Abstract
Sending data to the cloud for analysis was a prominent trend during the past decades, driving cloud computing as a dominant computing paradigm. However, the dramatically increasing number of devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay. It becomes difficult to meet the delay-sensitive and context-aware service requirements of IoT applications by using cloud computing alone. Facing these challenges, computing paradigms are shifting from the centralized cloud computing to distributed edge computing. Several new computing paradigms, including Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet, have emerged to leverage the distributed resources at network edge to provide timely and context-aware services. By integrating end devices, edge servers, and cloud, they form a hierarchical IoT architecture, i.e., End-Edge-Cloud orchestrated architecture to improve the performance of IoT systems. This article presents a comprehensive survey of these emerging computing paradigms from the perspective of end-edge-cloud orchestration. Specifically, we first introduce and compare the architectures and characteristics of different computing paradigms. Then, a comprehensive survey is presented to discuss state-of-the-art research in terms of computation offloading, caching, security, and privacy. Finally, some potential research directions are envisioned for fostering continuous research efforts.
- Mobile Edge Computing Introductory Technical White Paper. 2014. Retrieved from https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf.Google Scholar
- Mobile-Edge Computing (MEC); Service Scenarios. 2015. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/004/01.01.01_60/gs_MEC-IEG004v010101p.pdf.Google Scholar
- Edge computing prepares for a multi-access future. 2016. Retrieved from http://www.telecomtv.com/articles/mec/edge-computing-prepares-for-a-multi-access-future-13986/.Google Scholar
- Mobile-Edge Computing (MEC); Technical Requirements. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/002/01.01.01_60/gs_MEC002v010101p.pdf.Google Scholar
- Mobile-Edge Computing (MEC); Terminology. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/01.01.01_60/gs_MEC001v010101p.pdf.Google Scholar
- APIs for IOT and FOG computing. 2017. Retrieve from https://www.vanrish.com/blog/2017/12/17/apis-for-iot-and-fog-computing/.Google Scholar
- Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021. 2017. Retrieved from https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.Google Scholar
- Cloud Adoption Is Growing But Forecasts Differ on How Much. 2017. Retrieved from http://fortune.com/2017/02/22/cloud-growth-forecast-gartner/.Google Scholar
- Mobile Edge Computing; Market Acceleration; MEC Metrics Best Practice and Guidelines. 2017. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/006/01.01.01_60/gs_MEC-IEG006v010101p.pdf.Google Scholar
- OpenFog Reference Architecture for Fog Computing. 2017. Retrieved from https://www.openfogconsortium.org/wp-content/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL.pdf.Google Scholar
- Hasti Ahlehagh and Sujit Dey. 2014. Video-aware scheduling and caching in the radio access network. IEEE/ACM Trans. Netw. 22, 5 (2014), 1444--1462.Google ScholarDigital Library
- Arif Ahmed and Ejaz Ahmed. 2016. A survey on mobile edge computing. In Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO’16). 1--8. DOI:https://doi.org/10.1109/ISCO.2016.7727082Google ScholarCross Ref
- Mohammed Alshiky Aisha, M. Buhari Seyed, and Barnawi Ahmed. 2017. Attribute-based access control (ABAC) for EHR in fog computing environment. Int. J. Cloud Comput.: Serv. Arch. 7, 1 (2017), 9--16.Google Scholar
- Moustafa Ammar, Mohamed Rizk, Ayman Abdel-Hamid, and Ahmed K. Aboul-Seoud. 2016. A framework for security enhancement in SDN-based datacenters. In Proceedings of the IFIP International Conference on New Technologies, Mobility and Security (NTMS’16). IEEE, 1--4.Google Scholar
- Arash Asadi, Qing Wang, and Vincenzo Mancuso. 2014. A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutor. 16, 4 (2014), 1801--1819.Google ScholarCross Ref
- Bahar Azari, Osvaldo Simeone, Umberto Spagnolini, and Antonia M. Tulino. 2016. Hypergraph-based analysis of clustered co-operative beamforming with application to edge caching. IEEE Wireless Commun. Lett. 5, 1 (2016), 84--87.Google ScholarCross Ref
- Bo Bai, Li Wang, Zhu Han, Wei Chen, and Tommy Svensson. 2016. Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework. IEEE Wireless Commun. 23, 4 (2016), 74--81.Google ScholarDigital Library
- Ejder Bastug, Mehdi Bennis, and Mérouane Debbah. 2014. Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Commun. Mag. 52, 8 (2014), 82--89.Google ScholarCross Ref
- Sultan Basudan, Xiaodong Lin, and Karthik Sankaranarayanan. 2017. A privacy-preserving vehicular crowdsensing based road surface condition monitoring system using fog computing. IEEE IoT J. 4, 3 (2017), 772--782.Google Scholar
- Suzhi Bi and Ying Jun Zhang. 2018. Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading. IEEE Trans. Wireless Commun. 17, 6 (Jun. 2018), 4177--4190. DOI:https://doi.org/10.1109/TWC.2018.2821664Google ScholarCross Ref
- Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog Computing: A Platform for Internet of Things and Analytics. Springer International Publishing, Cham, 169--186. DOI:https://doi.org/10.1007/978-3-319-05029-4_7Google Scholar
- Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proceedings of the Workshop on Mobile Cloud Computing (MCC’12). ACM, New York, NY, 13--16.Google ScholarDigital Library
- Sem Borst, Varun Gupta, and Anwar Walid. 2010. Distributed caching algorithms for content distribution networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’10). IEEE, 1--9.Google ScholarCross Ref
- Piotr Borylo, Artur Lason, Jacek Rzasa, Andrzej Szymanski, and Andrzej Jajszczyk. 2016. Energy-aware fog and cloud interplay supported by wide area software defined networking. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 1--7.Google ScholarCross Ref
- A. Bourdena, C. X. Mavromoustakis, G. Mastorakis, J. J. P. C. Rodrigues, and C. Dobre. 2015. Using socio-spatial context in mobile cloud process offloading for energy conservation in wireless devices. IEEE Trans. Cloud Comput. 1 (2015).Google Scholar
- Shiwei Cao, Xiaofeng Tao, Yanzhao Hou, and Qimei Cui. 2015. An energy-optimal offloading algorithm of mobile computing based on HetNets. In Proceedings of the IEEE International Conference on Connected Vehicles and Expo (ICCVE’15). IEEE, 254--258.Google ScholarCross Ref
- Sami Yangui Roch H. Glitho Monique J. Morrow Carla Mouradian, Diala Naboulsi and Paul A. Polakos. 2018. A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20, 1 (2018), 416--464.Google ScholarCross Ref
- Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, and Sue Moon. 2009. Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE/ACM Trans. Netw. 17, 5 (2009), 1357--1370.Google ScholarDigital Library
- Omar Chakroun and Soumaya Cherkaoui. 2016. Resource allocation for delay sensitive applications in mobile cloud computing. In Proceedings of the IEEE Conference on Local Computer Networks (LCN’16). IEEE, 615--618.Google ScholarCross Ref
- Binqiang Chen, Chenyang Yang, and Gang Wang. 2016. Cooperative device-to-device communications with caching. In Proceedings of the IEEE Vehicular Technology Conference (VTC’16). IEEE, 1--5.Google ScholarCross Ref
- Binqiang Chen, Chenyang Yang, and Gang Wang. 2017. High throughput opportunistic cooperative device-to-device communications with caching. IEEE Trans. Vehic. Technol. 66, 8 (2017), 7527--7539.Google ScholarCross Ref
- Di Chen, Stephan Schedler, and Volker Kuehn. 2016. Backhaul traffic balancing and dynamic content-centric clustering for the downlink of fog radio access network. In Proceedings of the IEEE SPAWC. IEEE, 1--5.Google ScholarCross Ref
- Guangyu Chen, B.-T. Kang, Mahmut Kandemir, Narayanan Vijaykrishnan, Mary Jane Irwin, and Rajarathnam Chandramouli. 2004. Studying energy trade offs in offloading computation/compilation in java-enabled mobile devices. IEEE Trans. Parallel Distrib. Syst. 15, 9 (2004), 795--809.Google ScholarDigital Library
- Lixing Chen, Sheng Zhou, and Jie Xu. 2018. Computation peer offloading for energy-constrained mobile edge computing in small-cell networks. IEEE/ACM Trans. Netw. 26, 4 (2018), 1619--1632. DOI:https://doi.org/10.1109/TNET.2018.2841758Google ScholarDigital Library
- Min Chen, Yixue Hao, Chin-Feng Lai, Di Wu, Yong Li, and Kai Hwang. 2018. Opportunistic task scheduling over co-located clouds in mobile environment. IEEE Trans. Serv. Comput. 11, 3 (2018), 549--561.Google ScholarCross Ref
- M. Chen, Y. Hao, Y. Li, C. Lai, and D. Wu. 2015. On the computation offloading at ad hoc cloudlet: Architecture and service modes. IEEE Commun. Mag. 53, 6 (Jun. 2015), 18--24. DOI:https://doi.org/10.1109/MCOM.2015.7120041Google Scholar
- Mingzhe Chen, Walid Saad, Changchuan Yin, and Mérouane Debbah. 2017. Echo state networks for proactive caching in cloud-based radio access networks with mobile users. IEEE Trans. Wireless Commun. 16, 6 (2017), 3520--3535.Google ScholarDigital Library
- Mingkai Chen, Lei Wang, and Jianxin Chen. 2016. Users-media cloud assisted D2D communications for distributed caching underlaying cellular network. Chin. Commun. 13, 8 (2016), 13--23.Google ScholarCross Ref
- Meng-Hsi Chen, Min Dong, and Ben Liang. 2016. Joint offloading decision and resource allocation for mobile cloud with computing access point. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’16). IEEE, 3516--3520.Google ScholarDigital Library
- Meng-Hsi Chen, Ben Liang, and Min Dong. 2015. A semidefinite relaxation approach to mobile cloud offloading with computing access point. In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC’15). IEEE, 186--190.Google ScholarCross Ref
- Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. 2016. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans. Netw. 24, 5 (2016), 2795--2808.Google ScholarDigital Library
- Mung Chiang, Sangtae Ha, I. Chih-Lin, Fulvio Risso, and Tao Zhang. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (2017), 18--20.Google ScholarDigital Library
- Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, and Ashwin Patti. 2011. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the the 6th Conference on Computer Systems. ACM, 301--314.Google ScholarDigital Library
- Byung-Gon Chun and Petros Maniatis. 2010. Dynamically partitioning applications between weak devices and clouds. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing 8 Services: Social Networks and Beyond. ACM, 7.Google ScholarDigital Library
- Hardy Corentin, Le Merrer Erwan, and Sericola Bruno. 2017. Distributed deep learning on edge-devices: Feasibility via adaptive compression. In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA’17). IEEE, 1--8.Google Scholar
- Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, and Paramvir Bahl. 2010. MAUI: Making smartphones last longer with code offload. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’10). ACM, 49--62.Google ScholarDigital Library
- Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112--116.Google ScholarDigital Library
- Maofei Deng, Hui Tian, and Bo Fan. 2016. Fine-granularity based application offloading policy in cloud-enhanced small cell networks. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 638--643.Google Scholar
- Haichuan Ding and Yuguang Fang. 2018. Virtual infrastructure at traffic lights: Vehicular temporary storage assisted data transportation at signalized intersections. IEEE Trans. Vehic. Technol. 67, 12 (2018), 12452--12456.Google ScholarCross Ref
- Haichuan Ding, Yuanxiong Guo, Xuanheng Li, and Yuguang Fang. 2018. Beef up the edge: Spectrum-aware placement of edge computing services for the Internet of Things. IEEE Trans. Mobile Comput. (2018). DOI:https://doi.org/10.1109/TMC.2018.2883952Google Scholar
- Abebe Abeshu Diro, Naveen Chilamkurti, and Neeraj Kumar. 2017. Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mobile Netw. Appl. 22, 5 (2017), 848--858.Google ScholarDigital Library
- Clinton Dsouza, Gail-Joon Ahn, and Marthony Taguinod. 2014. Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE International Conference on Information Reuse and Information (IRI’14). IEEE, 16--23.Google ScholarCross Ref
- Sebastián Echeverría, Dan Klinedinst, Keegan Williams, and Grace A. Lewis. 2016. Establishing trusted identities in disconnected edge environments. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC’16). IEEE, 51--63.Google Scholar
- Khalid Elgazzar, Patrick Martin, and Hossam S. Hassanein. 2016. Cloud-assisted computation offloading to support mobile services. IEEE Trans. Cloud Comput. 4, 3 (2016), 279--292.Google ScholarCross Ref
