ABSTRACT
Despite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by providing elastic resources and services to end users at the edge of network, while cloud computing are more about providing resources distributed in the core network. This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and implementing fog computing systems. It also highlights some opportunities and challenges, as direction of potential future work, in related techniques that need to be considered in the context of fog computing.
- S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman, and H. Bhogan. Volley: Automated data placement for geo-distributed cloud services. In NSDI, 2010. Google ScholarDigital Library
- A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann. Applying nfv and sdn to lte mobile core gateways, the functions placement problem. In workshop on All things cellular. ACM, 2014. Google ScholarDigital Library
- F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. In workshop on Mobile cloud computing. ACM, 2012. Google ScholarDigital Library
- N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS, 2014. Google ScholarDigital Library
- C. Chen, H. Raj, S. Saroiu, and A. Wolman. ctpm: a cloud tpm for cross-device trusted applications. In NSDI, 2014. Google ScholarDigital Library
- B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Eurosys. ACM, 2011. Google ScholarDigital Library
- Cisco. Iox overview. http://goo.gl/n2mfiw, 2014.Google Scholar
- E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In Mobisys. ACM, 2010. Google ScholarDigital Library
- H. T. Dinh, C. Lee, D. Niyato, and P. Wang. A survey of mobile cloud computing: architecture, applications, and approaches. WCMC, 2013.Google ScholarCross Ref
- C. Dsouza, G.-J. Ahn, and M. Taguinod. Policy-driven security management for fog computing: Preliminary framework and a case study. In IRI. IEEE, 2014.Google ScholarCross Ref
- C. Dwork. Differential privacy. In Encyclopedia of Cryptography and Security. 2011.Google Scholar
- N. I. M. Enzai and M. Tang. A taxonomy of computation offloading in mobile cloud computing. In MobileCloud. IEEE, 2014. Google ScholarDigital Library
- ETSI. Mobile-edge computing. http://goo.gl/7NwTLE, 2014.Google Scholar
- Gil Press. Idc: Top 10 technology predictions for 2015. http://goo.gl/zFujnE, 2014.Google Scholar
- M. S. Gordon, D. A. Jamshidi, S. A. Mahlke, Z. M. Mao, and X. Chen. Comet: Code offload by migrating execution transparently. In OSDI, 2012. Google ScholarDigital Library
- K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan. Towards wearable cognitive assistance. In Mobisys. ACM, 2014. Google ScholarDigital Library
- B. Han, V. Gopalakrishnan, L. Ji, and S. Lee. Network function virtualization: Challenges and opportunities for innovations. Communications Magazine, IEEE, 2015.Google ScholarCross Ref
- H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A measurement based rogue ap detection scheme. In INFOCOM. IEEE, 2009.Google ScholarCross Ref
- H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A timing-based scheme for rogue ap detection. TPDS, 2011. Google ScholarDigital Library
- Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, and Q. Li. SMOC: a secure mobile cloud computing platform. In INFOCOM, 2015.Google ScholarCross Ref
- B. Heller, R. Sherwood, and N. McKeown. The controller placement problem. In HotSDN. ACM, 2012. Google ScholarDigital Library
- K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, and B. Koldehofe. Mobile fog: A programming model for large-scale applications on the internet of things. In ACM SIGCOMM workshop on Mobile cloud computing, 2013. Google ScholarDigital Library
- K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, and B. Koldehofe. Opportunistic spatio-temporal event processing for mobile situation awareness. In DEBS. ACM, 2013. Google ScholarDigital Library
- J. Hwang, K. Ramakrishnan, and T. Wood. Netvm: high performance and flexible networking using virtualization on commodity platforms. In NSDI. ACM, 2014. Google ScholarDigital Library
- V. Kantere, D. Dash, G. Francois, S. Kyriakopoulou, and A. Ailamaki. Optimal service pricing for a cloud cache. TKDE, 2011. Google ScholarDigital Library
- S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In INFOCOM. IEEE, 2012.Google ScholarCross Ref
- I. Ku, Y. Lu, and M. Gerla. Software-defined mobile cloud: Architecture, services and use cases. In IWCMC. IEEE, 2014.Google ScholarCross Ref
- W. Liu, T. Nishio, R. Shinkuma, and T. Takahashi. Adaptive resource discovery in mobile cloud computing. Computer Communications, 2014. Google ScholarDigital Library
- R. Lu, X. Liang, X. Li, X. Lin, and X. Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS, 2012. Google ScholarDigital Library
- H. Madsen, G. Albeanu, B. Burtschy, and F. Popentiu-Vladicescu. Reliability in the utility computing era: Towards reliable fog computing. In IWSSIP. IEEE.Google Scholar
- C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and S. Cǎpkun. Smartphones as practical and secure location verification tokens for payments. In NDSS, 2014.Google ScholarCross Ref
