 0000001.0000001, 2017.

      [15] “A Study on Cloud and Fog Computing Security Issues and Solutions” by Archana Lisbon A, Kavitha R, IJIRAE, Issue 3, Volume 4, ISSN: 2349-2163, March 2017.

      [16] SonaliKhairnar. "Fog Computing: A New Concept To Minimize The Attacks And To Provide Security In Cloud Computing Environment," International Journal of Research in Engineering and Technology, vol. 03, no. 09, pp. 124–127, Sep. 2014.

      [17] Ashwini, Thogaricheti, and Mrs Anuradha SG. "Fog Computing to protect real and sensitivity information in Cloud."

      [18] Raut, Rajashri, et al. "Fog Computing Using Advance security in Cloud." International Journal of Engineering Research and Technology. Vol. 3. No. 2 (February-2014). ESRSA Publications, 2014.

      [19] Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In: INFOCOM. IEEE (2013).

      [20] Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM. IEEE (2010).

      [21] Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: Preliminary framework and a case study. In: IRI. IEEE (2014).


 

View

Download

Article ID: 18808
 
DOI: 10.14419/ijet.v7i3.29.18808




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.