- Jeffrey Erman, Alexandre Gerber, Mohammad Hajiaghayi, Dan Pei, Subhabrata Sen, and Oliver Spatscheck. 2011. To cache or not to cache: The 3G case. IEEE Internet Comput. 15, 2 (2011), 27--34.Google ScholarDigital Library
- Ertem Esiner and Anwitaman Datta. 2016. Layered security for storage at the edge: On decentralized multi-factor access control. In Proceedings of the ACM International Conference on Distributed Computing and Networking (ICDCN’16). ACM, 9.Google ScholarDigital Library
- Jose Oscar Fajardo, Ianire Taboada, and Fidel Liberal. 2015. Radio-aware service-level scheduling to minimize downlink traffic delay through mobile edge computing. In Proceedings of the 7th EAI International Conference on Mobile Networks and Management. Springer, 121--134.Google ScholarCross Ref
- Yuan Gao, Yaoxue Zhang, and Yuezhi Zhou. 2012. A cache management strategy for transparent computing storage system. In Proceedings of the International Conference on New Trends in Computing Sciences (ICTCS’12). Springer, 651--658.Google Scholar
- Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Krivulev, and Gustavo Alonso. 2009. Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Proceedings of the International Middleware Conference (Middleware’09). Springer-Verlag New York, 5.Google ScholarCross Ref
- Negin Golrezaei, Parisa Mansourifard, Andreas F Molisch, and Alexandros G Dimakis. 2014. Base-station assisted device-to-device communications for high-throughput wireless video networks. IEEE Trans. Wireless Commun. 13, 7 (2014), 3665--3676.Google ScholarCross Ref
- Negin Golrezaei, Karthikeyan Shanmugam, Alexandros G. Dimakis, Andreas F. Molisch, and Giuseppe Caire. 2012. Femtocaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 1107--1115.Google ScholarCross Ref
- Andre S. Gomes, Bruno Sousa, David Palma, Vitor Fonseca, Zhongliang Zhao, Edmundo Monteiro, Torsten Braun, Paulo Simoes, and Luis Cordeiro. 2017. Edge caching with mobility prediction in virtualized LTE mobile networks. Future Gener. Comput. Syst. 70, 5 (2017), 148--162.Google ScholarCross Ref
- Mohammad Goudarzi, Zeinab Movahedi, and Masoud Nazari. 2016. Mobile cloud computing: A multisite computation offloading. In Proceedings of the IEEE International Conference on Imaging Systems and Techniques (IST’16). IEEE, 660--665.Google Scholar
- Jingxiong Gu, Wei Wang, Aiping Huang, Hangguan Shan, and Zhaoyang Zhang. 2014. Distributed cache replacement for caching-enable base stations in cellular networks. In Proceedings of the IEEE International Conference on Communications (ICC’14). IEEE, 2648--2653.Google ScholarCross Ref
- Hongzhi Guo and Jiajia Liu. 2018. Collaborative computation offloading for multiaccess edge computing over fiber--wireless networks. IEEE Trans. Vehic. Technol. 67, 5 (May 2018), 4514--4526.Google ScholarCross Ref
- Kiryong Ha and Mahadev Satyanarayanan. 2015. OpenStack++ for Cloudlet Deployment. Technical Report. http://elijah.cs.cmu.edu/DOCS/CMU-CS-15-113.pdfGoogle Scholar
- J. He, Y. Zhang, J. Lu, M. Wu, and F. Huang. 2018. Block-stream as a service: A more secure, nimble, and dynamically balanced cloud service model for ambient computing. IEEE Netw. 32, 1 (2018), 126--132.Google ScholarCross Ref
- Dinh T. Hoang, Chonho Lee, Dusit Niyato, and Ping Wang. 2013. A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Commun. Mobile Comput. 13, 18 (2013), 1587--1611.Google ScholarCross Ref
- Farhoud Hosseinpour, Payam Vahdani Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. 2016. An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Dig. Content Technol. Appl. 10, 5 (2016), 34--46.Google Scholar
- Yunchao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. ETSI. White Paper No. 11. Mobile Edge Computing a Key Technology Towards 5G [S]. DOI:https://doi.org/10.1007/978-3-319-05029-4_7Google Scholar
- Maged Ibrahim. 2016. Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18, 6 (2016), 1089--1101.Google Scholar
- Andriana Ioannou and Stefan Weber. 2016. A survey of caching policies and forwarding mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 18, 4 (2016), 2847--2886.Google ScholarDigital Library
- Mingyue Ji, Giuseppe Caire, and Andreas F. Molisch. 2016. Wireless device-to-device caching networks: Basic principles and system performance. IEEE J. Select. Areas Commun. 34, 1 (2016), 176--189.Google ScholarDigital Library
- Shiwei Jia, Yuan Ai, Zhongyuan Zhao, Mugen Peng, and Chunjing Hu. 2016. Hierarchical content caching in fog radio access networks: Ergodic rate and transmit latency. Chin. Commun. 13, 12 (2016), 1--14.Google ScholarCross Ref
- Wei Jiang, Gang Feng, and Shuang Qin. 2017. Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans. Mobile Comput. 16, 5 (2017), 1382--1393.Google ScholarDigital Library
- Sladana Jos̆ilo and György Dán. 2019. Selfish decentralized computation offloading for mobile cloud computing in dense wireless networks. IEEE Trans. Mobile Comput. 18, 1 (2019), 207--220. DOI:https://doi.org/10.1109/TMC.2018.2829874Google ScholarDigital Library
- Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, and Rodrigo Diaz. 2017. Securing combined fog-to-cloud system through SDN approach. In Proceedings of the Workshop on CrossCloud Infrastructures 8 Platforms (CrossCloud’17). ACM, 2.Google ScholarDigital Library
- Jakub Koneáý, H. Brendan, McMahan, Daniel Ramage, and Peter Richtárik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. arXiv:1610.02527v1 (10 2016).Google Scholar
- Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur. 2016. A hybrid deduplication for secure and efficient data outsourcing in fog computing. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom’16). IEEE, 285--293.Google ScholarCross Ref
- Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, and Xinwen Zhang. 2012. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 945--953.Google ScholarCross Ref
- Wenyuan Kuang, Yaoxue Zhang, Yuezhi Zhou, and Huajie Yang. 2007. RBIS: Security enhancement for MRBP and MRBP2 using integrity check. J. Chin. Comput. Syst. 28, 2 (2007), 251--254.Google Scholar
- D. Van Le and C. Tham. 2018. A deep reinforcement learning based offloading scheme in ad-hoc mobile clouds. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’18). 760--765.Google Scholar
- Hongjia Li and Dan Hu. 2016. Mobility prediction based seamless RAN-cache handover in HetNet. In Proc. IEEE Wireless Communications and Networking Conference (WCNC’16). IEEE, 1--7.Google ScholarDigital Library
- Xue Lin, Yanzhi Wang, Qing Xie, and Massoud Pedram. 2015. Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Trans. Serv. Comput. 8, 2 (2015), 175--186.Google ScholarCross Ref
- Ying-Dar Lin, Edward T-H Chu, Yuan-Cheng Lai, and Ting-Jun Huang. 2015. Time-and-energy-aware computation offloading in handheld devices to coprocessors and clouds. IEEE Syst. J. 9, 2 (2015), 393--405.Google ScholarCross Ref
- Juan Liu, Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Delay-optimal computation task scheduling for mobile-edge computing systems. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’16). IEEE, 1451--1455.Google Scholar
- Jinzhao Liu, Yuezhi Zhou, and Di Zhang. 2016. TranSim: A simulation framework for cache-enabled transparent computing systems. IEEE Trans. Comput. 65, 10 (2016), 3171--3183.Google ScholarDigital Library
- Liqing Liu, Zheng Chang, and Xijuan Guo. 2018. Socially aware dynamic computation offloading scheme for fog computing system with energy harvesting devices. IEEE IoT J. 5, 3 (Jun. 2018), 1869--1879.Google Scholar
- Yanchen Liu, Myung J Lee, and Yanyan Zheng. 2016. Adaptive multi-resource allocation for cloudlet-based mobile cloud computing system. IEEE Trans. Mobile Comput. 15, 10 (2016), 2398--2410.Google ScholarDigital Library
- Garcia Pedro Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. SIGCOMM Comput. Commun. Rev. 45, 5 (2015), 37--42.Google ScholarDigital Library
- Rongxing Lu, Kevin Heung, Arash Habibi Lashkari, and Ali A. Ghorbani. 2017. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5 (2017), 3302--3312.Google ScholarCross Ref
- Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. 2012. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23, 9 (2012), 1621--1631.Google ScholarDigital Library
- Pavel Mach and Zdenek Becvar. 2016. Cloud-aware power control for real-time application offloading in mobile edge computing. Trans. Emerg. Telecommun. Technol. 27, 5 (2016), 648--661.Google ScholarDigital Library
- S. Eman Mahmoodi, R. N. Uma, and K. P Subbalakshmi. 2019. Optimal joint scheduling and cloud offloading for mobile applications. IEEE Trans. Cloud Comput. 7, 2 (2019), 301--313.Google ScholarCross Ref
- Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. Mobile edge computing: Survey and research outlook. arXiv preprint arXiv:1701.01090 (2017).Google Scholar
- Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2322--2358.Google ScholarCross Ref
- Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3590--3605.Google ScholarDigital Library
- Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2016. Power-delay tradeoff in multi-user mobile-edge computing systems. arXiv preprint arXiv:1609.06027 (2016).Google Scholar
- Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2017. Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans. Wireless Commun. 16, 9 (2017), 5994--6009.Google ScholarDigital Library
- Muhammad Baqer Mollah, Md Abul Kalam Azad, and Athanasios Vasilakos. 2017. Secure data sharing and searching at the edge of cloud-assisted Internet of Things. IEEE Cloud Comput. 4, 1 (2017), 34--42.Google ScholarCross Ref
- Ei Ei Mon and Thinn Thu Naing. 2011. The privacy-aware access control system using attribute-and role-based access control in private cloud. In Proceedings of the IEEE International Conference on Broadband Network 8 Multimedia Technology (IC-BNMT’11). IEEE, 447--451.Google ScholarCross Ref
- Diego Montero, Marcelo Yannuzzi, Adrian Shaw, Ludovic Jacquin, Antonio Pastor, Rene Serral-Gracia, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, et al. 2015. Virtualized security at the network edge: A user-centric approach. IEEE Commun. Mag. 53, 4 (2015), 176--186.Google ScholarDigital Library
- R. Morabito, I. Farris, A. Iera, and T. Taleb. 2017. Evaluating performance of containerized IoT services for clustered devices at the network edge. IEEE IoT J. 4, 4 (2017), 1019--1030.Google Scholar
- Chiang Mung, Ha Sangtae, I Chih-lin, Risso Fulvio, and Zhang Tao. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (Apr. 2017), 18--20. DOI:https://doi.org/10.1109/MCOM.2017.7901470Google Scholar
- Olga Muñoz, Antonio Pascual Iserte, Josep Vidal, and Marc Molina. 2014. Energy-latency trade-off for multiuser wireless computation offloading. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshop (WCNCW’14). IEEE, 29--33.Google ScholarCross Ref
- Jianbing Ni, Xiaodong Lin, Kuan Zhang, and Yong Yu. 2016. Secure and deduplicated spatial crowdsourcing: A fog-based approach. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). 1--6.Google ScholarCross Ref
- Ruifang Niu, Wenfang Song, and Yong Liu. 2013. An energy-efficient multisite offloading algorithm for mobile devices. Int. J. Distrib. Sens. Netw. 9, 3 (2013), 1--6.Google ScholarCross Ref
- OECI. 2017. Retrieved from http://openedgecomputing.org/index.html.Google Scholar
- Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access (2017).Google Scholar
- Jesus Pacheco and Salim Hariri. 2016. IoT security framework for smart cyber infrastructures. In Proceedings of the IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W’16). IEEE, 242--247.Google ScholarCross Ref
- Seok-Hwan Park, Osvaldo Simeone, and Shlomo Shamai. 2016. Joint cloud and edge processing for latency minimization in fog radio access networks. In Proceedings of the IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC’16). IEEE, 1--5.Google ScholarCross Ref
- Georgios Paschos, Ejder Bastug, Ingmar Land, Giuseppe Caire, and Mérouane Debbah. 2016. Wireless caching: Technical misconceptions and business barriers. IEEE Commun. Mag. 54, 8 (2016), 16--22.Google ScholarDigital Library
- Mach Pavel and Becvar Zdenek. 2017. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19, 3 (Thirdquarter 2017), 1628--1656.Google Scholar
- Mugen Peng, Shi Yan, Kecheng Zhang, and Chonggang Wang. 2016. Fog-computing-based radio access networks: Issues and challenges. IEEE Netw. 30, 4 (2016), 46--53.Google ScholarDigital Library
- Xuhong Peng, Ju Ren, Liang She, Deyu Zhang, Jie Li, and Yaoxue Zhang. 2018. BOAT: A block-streaming app execution scheme for lightweight IoT devices. IEEE IoT J. 5, 3 (2018), 1816--1829.Google Scholar
