A brief exploration of fog computing architecture, technologies and challenges

  • Authors

    • Ramaiah Challa
    • K Kiran Kumar
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10268
  • Cloud computing, Cyber-Physical System, Fog computing, IoT, Latency
  • Now a day’s IoT systems are being used in rapid rate, so much data is being generated by  massive ubiquitous things handling of that much data is not a simple issue it very critical task. Then again, despite the fact that that distributed computing has filled in as an efficient approach to process and store these information, in any case, challenges, for example, the expanding requests of ongoing or dormancy delicate applications and the impediment of system data transfer capacity, still can't be tackled by utilizing just cloud computing. Accordingly, another computing known as fog computing was proposed as extension of cloud computing. It brings the cloud services that are communication, computation and storage near to edge devices and users so latency can be reduced. In this papers details of fog computing are discussed.

  • References

    1. [1] Hu, P., Dhelim, S., Ning, H., &Qiu, T. (2017). Survey on fog computing: architecture, key technologies, applications and open issues. Journal of Network and Computer Applications.

      [2] Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015, November). Fog computing: Platform and applications. In Hot Topics in Web Systems and Technologies (HotWeb), 2015 Third IEEE Workshop on (pp. 73-78). IEEE.

      [3] Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6(1), 19.

      [4] Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R. H., Morrow, M. J., &Polakos, P. A. (2017). A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges. IEEE Communications Surveys & Tutorials

      [5] Mao, Y., You, C., Zhang, J., Huang, K., &Letaief, K. B. (2017). A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials, 19(4), 2322-2358.

      [6] J. Shi, J. Wan, H. Yan, H. Suo, A survey of cyber-physical systems, in: 2011 International Conference on Wireless Communications and Signal Processing (WCSP), 2011, pp. 1{6.

      [7] S. Yi, Z. Qin, and Q. Li, “Security and privacy issues of fog computing: A survey,†in International Conference on Wireless Algorithms, Systemsand Applications (WASA), 2015.

      [8] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The case for vm-based cloudlets in mobile computing,†Pervasive Computing, 2009.

      [9] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,†in workshop on Mobile cloud computing. ACM, 2012.

      [10] ETSI, “Mobile-edge computing,†http://goo.gl/7NwTLE, 2014, [Online; accessed 18-June-2015].

  • Downloads

  • How to Cite

    Challa, R., & Kiran Kumar, K. (2018). A brief exploration of fog computing architecture, technologies and challenges. International Journal of Engineering & Technology, 7(2.7), 96-98. https://doi.org/10.14419/ijet.v7i2.7.10268