skip to main content
10.1145/2757384.2757397acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

A Survey of Fog Computing: Concepts, Applications and Issues

Authors Info & Claims
Published:21 June 2015Publication History

ABSTRACT

Despite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by providing elastic resources and services to end users at the edge of network, while cloud computing are more about providing resources distributed in the core network. This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and implementing fog computing systems. It also highlights some opportunities and challenges, as direction of potential future work, in related techniques that need to be considered in the context of fog computing.

References

  1. S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman, and H. Bhogan. Volley: Automated data placement for geo-distributed cloud services. In NSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann. Applying nfv and sdn to lte mobile core gateways, the functions placement problem. In workshop on All things cellular. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. In workshop on Mobile cloud computing. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Chen, H. Raj, S. Saroiu, and A. Wolman. ctpm: a cloud tpm for cross-device trusted applications. In NSDI, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Eurosys. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cisco. Iox overview. http://goo.gl/n2mfiw, 2014.Google ScholarGoogle Scholar
  8. E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In Mobisys. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. H. T. Dinh, C. Lee, D. Niyato, and P. Wang. A survey of mobile cloud computing: architecture, applications, and approaches. WCMC, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  10. C. Dsouza, G.-J. Ahn, and M. Taguinod. Policy-driven security management for fog computing: Preliminary framework and a case study. In IRI. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  11. C. Dwork. Differential privacy. In Encyclopedia of Cryptography and Security. 2011.Google ScholarGoogle Scholar
  12. N. I. M. Enzai and M. Tang. A taxonomy of computation offloading in mobile cloud computing. In MobileCloud. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. ETSI. Mobile-edge computing. http://goo.gl/7NwTLE, 2014.Google ScholarGoogle Scholar
  14. Gil Press. Idc: Top 10 technology predictions for 2015. http://goo.gl/zFujnE, 2014.Google ScholarGoogle Scholar
  15. M. S. Gordon, D. A. Jamshidi, S. A. Mahlke, Z. M. Mao, and X. Chen. Comet: Code offload by migrating execution transparently. In OSDI, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and M. Satyanarayanan. Towards wearable cognitive assistance. In Mobisys. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. Han, V. Gopalakrishnan, L. Ji, and S. Lee. Network function virtualization: Challenges and opportunities for innovations. Communications Magazine, IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  18. H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A measurement based rogue ap detection scheme. In INFOCOM. IEEE, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  19. H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A timing-based scheme for rogue ap detection. TPDS, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, and Q. Li. SMOC: a secure mobile cloud computing platform. In INFOCOM, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  21. B. Heller, R. Sherwood, and N. McKeown. The controller placement problem. In HotSDN. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, and B. Koldehofe. Mobile fog: A programming model for large-scale applications on the internet of things. In ACM SIGCOMM workshop on Mobile cloud computing, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwälder, and B. Koldehofe. Opportunistic spatio-temporal event processing for mobile situation awareness. In DEBS. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Hwang, K. Ramakrishnan, and T. Wood. Netvm: high performance and flexible networking using virtualization on commodity platforms. In NSDI. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. V. Kantere, D. Dash, G. Francois, S. Kyriakopoulou, and A. Ailamaki. Optimal service pricing for a cloud cache. TKDE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In INFOCOM. IEEE, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  27. I. Ku, Y. Lu, and M. Gerla. Software-defined mobile cloud: Architecture, services and use cases. In IWCMC. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  28. W. Liu, T. Nishio, R. Shinkuma, and T. Takahashi. Adaptive resource discovery in mobile cloud computing. Computer Communications, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H. Madsen, G. Albeanu, B. Burtschy, and F. Popentiu-Vladicescu. Reliability in the utility computing era: Towards reliable fog computing. In IWSSIP. IEEE.Google ScholarGoogle Scholar
  31. C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and S. Cǎpkun. Smartphones as practical and secure location verification tokens for payments. In NDSS, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  32. J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda, R. Bifulco, and F. Huici. Clickos and the art of network function virtualization. In NSDI. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan. A survey of intrusion detection techniques in cloud. JNCA, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. T. Nishio, R. Shinkuma, T. Takahashi, and N. B. Mandayam. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. In workshop on Mobile cloud computing & networking. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. E. Novak and Q. Li. Near-pri: Private, proximity based location sharing. In INFOCOM. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  36. B. Ottenwälder, B. Koldehofe, K. Rothermel, K. Hong, and U. Ramachandran. Recep: selection-based reuse for distributed complex event processing. In DEBS. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. B. Ottenwälder, B. Koldehofe, K. Rothermel, and U. Ramachandran. Migcep: operator migration for mobility driven distributed complex event processing. In DEBS. ACM, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Z. Qian, Y. He, C. Su, Z. Wu, H. Zhu, T. Zhang, L. Zhou, Y. Yu, and Z. Zhang. Timestream: Reliable stream computation in the cloud. In Eurosys. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Z. Qin, S. Yi, Q. Li, and D. Zamkov. Preserving secondary users' privacy in cognitive radio networks. In INFOCOM, 2014 Proceedings IEEE, pages 772--780. IEEE, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  40. A. Rial and G. Danezis. Privacy-preserving smart metering. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. Pervasive Computing, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. B. Sheng, Q. Li, and W. Mao. Data storage placement in sensor networks. In Mobihoc. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. S. Smalley and R. Craig. Security enhanced (se) android: Bringing flexible mac to android. In NDSS, 2013.Google ScholarGoogle Scholar
  44. I. Stojmenovic. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks. In ATNAC. IEEE, 2014.Google ScholarGoogle Scholar
  45. I. Stojmenovic and S. Wen. The fog computing paradigm: Scenarios and security issues. In Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  46. H. Takabi, J. B. Joshi, and G.-J. Ahn. Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. L. M. Vaquero and L. Rodero-Merino. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-preserving public auditing for data storage security in cloud computing. In INFOCOM, 2010 Proceedings IEEE, pages 1--9. Ieee, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine for the physical world. In INFOCOM. IEEE, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  50. H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine for pervasive environments. TPDS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. X. Wang, M. Chen, T. Taleb, A. Ksentini, and V. Leung. Cache in the air: exploiting content caching and delivery techniques for 5g systems. Communications Magazine, IEEE, 2014.Google ScholarGoogle Scholar
  52. D. F. Willis, A. Dasgupta, and S. Banerjee. Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In SIGCOMM workshop on Distributed cloud computing. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. F. Xu, C. C. Tan, Q. Li, G. Yan, and J. Wu. Designing a practical access point association protocol. In INFOCOM. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. H. Xu and B. Li. Dynamic cloud pricing for revenue maximization. Cloud Computing, IEEE Transactions on, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan. A framework for partitioning and execution of data stream applications in mobile cloud computing. ACM SIGMETRICS Performance Evaluation Review, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure, scalable, and fine-grained data access control in cloud computing. In INFOCOM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Y. Zhang, C. Tan, and Q. Li. Cachekeeper: a system-wide web caching service for smartphones. In Ubicomp. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. J. Zhu, D. S. Chan, M. S. Prabhu, P. Natarajan, H. Hu, and F. Bonomi. Improving web sites performance using edge servers in fog computing architecture. In SOSE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey of Fog Computing: Concepts, Applications and Issues

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          Mobidata '15: Proceedings of the 2015 Workshop on Mobile Big Data
          June 2015
          84 pages
          ISBN:9781450335249
          DOI:10.1145/2757384
          • Program Chairs:
          • Qun Li,
          • Dong Xuan

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 June 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          MOBISYS '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader