skip to main content
survey

A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet

Published:16 October 2019Publication History
Skip Abstract Section

Abstract

Sending data to the cloud for analysis was a prominent trend during the past decades, driving cloud computing as a dominant computing paradigm. However, the dramatically increasing number of devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay. It becomes difficult to meet the delay-sensitive and context-aware service requirements of IoT applications by using cloud computing alone. Facing these challenges, computing paradigms are shifting from the centralized cloud computing to distributed edge computing. Several new computing paradigms, including Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet, have emerged to leverage the distributed resources at network edge to provide timely and context-aware services. By integrating end devices, edge servers, and cloud, they form a hierarchical IoT architecture, i.e., End-Edge-Cloud orchestrated architecture to improve the performance of IoT systems. This article presents a comprehensive survey of these emerging computing paradigms from the perspective of end-edge-cloud orchestration. Specifically, we first introduce and compare the architectures and characteristics of different computing paradigms. Then, a comprehensive survey is presented to discuss state-of-the-art research in terms of computation offloading, caching, security, and privacy. Finally, some potential research directions are envisioned for fostering continuous research efforts.

References

  1. Mobile Edge Computing Introductory Technical White Paper. 2014. Retrieved from https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf.Google ScholarGoogle Scholar
  2. Mobile-Edge Computing (MEC); Service Scenarios. 2015. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/004/01.01.01_60/gs_MEC-IEG004v010101p.pdf.Google ScholarGoogle Scholar
  3. Edge computing prepares for a multi-access future. 2016. Retrieved from http://www.telecomtv.com/articles/mec/edge-computing-prepares-for-a-multi-access-future-13986/.Google ScholarGoogle Scholar
  4. Mobile-Edge Computing (MEC); Technical Requirements. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/002/01.01.01_60/gs_MEC002v010101p.pdf.Google ScholarGoogle Scholar
  5. Mobile-Edge Computing (MEC); Terminology. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/01.01.01_60/gs_MEC001v010101p.pdf.Google ScholarGoogle Scholar
  6. APIs for IOT and FOG computing. 2017. Retrieve from https://www.vanrish.com/blog/2017/12/17/apis-for-iot-and-fog-computing/.Google ScholarGoogle Scholar
  7. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021. 2017. Retrieved from https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.Google ScholarGoogle Scholar
  8. Cloud Adoption Is Growing But Forecasts Differ on How Much. 2017. Retrieved from http://fortune.com/2017/02/22/cloud-growth-forecast-gartner/.Google ScholarGoogle Scholar
  9. Mobile Edge Computing; Market Acceleration; MEC Metrics Best Practice and Guidelines. 2017. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/006/01.01.01_60/gs_MEC-IEG006v010101p.pdf.Google ScholarGoogle Scholar
  10. OpenFog Reference Architecture for Fog Computing. 2017. Retrieved from https://www.openfogconsortium.org/wp-content/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL.pdf.Google ScholarGoogle Scholar
  11. Hasti Ahlehagh and Sujit Dey. 2014. Video-aware scheduling and caching in the radio access network. IEEE/ACM Trans. Netw. 22, 5 (2014), 1444--1462.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Arif Ahmed and Ejaz Ahmed. 2016. A survey on mobile edge computing. In Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO’16). 1--8. DOI:https://doi.org/10.1109/ISCO.2016.7727082Google ScholarGoogle ScholarCross RefCross Ref
  13. Mohammed Alshiky Aisha, M. Buhari Seyed, and Barnawi Ahmed. 2017. Attribute-based access control (ABAC) for EHR in fog computing environment. Int. J. Cloud Comput.: Serv. Arch. 7, 1 (2017), 9--16.Google ScholarGoogle Scholar
  14. Moustafa Ammar, Mohamed Rizk, Ayman Abdel-Hamid, and Ahmed K. Aboul-Seoud. 2016. A framework for security enhancement in SDN-based datacenters. In Proceedings of the IFIP International Conference on New Technologies, Mobility and Security (NTMS’16). IEEE, 1--4.Google ScholarGoogle Scholar
  15. Arash Asadi, Qing Wang, and Vincenzo Mancuso. 2014. A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutor. 16, 4 (2014), 1801--1819.Google ScholarGoogle ScholarCross RefCross Ref
  16. Bahar Azari, Osvaldo Simeone, Umberto Spagnolini, and Antonia M. Tulino. 2016. Hypergraph-based analysis of clustered co-operative beamforming with application to edge caching. IEEE Wireless Commun. Lett. 5, 1 (2016), 84--87.Google ScholarGoogle ScholarCross RefCross Ref
  17. Bo Bai, Li Wang, Zhu Han, Wei Chen, and Tommy Svensson. 2016. Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework. IEEE Wireless Commun. 23, 4 (2016), 74--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ejder Bastug, Mehdi Bennis, and Mérouane Debbah. 2014. Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Commun. Mag. 52, 8 (2014), 82--89.Google ScholarGoogle ScholarCross RefCross Ref
  19. Sultan Basudan, Xiaodong Lin, and Karthik Sankaranarayanan. 2017. A privacy-preserving vehicular crowdsensing based road surface condition monitoring system using fog computing. IEEE IoT J. 4, 3 (2017), 772--782.Google ScholarGoogle Scholar
  20. Suzhi Bi and Ying Jun Zhang. 2018. Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading. IEEE Trans. Wireless Commun. 17, 6 (Jun. 2018), 4177--4190. DOI:https://doi.org/10.1109/TWC.2018.2821664Google ScholarGoogle ScholarCross RefCross Ref
  21. Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog Computing: A Platform for Internet of Things and Analytics. Springer International Publishing, Cham, 169--186. DOI:https://doi.org/10.1007/978-3-319-05029-4_7Google ScholarGoogle Scholar
  22. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proceedings of the Workshop on Mobile Cloud Computing (MCC’12). ACM, New York, NY, 13--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sem Borst, Varun Gupta, and Anwar Walid. 2010. Distributed caching algorithms for content distribution networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’10). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  24. Piotr Borylo, Artur Lason, Jacek Rzasa, Andrzej Szymanski, and Andrzej Jajszczyk. 2016. Energy-aware fog and cloud interplay supported by wide area software defined networking. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Bourdena, C. X. Mavromoustakis, G. Mastorakis, J. J. P. C. Rodrigues, and C. Dobre. 2015. Using socio-spatial context in mobile cloud process offloading for energy conservation in wireless devices. IEEE Trans. Cloud Comput. 1 (2015).Google ScholarGoogle Scholar
  26. Shiwei Cao, Xiaofeng Tao, Yanzhao Hou, and Qimei Cui. 2015. An energy-optimal offloading algorithm of mobile computing based on HetNets. In Proceedings of the IEEE International Conference on Connected Vehicles and Expo (ICCVE’15). IEEE, 254--258.Google ScholarGoogle ScholarCross RefCross Ref
  27. Sami Yangui Roch H. Glitho Monique J. Morrow Carla Mouradian, Diala Naboulsi and Paul A. Polakos. 2018. A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20, 1 (2018), 416--464.Google ScholarGoogle ScholarCross RefCross Ref
  28. Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, and Sue Moon. 2009. Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE/ACM Trans. Netw. 17, 5 (2009), 1357--1370.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Omar Chakroun and Soumaya Cherkaoui. 2016. Resource allocation for delay sensitive applications in mobile cloud computing. In Proceedings of the IEEE Conference on Local Computer Networks (LCN’16). IEEE, 615--618.Google ScholarGoogle ScholarCross RefCross Ref
  30. Binqiang Chen, Chenyang Yang, and Gang Wang. 2016. Cooperative device-to-device communications with caching. In Proceedings of the IEEE Vehicular Technology Conference (VTC’16). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  31. Binqiang Chen, Chenyang Yang, and Gang Wang. 2017. High throughput opportunistic cooperative device-to-device communications with caching. IEEE Trans. Vehic. Technol. 66, 8 (2017), 7527--7539.Google ScholarGoogle ScholarCross RefCross Ref
  32. Di Chen, Stephan Schedler, and Volker Kuehn. 2016. Backhaul traffic balancing and dynamic content-centric clustering for the downlink of fog radio access network. In Proceedings of the IEEE SPAWC. IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  33. Guangyu Chen, B.-T. Kang, Mahmut Kandemir, Narayanan Vijaykrishnan, Mary Jane Irwin, and Rajarathnam Chandramouli. 2004. Studying energy trade offs in offloading computation/compilation in java-enabled mobile devices. IEEE Trans. Parallel Distrib. Syst. 15, 9 (2004), 795--809.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Lixing Chen, Sheng Zhou, and Jie Xu. 2018. Computation peer offloading for energy-constrained mobile edge computing in small-cell networks. IEEE/ACM Trans. Netw. 26, 4 (2018), 1619--1632. DOI:https://doi.org/10.1109/TNET.2018.2841758Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Min Chen, Yixue Hao, Chin-Feng Lai, Di Wu, Yong Li, and Kai Hwang. 2018. Opportunistic task scheduling over co-located clouds in mobile environment. IEEE Trans. Serv. Comput. 11, 3 (2018), 549--561.Google ScholarGoogle ScholarCross RefCross Ref
  36. M. Chen, Y. Hao, Y. Li, C. Lai, and D. Wu. 2015. On the computation offloading at ad hoc cloudlet: Architecture and service modes. IEEE Commun. Mag. 53, 6 (Jun. 2015), 18--24. DOI:https://doi.org/10.1109/MCOM.2015.7120041Google ScholarGoogle Scholar
  37. Mingzhe Chen, Walid Saad, Changchuan Yin, and Mérouane Debbah. 2017. Echo state networks for proactive caching in cloud-based radio access networks with mobile users. IEEE Trans. Wireless Commun. 16, 6 (2017), 3520--3535.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Mingkai Chen, Lei Wang, and Jianxin Chen. 2016. Users-media cloud assisted D2D communications for distributed caching underlaying cellular network. Chin. Commun. 13, 8 (2016), 13--23.Google ScholarGoogle ScholarCross RefCross Ref
  39. Meng-Hsi Chen, Min Dong, and Ben Liang. 2016. Joint offloading decision and resource allocation for mobile cloud with computing access point. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’16). IEEE, 3516--3520.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Meng-Hsi Chen, Ben Liang, and Min Dong. 2015. A semidefinite relaxation approach to mobile cloud offloading with computing access point. In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC’15). IEEE, 186--190.Google ScholarGoogle ScholarCross RefCross Ref
  41. Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. 2016. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans. Netw. 24, 5 (2016), 2795--2808.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Mung Chiang, Sangtae Ha, I. Chih-Lin, Fulvio Risso, and Tao Zhang. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (2017), 18--20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, and Ashwin Patti. 2011. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the the 6th Conference on Computer Systems. ACM, 301--314.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Byung-Gon Chun and Petros Maniatis. 2010. Dynamically partitioning applications between weak devices and clouds. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing 8 Services: Social Networks and Beyond. ACM, 7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Hardy Corentin, Le Merrer Erwan, and Sericola Bruno. 2017. Distributed deep learning on edge-devices: Feasibility via adaptive compression. In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA’17). IEEE, 1--8.Google ScholarGoogle Scholar
  46. Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, and Paramvir Bahl. 2010. MAUI: Making smartphones last longer with code offload. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’10). ACM, 49--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112--116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Maofei Deng, Hui Tian, and Bo Fan. 2016. Fine-granularity based application offloading policy in cloud-enhanced small cell networks. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 638--643.Google ScholarGoogle Scholar
  49. Haichuan Ding and Yuguang Fang. 2018. Virtual infrastructure at traffic lights: Vehicular temporary storage assisted data transportation at signalized intersections. IEEE Trans. Vehic. Technol. 67, 12 (2018), 12452--12456.Google ScholarGoogle ScholarCross RefCross Ref
  50. Haichuan Ding, Yuanxiong Guo, Xuanheng Li, and Yuguang Fang. 2018. Beef up the edge: Spectrum-aware placement of edge computing services for the Internet of Things. IEEE Trans. Mobile Comput. (2018). DOI:https://doi.org/10.1109/TMC.2018.2883952Google ScholarGoogle Scholar
  51. Abebe Abeshu Diro, Naveen Chilamkurti, and Neeraj Kumar. 2017. Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mobile Netw. Appl. 22, 5 (2017), 848--858.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Clinton Dsouza, Gail-Joon Ahn, and Marthony Taguinod. 2014. Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE International Conference on Information Reuse and Information (IRI’14). IEEE, 16--23.Google ScholarGoogle ScholarCross RefCross Ref
  53. Sebastián Echeverría, Dan Klinedinst, Keegan Williams, and Grace A. Lewis. 2016. Establishing trusted identities in disconnected edge environments. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC’16). IEEE, 51--63.Google ScholarGoogle Scholar
  54. Khalid Elgazzar, Patrick Martin, and Hossam S. Hassanein. 2016. Cloud-assisted computation offloading to support mobile services. IEEE Trans. Cloud Comput. 4, 3 (2016), 279--292.Google ScholarGoogle ScholarCross RefCross Ref
  55. Jeffrey Erman, Alexandre Gerber, Mohammad Hajiaghayi, Dan Pei, Subhabrata Sen, and Oliver Spatscheck. 2011. To cache or not to cache: The 3G case. IEEE Internet Comput. 15, 2 (2011), 27--34.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Ertem Esiner and Anwitaman Datta. 2016. Layered security for storage at the edge: On decentralized multi-factor access control. In Proceedings of the ACM International Conference on Distributed Computing and Networking (ICDCN’16). ACM, 9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Jose Oscar Fajardo, Ianire Taboada, and Fidel Liberal. 2015. Radio-aware service-level scheduling to minimize downlink traffic delay through mobile edge computing. In Proceedings of the 7th EAI International Conference on Mobile Networks and Management. Springer, 121--134.Google ScholarGoogle ScholarCross RefCross Ref
  58. Yuan Gao, Yaoxue Zhang, and Yuezhi Zhou. 2012. A cache management strategy for transparent computing storage system. In Proceedings of the International Conference on New Trends in Computing Sciences (ICTCS’12). Springer, 651--658.Google ScholarGoogle Scholar
  59. Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Krivulev, and Gustavo Alonso. 2009. Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Proceedings of the International Middleware Conference (Middleware’09). Springer-Verlag New York, 5.Google ScholarGoogle ScholarCross RefCross Ref
  60. Negin Golrezaei, Parisa Mansourifard, Andreas F Molisch, and Alexandros G Dimakis. 2014. Base-station assisted device-to-device communications for high-throughput wireless video networks. IEEE Trans. Wireless Commun. 13, 7 (2014), 3665--3676.Google ScholarGoogle ScholarCross RefCross Ref
  61. Negin Golrezaei, Karthikeyan Shanmugam, Alexandros G. Dimakis, Andreas F. Molisch, and Giuseppe Caire. 2012. Femtocaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 1107--1115.Google ScholarGoogle ScholarCross RefCross Ref
  62. Andre S. Gomes, Bruno Sousa, David Palma, Vitor Fonseca, Zhongliang Zhao, Edmundo Monteiro, Torsten Braun, Paulo Simoes, and Luis Cordeiro. 2017. Edge caching with mobility prediction in virtualized LTE mobile networks. Future Gener. Comput. Syst. 70, 5 (2017), 148--162.Google ScholarGoogle ScholarCross RefCross Ref
  63. Mohammad Goudarzi, Zeinab Movahedi, and Masoud Nazari. 2016. Mobile cloud computing: A multisite computation offloading. In Proceedings of the IEEE International Conference on Imaging Systems and Techniques (IST’16). IEEE, 660--665.Google ScholarGoogle Scholar
  64. Jingxiong Gu, Wei Wang, Aiping Huang, Hangguan Shan, and Zhaoyang Zhang. 2014. Distributed cache replacement for caching-enable base stations in cellular networks. In Proceedings of the IEEE International Conference on Communications (ICC’14). IEEE, 2648--2653.Google ScholarGoogle ScholarCross RefCross Ref
  65. Hongzhi Guo and Jiajia Liu. 2018. Collaborative computation offloading for multiaccess edge computing over fiber--wireless networks. IEEE Trans. Vehic. Technol. 67, 5 (May 2018), 4514--4526.Google ScholarGoogle ScholarCross RefCross Ref
  66. Kiryong Ha and Mahadev Satyanarayanan. 2015. OpenStack++ for Cloudlet Deployment. Technical Report. http://elijah.cs.cmu.edu/DOCS/CMU-CS-15-113.pdfGoogle ScholarGoogle Scholar
  67. J. He, Y. Zhang, J. Lu, M. Wu, and F. Huang. 2018. Block-stream as a service: A more secure, nimble, and dynamically balanced cloud service model for ambient computing. IEEE Netw. 32, 1 (2018), 126--132.Google ScholarGoogle ScholarCross RefCross Ref
  68. Dinh T. Hoang, Chonho Lee, Dusit Niyato, and Ping Wang. 2013. A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Commun. Mobile Comput. 13, 18 (2013), 1587--1611.Google ScholarGoogle ScholarCross RefCross Ref
  69. Farhoud Hosseinpour, Payam Vahdani Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. 2016. An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Dig. Content Technol. Appl. 10, 5 (2016), 34--46.Google ScholarGoogle Scholar
  70. Yunchao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. ETSI. White Paper No. 11. Mobile Edge Computing a Key Technology Towards 5G [S]. DOI:https://doi.org/10.1007/978-3-319-05029-4_7Google ScholarGoogle Scholar
  71. Maged Ibrahim. 2016. Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18, 6 (2016), 1089--1101.Google ScholarGoogle Scholar
  72. Andriana Ioannou and Stefan Weber. 2016. A survey of caching policies and forwarding mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 18, 4 (2016), 2847--2886.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Mingyue Ji, Giuseppe Caire, and Andreas F. Molisch. 2016. Wireless device-to-device caching networks: Basic principles and system performance. IEEE J. Select. Areas Commun. 34, 1 (2016), 176--189.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Shiwei Jia, Yuan Ai, Zhongyuan Zhao, Mugen Peng, and Chunjing Hu. 2016. Hierarchical content caching in fog radio access networks: Ergodic rate and transmit latency. Chin. Commun. 13, 12 (2016), 1--14.Google ScholarGoogle ScholarCross RefCross Ref
  75. Wei Jiang, Gang Feng, and Shuang Qin. 2017. Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans. Mobile Comput. 16, 5 (2017), 1382--1393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Sladana Jos̆ilo and György Dán. 2019. Selfish decentralized computation offloading for mobile cloud computing in dense wireless networks. IEEE Trans. Mobile Comput. 18, 1 (2019), 207--220. DOI:https://doi.org/10.1109/TMC.2018.2829874Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, and Rodrigo Diaz. 2017. Securing combined fog-to-cloud system through SDN approach. In Proceedings of the Workshop on CrossCloud Infrastructures 8 Platforms (CrossCloud’17). ACM, 2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Jakub Koneáý, H. Brendan, McMahan, Daniel Ramage, and Peter Richtárik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. arXiv:1610.02527v1 (10 2016).Google ScholarGoogle Scholar
  79. Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur. 2016. A hybrid deduplication for secure and efficient data outsourcing in fog computing. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom’16). IEEE, 285--293.Google ScholarGoogle ScholarCross RefCross Ref
  80. Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, and Xinwen Zhang. 2012. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 945--953.Google ScholarGoogle ScholarCross RefCross Ref
  81. Wenyuan Kuang, Yaoxue Zhang, Yuezhi Zhou, and Huajie Yang. 2007. RBIS: Security enhancement for MRBP and MRBP2 using integrity check. J. Chin. Comput. Syst. 28, 2 (2007), 251--254.Google ScholarGoogle Scholar
  82. D. Van Le and C. Tham. 2018. A deep reinforcement learning based offloading scheme in ad-hoc mobile clouds. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’18). 760--765.Google ScholarGoogle Scholar
  83. Hongjia Li and Dan Hu. 2016. Mobility prediction based seamless RAN-cache handover in HetNet. In Proc. IEEE Wireless Communications and Networking Conference (WCNC’16). IEEE, 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Xue Lin, Yanzhi Wang, Qing Xie, and Massoud Pedram. 2015. Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Trans. Serv. Comput. 8, 2 (2015), 175--186.Google ScholarGoogle ScholarCross RefCross Ref
  85. Ying-Dar Lin, Edward T-H Chu, Yuan-Cheng Lai, and Ting-Jun Huang. 2015. Time-and-energy-aware computation offloading in handheld devices to coprocessors and clouds. IEEE Syst. J. 9, 2 (2015), 393--405.Google ScholarGoogle ScholarCross RefCross Ref
  86. Juan Liu, Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Delay-optimal computation task scheduling for mobile-edge computing systems. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’16). IEEE, 1451--1455.Google ScholarGoogle Scholar
  87. Jinzhao Liu, Yuezhi Zhou, and Di Zhang. 2016. TranSim: A simulation framework for cache-enabled transparent computing systems. IEEE Trans. Comput. 65, 10 (2016), 3171--3183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Liqing Liu, Zheng Chang, and Xijuan Guo. 2018. Socially aware dynamic computation offloading scheme for fog computing system with energy harvesting devices. IEEE IoT J. 5, 3 (Jun. 2018), 1869--1879.Google ScholarGoogle Scholar
  89. Yanchen Liu, Myung J Lee, and Yanyan Zheng. 2016. Adaptive multi-resource allocation for cloudlet-based mobile cloud computing system. IEEE Trans. Mobile Comput. 15, 10 (2016), 2398--2410.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Garcia Pedro Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. SIGCOMM Comput. Commun. Rev. 45, 5 (2015), 37--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Rongxing Lu, Kevin Heung, Arash Habibi Lashkari, and Ali A. Ghorbani. 2017. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5 (2017), 3302--3312.Google ScholarGoogle ScholarCross RefCross Ref
  92. Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. 2012. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23, 9 (2012), 1621--1631.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Pavel Mach and Zdenek Becvar. 2016. Cloud-aware power control for real-time application offloading in mobile edge computing. Trans. Emerg. Telecommun. Technol. 27, 5 (2016), 648--661.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. S. Eman Mahmoodi, R. N. Uma, and K. P Subbalakshmi. 2019. Optimal joint scheduling and cloud offloading for mobile applications. IEEE Trans. Cloud Comput. 7, 2 (2019), 301--313.Google ScholarGoogle ScholarCross RefCross Ref
  95. Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. Mobile edge computing: Survey and research outlook. arXiv preprint arXiv:1701.01090 (2017).Google ScholarGoogle Scholar
  96. Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2322--2358.Google ScholarGoogle ScholarCross RefCross Ref
  97. Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3590--3605.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2016. Power-delay tradeoff in multi-user mobile-edge computing systems. arXiv preprint arXiv:1609.06027 (2016).Google ScholarGoogle Scholar
  99. Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2017. Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans. Wireless Commun. 16, 9 (2017), 5994--6009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Muhammad Baqer Mollah, Md Abul Kalam Azad, and Athanasios Vasilakos. 2017. Secure data sharing and searching at the edge of cloud-assisted Internet of Things. IEEE Cloud Comput. 4, 1 (2017), 34--42.Google ScholarGoogle ScholarCross RefCross Ref
  101. Ei Ei Mon and Thinn Thu Naing. 2011. The privacy-aware access control system using attribute-and role-based access control in private cloud. In Proceedings of the IEEE International Conference on Broadband Network 8 Multimedia Technology (IC-BNMT’11). IEEE, 447--451.Google ScholarGoogle ScholarCross RefCross Ref
  102. Diego Montero, Marcelo Yannuzzi, Adrian Shaw, Ludovic Jacquin, Antonio Pastor, Rene Serral-Gracia, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, et al. 2015. Virtualized security at the network edge: A user-centric approach. IEEE Commun. Mag. 53, 4 (2015), 176--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. R. Morabito, I. Farris, A. Iera, and T. Taleb. 2017. Evaluating performance of containerized IoT services for clustered devices at the network edge. IEEE IoT J. 4, 4 (2017), 1019--1030.Google ScholarGoogle Scholar
  104. Chiang Mung, Ha Sangtae, I Chih-lin, Risso Fulvio, and Zhang Tao. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (Apr. 2017), 18--20. DOI:https://doi.org/10.1109/MCOM.2017.7901470Google ScholarGoogle Scholar
  105. Olga Muñoz, Antonio Pascual Iserte, Josep Vidal, and Marc Molina. 2014. Energy-latency trade-off for multiuser wireless computation offloading. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshop (WCNCW’14). IEEE, 29--33.Google ScholarGoogle ScholarCross RefCross Ref
  106. Jianbing Ni, Xiaodong Lin, Kuan Zhang, and Yong Yu. 2016. Secure and deduplicated spatial crowdsourcing: A fog-based approach. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  107. Ruifang Niu, Wenfang Song, and Yong Liu. 2013. An energy-efficient multisite offloading algorithm for mobile devices. Int. J. Distrib. Sens. Netw. 9, 3 (2013), 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  108. OECI. 2017. Retrieved from http://openedgecomputing.org/index.html.Google ScholarGoogle Scholar
  109. Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access (2017).Google ScholarGoogle Scholar
  110. Jesus Pacheco and Salim Hariri. 2016. IoT security framework for smart cyber infrastructures. In Proceedings of the IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W’16). IEEE, 242--247.Google ScholarGoogle ScholarCross RefCross Ref
  111. Seok-Hwan Park, Osvaldo Simeone, and Shlomo Shamai. 2016. Joint cloud and edge processing for latency minimization in fog radio access networks. In Proceedings of the IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC’16). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  112. Georgios Paschos, Ejder Bastug, Ingmar Land, Giuseppe Caire, and Mérouane Debbah. 2016. Wireless caching: Technical misconceptions and business barriers. IEEE Commun. Mag. 54, 8 (2016), 16--22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  113. Mach Pavel and Becvar Zdenek. 2017. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19, 3 (Thirdquarter 2017), 1628--1656.Google ScholarGoogle Scholar
  114. Mugen Peng, Shi Yan, Kecheng Zhang, and Chonggang Wang. 2016. Fog-computing-based radio access networks: Issues and challenges. IEEE Netw. 30, 4 (2016), 46--53.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Xuhong Peng, Ju Ren, Liang She, Deyu Zhang, Jie Li, and Yaoxue Zhang. 2018. BOAT: A block-streaming app execution scheme for lightweight IoT devices. IEEE IoT J. 5, 3 (2018), 1816--1829.Google ScholarGoogle Scholar
  116. Konstantinos Poularakis, George Iosifidis, Vasilis Sourlas, and Leandros Tassiulas. 2014. Multicast-aware caching for small cell networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’14). IEEE, 2300--2305.Google ScholarGoogle ScholarCross RefCross Ref
  117. Konstantinos Poularakis, George Iosifidis, and Leandros Tassiulas. 2013. Approximation caching and routing algorithms for massive mobile data delivery. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’13). IEEE, 3534--3539.Google ScholarGoogle ScholarCross RefCross Ref
  118. Kuacharoen Pramote, J. Mooney Vincent, and K. Madisetti Vijay. 2003. Identity-based authentication scheme for the Internet of Things. In Proceedings of the Conference on Design, Automation and Test in Europe Conference (DATE’03). IEEE, 912--917.Google ScholarGoogle Scholar
  119. Lingjun Pu, Xu Chen, Jingdong Xu, and Xiaoming Fu. 2016. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3887--3901.Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Praveen Kumar Rajendran. 2015. Hybrid intrusion detection algorithm for private cloud. Ind. J. Sci. Technol. 8, 35 (2015).Google ScholarGoogle Scholar
  121. Buvaneswari A. Ramanan, Lawrence M. Drabeck, Mark Haner, Nachi Nithi, Thierry E. Klein, and Chitra Sawkar. 2013. Cacheability analysis of HTTP traffic in an operational LTE network. In Proceedings of the IEEE Wireless Telecommunications Symposium (WTS’13). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  122. Ammar Rayes and Salam Samer. 2016. Internet of Things From Hype to Reality: The Road to Digitization. Springer.Google ScholarGoogle Scholar
  123. Ju Ren, Hui Guo, Chugui Xu, and Yaoxue Zhang. 2017. Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw. 31, 5 (2017), 96--105.Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Ju Ren, Yundi Guo, Deyu Zhang, Qingqing Liu, and Yaoxue Zhang. 2018. Distributed and efficient object detection in edge computing: Challenges and solutions. IEEE Netw. 32, 6 (2018), 137--143.Google ScholarGoogle ScholarCross RefCross Ref
  125. Ju Ren, Yaoxue Zhang, Ruilong Deng, Ning Zhang, Deyu Zhang, and Xuemin Shen. 2016. Joint channel access and sampling rate control in energy harvesting cognitive radio sensor networks. IEEE Trans. Emerg. Top. Comput. 7, 1 (2019), 149--161. doi:10.1109/TETC.2016.2555806.Google ScholarGoogle ScholarCross RefCross Ref
  126. Morabito Roberto, Cozzolino Vittorio, Ding Aaron Yi, Beijar Nicklas, and Ott Jörg. 2018. Consolidate IoT edge computing with lightweight virtualization. IEEE Netw. 32, 1 (2018), 102--111.Google ScholarGoogle ScholarCross RefCross Ref
  127. Tiago Gama Rodrigues, Katsuya Suto, Hiroki Nishiyama, and Nei Kato. 2017. Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control. IEEE Trans. Comput. 66, 5 (2017), 810--819.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Ola Salman, Sarah Abdallah, Imad H Elhajj, Ali Chehab, and Ayman Kayssi. 2016. Identity-based authentication scheme for the Internet of Things. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC’16). IEEE, 1109--1111.Google ScholarGoogle ScholarCross RefCross Ref
  129. Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30--39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. Mahadev Satyanarayanan, Paramvir Bahl, Ramón Cáceres, and Nigel Davies. 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv. Comput. 8, 4 (2009), 14--23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Mahadev Satyanarayanan, Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Wenlu Hu, and Brandon Amos. 2015. Edge analytics in the Internet of Things. IEEE Perv. Comput. 14, 2 (2015), 24--31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Min Sheng, Chao Xu, Junyu Liu, Jiongjiong Song, Xiao Ma, and Jiandong Li. 2016. Enhancement for content delivery with proximity communications in caching enabled wireless networks: Architecture and challenges. IEEE Commun. Mag. 54, 8 (2016), 70--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Adeshina Busari Sherif, Mumtaz Shahid, Al-Rubaye Saba, and Rodriguez Jonathan. 2018. 5G millimeter-wave mobile broadband: Performance and challenges. IEEE Commun. Mag. 56, 6 (2018), 137--143.Google ScholarGoogle ScholarCross RefCross Ref
  134. Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, and Bo Li. 2013. eTime: Energy-efficient transmission between cloud and mobile devices. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’13). IEEE, 195--199.Google ScholarGoogle ScholarCross RefCross Ref
  135. Javad Sohankar, Koosha Sadeghi, Ayan Banerjee, and Sandeep K. S. Gupta. 2015. E-bias: A pervasive eeg-based identification and authentication system. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’15). ACM, 165--172.Google ScholarGoogle Scholar