- J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco, and F. Huici. Clickos and the art of network function virtualization. In NSDI. ACM, 2014. Google ScholarDigital Library
- C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan. A survey of intrusion detection techniques in cloud. JNCA, 2013. Google ScholarDigital Library
- T. Nishio, R. Shinkuma, T. Takahashi, and N. B. Mandayam. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In workshop on Mobile cloud computing & networking. ACM, 2013. Google ScholarDigital Library
- E. Novak and Q. Li. Near-pri: Private, proximity based location sharing. In INFOCOM. IEEE, 2014.Google ScholarCross Ref
- B. Ottenwälder, B. Koldehofe, K. Rothermel, K. Hong, and U. Ramachandran. Recep: selection-based reuse for distributed complex event processing. In DEBS. ACM, 2014. Google ScholarDigital Library
- B. Ottenwälder, B. Koldehofe, K. Rothermel, and U. Ramachandran. Migcep: operator migration for mobility driven distributed complex event processing. In DEBS. ACM, 2013.Google ScholarDigital Library
- Z. Qian, Y. He, C. Su, Z. Wu, H. Zhu, T. Zhang, L. Zhou, Y. Yu, and Z. Zhang. Timestream: Reliable stream computation in the cloud. In Eurosys. ACM, 2013. Google ScholarDigital Library
- Z. Qin, S. Yi, Q. Li, and D. Zamkov. Preserving secondary users' privacy in cognitive radio networks. In INFOCOM, 2014 Proceedings IEEE, pages 772--780. IEEE, 2014.Google ScholarCross Ref
- A. Rial and G. Danezis. Privacy-preserving smart metering. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011. Google ScholarDigital Library
- M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. Pervasive Computing, 2009. Google ScholarDigital Library
- B. Sheng, Q. Li, and W. Mao. Data storage placement in sensor networks. In Mobihoc. ACM, 2006. Google ScholarDigital Library
- S. Smalley and R. Craig. Security enhanced (se) android: Bringing flexible mac to android. In NDSS, 2013.Google Scholar
- I. Stojmenovic. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks. In ATNAC. IEEE, 2014.Google Scholar
- I. Stojmenovic and S. Wen. The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, 2014.Google ScholarCross Ref
- H. Takabi, J. B. Joshi, and G.-J. Ahn. Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 2010. Google ScholarDigital Library
- L. M. Vaquero and L. Rodero-Merino. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 2014. Google ScholarDigital Library
- C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1--9. Ieee, 2010. Google ScholarDigital Library
- H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine for the physical world. In INFOCOM. IEEE, 2008.Google ScholarCross Ref
- H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine for pervasive environments. TPDS, 2010. Google ScholarDigital Library
- X. Wang, M. Chen, T. Taleb, A. Ksentini, and V. Leung. Cache in the air: exploiting content caching and delivery techniques for 5g systems. Communications Magazine, IEEE, 2014.Google Scholar
- D. F. Willis, A. Dasgupta, and S. Banerjee. Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In SIGCOMM workshop on Distributed cloud computing. ACM, 2014. Google ScholarDigital Library
- F. Xu, C. C. Tan, Q. Li, G. Yan, and J. Wu. Designing a practical access point association protocol. In INFOCOM. IEEE, 2010. Google ScholarDigital Library
- H. Xu and B. Li. Dynamic cloud pricing for revenue maximization. Cloud Computing, IEEE Transactions on, 2013. Google ScholarDigital Library
- L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan. A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Performance Evaluation Review, 2013. Google ScholarDigital Library
- S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010. Google ScholarDigital Library
- Y. Zhang, C. Tan, and Q. Li. Cachekeeper: a system-wide web caching service for smartphones. In Ubicomp. ACM, 2013. Google ScholarDigital Library
- J. Zhu, D. S. Chan, M. S. Prabhu, P. Natarajan, H. Hu, and F. Bonomi. Improving web sites performance using edge servers in fog computing architecture. In SOSE, 2013. Google ScholarDigital Library
Index Terms
- A Survey of Fog Computing: Concepts, Applications and Issues
Recommendations
Fog Computing to Serve the Internet of Things Applications: A Patient Monitoring System
Due to centralized nature for cloud computing and some other reasons, high mobility cannot be supported and low latency requirements for some applications such as Internet of Things (IoT) that require real time and mobility support. To satisfy such ...
All one needs to know about fog computing and related edge computing paradigms: A complete survey
AbstractWith the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages ...
A Pattern for Fog Computing
VikingPLoP '16: Proceedings of the 10th Travelling Conference on Pattern Languages of ProgramsFog Computing is a new variety of the cloud computing paradigm that brings virtualized cloud services to the edge of the network to control the devices in the IoT. We present a pattern for fog computing which describes its architecture, including its ...
Comments