- Konstantinos Poularakis, George Iosifidis, Vasilis Sourlas, and Leandros Tassiulas. 2014. Multicast-aware caching for small cell networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’14). IEEE, 2300--2305.Google ScholarCross Ref
- Konstantinos Poularakis, George Iosifidis, and Leandros Tassiulas. 2013. Approximation caching and routing algorithms for massive mobile data delivery. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’13). IEEE, 3534--3539.Google ScholarCross Ref
- Kuacharoen Pramote, J. Mooney Vincent, and K. Madisetti Vijay. 2003. Identity-based authentication scheme for the Internet of Things. In Proceedings of the Conference on Design, Automation and Test in Europe Conference (DATE’03). IEEE, 912--917.Google Scholar
- Lingjun Pu, Xu Chen, Jingdong Xu, and Xiaoming Fu. 2016. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3887--3901.Google ScholarDigital Library
- Praveen Kumar Rajendran. 2015. Hybrid intrusion detection algorithm for private cloud. Ind. J. Sci. Technol. 8, 35 (2015).Google Scholar
- Buvaneswari A. Ramanan, Lawrence M. Drabeck, Mark Haner, Nachi Nithi, Thierry E. Klein, and Chitra Sawkar. 2013. Cacheability analysis of HTTP traffic in an operational LTE network. In Proceedings of the IEEE Wireless Telecommunications Symposium (WTS’13). IEEE, 1--8.Google ScholarCross Ref
- Ammar Rayes and Salam Samer. 2016. Internet of Things From Hype to Reality: The Road to Digitization. Springer.Google Scholar
- Ju Ren, Hui Guo, Chugui Xu, and Yaoxue Zhang. 2017. Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw. 31, 5 (2017), 96--105.Google ScholarDigital Library
- Ju Ren, Yundi Guo, Deyu Zhang, Qingqing Liu, and Yaoxue Zhang. 2018. Distributed and efficient object detection in edge computing: Challenges and solutions. IEEE Netw. 32, 6 (2018), 137--143.Google ScholarCross Ref
- Ju Ren, Yaoxue Zhang, Ruilong Deng, Ning Zhang, Deyu Zhang, and Xuemin Shen. 2016. Joint channel access and sampling rate control in energy harvesting cognitive radio sensor networks. IEEE Trans. Emerg. Top. Comput. 7, 1 (2019), 149--161. doi:10.1109/TETC.2016.2555806.Google ScholarCross Ref
- Morabito Roberto, Cozzolino Vittorio, Ding Aaron Yi, Beijar Nicklas, and Ott Jörg. 2018. Consolidate IoT edge computing with lightweight virtualization. IEEE Netw. 32, 1 (2018), 102--111.Google ScholarCross Ref
- Tiago Gama Rodrigues, Katsuya Suto, Hiroki Nishiyama, and Nei Kato. 2017. Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control. IEEE Trans. Comput. 66, 5 (2017), 810--819.Google ScholarDigital Library
- Ola Salman, Sarah Abdallah, Imad H Elhajj, Ali Chehab, and Ayman Kayssi. 2016. Identity-based authentication scheme for the Internet of Things. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC’16). IEEE, 1109--1111.Google ScholarCross Ref
- Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30--39.Google ScholarDigital Library
- Mahadev Satyanarayanan, Paramvir Bahl, Ramón Cáceres, and Nigel Davies. 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv. Comput. 8, 4 (2009), 14--23.Google ScholarDigital Library
- Mahadev Satyanarayanan, Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Wenlu Hu, and Brandon Amos. 2015. Edge analytics in the Internet of Things. IEEE Perv. Comput. 14, 2 (2015), 24--31.Google ScholarDigital Library
- Min Sheng, Chao Xu, Junyu Liu, Jiongjiong Song, Xiao Ma, and Jiandong Li. 2016. Enhancement for content delivery with proximity communications in caching enabled wireless networks: Architecture and challenges. IEEE Commun. Mag. 54, 8 (2016), 70--76.Google ScholarDigital Library
- Adeshina Busari Sherif, Mumtaz Shahid, Al-Rubaye Saba, and Rodriguez Jonathan. 2018. 5G millimeter-wave mobile broadband: Performance and challenges. IEEE Commun. Mag. 56, 6 (2018), 137--143.Google ScholarCross Ref
- Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, and Bo Li. 2013. eTime: Energy-efficient transmission between cloud and mobile devices. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’13). IEEE, 195--199.Google ScholarCross Ref
- Javad Sohankar, Koosha Sadeghi, Ayan Banerjee, and Sandeep K. S. Gupta. 2015. E-bias: A pervasive eeg-based identification and authentication system. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’15). ACM, 165--172.Google Scholar