  136. Hong Song, Dacheng Wang, Jiaxin Wang, and Wenhao Zhang. 2017. TC-CCS: A cooperative caching strategy in mobile transparent computing system. In Proceedings of the IEEE IEEE International Conference on Visual Communications and Image Processing (VCIP’17). IEEE, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  137. Hongguang Sun, Matthias Wildemeersch, Min Sheng, and Tony QS Quek. 2015. D2D enhanced heterogeneous cellular networks with dynamic TDD. IEEE Trans. Wireless Commun. 14, 8 (2015), 4204--4218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Xiang Sun and Nirwan Ansari. 2017. Latency aware workload offloading in the cloudlet network. IEEE Commun. Lett. 21, 7 (2017), 1481--1484.Google ScholarGoogle ScholarCross RefCross Ref
  139. Tarik Taleb, Konstantinos Samdanis, Badr Mada, Hannu Flinck, Sunny Dutta, and Dario Sabella. 2017. On multi-access edge computing: A survey of the emerging 5G network edge architecture 8 orchestration. IEEE Commun. Surv. Tutor. 19, 3 (2017), 1657--1681.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin Sherman Shen. 2019. Flexible and efficient authenticated key agreement scheme for BANs based on physiological features. IEEE Trans. Mobile Comput. 18, 4 (2019), 845--856.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Yayuan Tang, Kehua Guo, and Biao Tian. 2018. A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Network. Appl. 11, 4 (2018), 711--722.Google ScholarGoogle ScholarCross RefCross Ref
  142. Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, and Saverio Niccolini. 2013. Temporal locality in today’s content caching: Why it matters and how to model it. ACM SIGCOMM Comput. Commun. Rev. 43, 5 (2013), 5--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. D. Trihinas, A. Tryfonos, M. D. Dikaiakos, and G. Pallis. 2018. DevOps as a service: Pushing the boundaries of microservice adoption. IEEE Internet Comput. 22, 3 (2018), 65--71.Google ScholarGoogle ScholarCross RefCross Ref
  144. Luis M. Vaquero and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44, 5 (2014), 27--32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Ricard Vilalta, Raluca Ciungu, Arturo Mayoral, Ramon Casellas, Ricardo Martinez, David Pubill, Jordi Serra, Raul Munoz, and Christos Verikoukis. 2016. Improving security in Internet of Things with software defined networking. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  146. Todd Vollmer and Milos Manic. 2014. Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans. Industr. Inf. 10, 2 (2014), 1337--1347.Google ScholarGoogle ScholarCross RefCross Ref
  147. Serdar Vural, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. 2017. Caching transient data in internet content routers. IEEE/ACM Trans. Netw. 25, 2 (2017), 1048--1061.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2017. Anonymous and secure aggregation scheme in fog-based public cloud computing. Fut. Gener. Comput. Syst. 78, 1 (2018), 712--719.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. Rui Wang, Xi Peng, Jun Zhang, and Khaled B. Letaief. 2016. Mobility-aware caching for content-centric wireless networks: Modeling and methodology. IEEE Commun. Mag. 54, 8 (2016), 77--83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo Yang, and Wenbo Wang. 2017. A survey on mobile edge networks: Convergence of computing, caching and communications. IEEE Access 5, 3 (2017), 6757--6779. DOI:https://doi.org/10.1109/ACCESS.2017.2685434Google ScholarGoogle ScholarCross RefCross Ref
  151. Xiaofei Wang, Min Chen, Tarik Taleb, Adlen Ksentini, and Victor Leung. 2014. Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Commun. Mag. 52, 2 (2014), 131--139.Google ScholarGoogle ScholarCross RefCross Ref
  152. Xiumin Wang, Jin Wang, Xin Wang, and Xiaoming Chen. 2015. Energy and delay tradeoff for application offloading in mobile cloud computing. IEEE Syst. J. 11, 2 (2015), 858--867.Google ScholarGoogle ScholarCross RefCross Ref
  153. Yanting Wang, Min Sheng, Xijun Wang, Liang Wang, and Jiandong Li. 2016. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 64, 10 (2016), 4268--4282.Google ScholarGoogle Scholar
  154. Shinae Woo, Eunyoung Jeong, Shinjo Park, Jongmin Lee, Sunghwan Ihm, and KyoungSoo Park. 2013. Comparison of caching strategies in modern cellular backhaul networks. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’13). ACM, 319--332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Huaming Wu, Yi Sun, and Katinka Wolter. 2018. Energy-efficient decision making for mobile cloud offloading. IEEE Trans. Cloud Comput. (2018). DOI:https://doi.org/10.1109/TCC.2018.2789446Google ScholarGoogle Scholar
  156. Changqiao Xu, Tianjiao Liu, Jianfeng Guan, Hongke Zhang, and Gabriel-Miro Muntean. 2013. CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Trans. Mobile Comput. 12, 11 (2013), 2193--2205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16, 2 (2014), 1024--1049.Google ScholarGoogle ScholarCross RefCross Ref
  158. Jianxiao Yang, Benoît Geller, and Stéphanie Bay. 2011. Bayesian and hybrid Cramér--Rao bounds for the carrier recovery under dynamic phase uncertain channels. IEEE Trans. Sign. Process. 59, 2 (2011), 667--680.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Lei Yang, Jiannong Cao, Hui Cheng, and Yusheng Ji. 2015. Multi-user computation partitioning for latency sensitive mobile cloud applications. IEEE Trans. Comput. 64, 8 (2015), 2253--2266.Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, and M. Nemirovsky. 2014. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing. In Proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD’14). 325--329. DOI:https://doi.org/10.1109/CAMAD.2014.7033259Google ScholarGoogle Scholar
  161. Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 ACM Workshop on Mobile Big Data (Mobidata’15). ACM, 37--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. Changsheng You and Kaibin Huang. 2016. Multiuser resource allocation for mobile-edge computation offloading. arXiv preprint arXiv:1604.02519 (2016).Google ScholarGoogle Scholar
  163. Changsheng You, Kaibin Huang, Hyukjin Chae, and Byoung-Hoon Kim. 2017. Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wireless Commun. 16, 3 (2017), 1397--1411.Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Engin Zeydan, Ejder Bastug, Mehdi Bennis, Manhal Abdel Kader, Ilyas Alper Karatepe, Ahmet Salih Er, and Mérouane Debbah. 2016. Big data caching for networking: Moving from cloud to edge. IEEE Commun. Mag. 54, 9 (2016), 36--42.Google ScholarGoogle ScholarCross RefCross Ref
  165. Guanglin Zhang, Wenqian. Zhang, Yu. Cao, Demin Li, and Lin Wang. 2018. Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices. IEEE Trans. Industr. Inf. 14, 10 (2018), 4642--4655.Google ScholarGoogle ScholarCross RefCross Ref
  166. Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Cooperative content caching in 5G networks with mobile edge computing. IEEE Wireless Commun. 25, 3 (2018), 80--87.Google ScholarGoogle ScholarCross RefCross Ref
  167. Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Mobile edge computing and networking for green and low-latency Internet of Things. IEEE Commun. Mag. 56, 5 (2018), 39--45.Google ScholarGoogle ScholarCross RefCross Ref
  168. Ke Zhang, Yuming Mao, Supeng Leng, Yejun He, and Yan Zhang. 2017. Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Vehic. Technol. Mag. 12, 2 (2017), 36--44.Google ScholarGoogle ScholarCross RefCross Ref
  169. Ke Zhang, Yuming Mao, Supeng Leng, Quanxin Zhao, Longjiang Li, Xin Peng, Li Pan, Sabita Maharjan, and Yan Zhang. 2016. Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access 4, 8 (2016), 5896--5907.Google ScholarGoogle ScholarCross RefCross Ref
  170. Meng Zhang, Hongbin Luo, and Hongke Zhang. 2015. A survey of caching mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1473--1499.Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. Weiwen Zhang, Yonggang Wen, and Dapeng Oliver Wu. 2015. Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Trans. Wireless Commun. 14, 1 (2015), 81--93.Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Yaoxue Zhang. 2004. Transparence computing: Concept, architecture and example. Chin. J. Electr. 32, S1, Article 169 (2004), 5 pages.Google ScholarGoogle Scholar
  173. Yaoxue Zhang, Kehua Guo, Ju Ren, Yuezhi Zhou, Jianxin Wang, and Jianer Chen. 2017. Transparent computing: A promising network computing paradigm. Comput. Sci. Eng. 1, 2 (2017), 7--20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. Yaoxue Zhang, Ju Ren, Jiagang Liu, Chugui Xu, Hui Guo, and Yaping Liu. 2017. A survey on emerging computing paradigms for big data. Chin. J. Electr. 26, 1 (2017), 1--12. DOI:https://doi.org/10.1049/cje.2016.11.016Google ScholarGoogle ScholarCross RefCross Ref
  175. Yaoxue Zhang, Laurencetianruo Yan, Yuezhi Zhou, and Wenyuan Kuang. 2013. Information security underlying transparent computing: Impacts, visions and challenges. Web Intell. Agent Syst. 8, 2 (2013), 203--217.Google ScholarGoogle ScholarCross RefCross Ref
  176. Yaoxue Zhang and Yuezhi Zhou. 2006. Transparent computing: A new paradigm for pervasive computing. In Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC’06). Springer-Verlag, Berlin, 1--11. DOI:https://doi.org/10.1007/11833529_1Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. Yaoxue Zhang and Yuezhi Zhou. 2007. 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA’07). IEEE, 394--403.Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. Yaoxue Zhang and Yuezhi Zhou. 2013. Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services. Tsing. Sci. Technol. 18, 1 (Feb. 2013), 10--21.Google ScholarGoogle ScholarCross RefCross Ref
  179. Tianchu Zhao, Sheng Zhou, Xueying Guo, Yun Zhao, and Zhisheng Niu. 2015. A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing. In Proceedings of the IEEE GLOBECOM Workshops. IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  180. Yun Zhao, Sheng Zhou, Tianchu Zhao, and Zhisheng Niu. 2015. Energy-efficient task offloading for multiuser mobile cloud computing. In Proceedings of the IEEE International Conference on Cognitive Computing (ICCC’15). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  181. Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H Vincent Poor. 2016. Cluster content caching: An energy-efficient approach to improve quality of service in cloud radio access networks. IEEE J. Select. Areas Commun. 34, 5 (2016), 1207--1221.Google ScholarGoogle ScholarDigital LibraryDigital Library
  182. Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, and Min Ji. 2018. CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 1 (2018), 730--738.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 52, Issue 6
        November 2020
        806 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3368196
        • Editor:
        • Sartaj Sahni
        Issue’s Table of Contents

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 October 2019
        • Accepted: 1 September 2019
        • Revised: 1 July 2019
        • Received: 1 January 2019
        Published in csur Volume 52, Issue 6

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format