- Hong Song, Dacheng Wang, Jiaxin Wang, and Wenhao Zhang. 2017. TC-CCS: A cooperative caching strategy in mobile transparent computing system. In Proceedings of the IEEE IEEE International Conference on Visual Communications and Image Processing (VCIP’17). IEEE, 1--4.Google ScholarCross Ref
- Hongguang Sun, Matthias Wildemeersch, Min Sheng, and Tony QS Quek. 2015. D2D enhanced heterogeneous cellular networks with dynamic TDD. IEEE Trans. Wireless Commun. 14, 8 (2015), 4204--4218.Google ScholarDigital Library
- Xiang Sun and Nirwan Ansari. 2017. Latency aware workload offloading in the cloudlet network. IEEE Commun. Lett. 21, 7 (2017), 1481--1484.Google ScholarCross Ref
- Tarik Taleb, Konstantinos Samdanis, Badr Mada, Hannu Flinck, Sunny Dutta, and Dario Sabella. 2017. On multi-access edge computing: A survey of the emerging 5G network edge architecture 8 orchestration. IEEE Commun. Surv. Tutor. 19, 3 (2017), 1657--1681.Google ScholarDigital Library
- Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin Sherman Shen. 2019. Flexible and efficient authenticated key agreement scheme for BANs based on physiological features. IEEE Trans. Mobile Comput. 18, 4 (2019), 845--856.Google ScholarDigital Library
- Yayuan Tang, Kehua Guo, and Biao Tian. 2018. A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Network. Appl. 11, 4 (2018), 711--722.Google ScholarCross Ref
- Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, and Saverio Niccolini. 2013. Temporal locality in today’s content caching: Why it matters and how to model it. ACM SIGCOMM Comput. Commun. Rev. 43, 5 (2013), 5--12.Google ScholarDigital Library
- D. Trihinas, A. Tryfonos, M. D. Dikaiakos, and G. Pallis. 2018. DevOps as a service: Pushing the boundaries of microservice adoption. IEEE Internet Comput. 22, 3 (2018), 65--71.Google ScholarCross Ref
- Luis M. Vaquero and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44, 5 (2014), 27--32.Google ScholarDigital Library
- Ricard Vilalta, Raluca Ciungu, Arturo Mayoral, Ramon Casellas, Ricardo Martinez, David Pubill, Jordi Serra, Raul Munoz, and Christos Verikoukis. 2016. Improving security in Internet of Things with software defined networking. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). IEEE, 1--6.Google ScholarCross Ref
- Todd Vollmer and Milos Manic. 2014. Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans. Industr. Inf. 10, 2 (2014), 1337--1347.Google ScholarCross Ref
- Serdar Vural, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. 2017. Caching transient data in internet content routers. IEEE/ACM Trans. Netw. 25, 2 (2017), 1048--1061.Google ScholarDigital Library
- Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2017. Anonymous and secure aggregation scheme in fog-based public cloud computing. Fut. Gener. Comput. Syst. 78, 1 (2018), 712--719.Google ScholarDigital Library
- Rui Wang, Xi Peng, Jun Zhang, and Khaled B. Letaief. 2016. Mobility-aware caching for content-centric wireless networks: Modeling and methodology. IEEE Commun. Mag. 54, 8 (2016), 77--83.Google ScholarDigital Library
- Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo Yang, and Wenbo Wang. 2017. A survey on mobile edge networks: Convergence of computing, caching and communications. IEEE Access 5, 3 (2017), 6757--6779. DOI:https://doi.org/10.1109/ACCESS.2017.2685434Google ScholarCross Ref
- Xiaofei Wang, Min Chen, Tarik Taleb, Adlen Ksentini, and Victor Leung. 2014. Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Commun. Mag. 52, 2 (2014), 131--139.Google ScholarCross Ref
- Xiumin Wang, Jin Wang, Xin Wang, and Xiaoming Chen. 2015. Energy and delay tradeoff for application offloading in mobile cloud computing. IEEE Syst. J. 11, 2 (2015), 858--867.Google ScholarCross Ref
- Yanting Wang, Min Sheng, Xijun Wang, Liang Wang, and Jiandong Li. 2016. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 64, 10 (2016), 4268--4282.Google Scholar
- Shinae Woo, Eunyoung Jeong, Shinjo Park, Jongmin Lee, Sunghwan Ihm, and KyoungSoo Park. 2013. Comparison of caching strategies in modern cellular backhaul networks. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’13). ACM, 319--332.Google ScholarDigital Library
- Huaming Wu, Yi Sun, and Katinka Wolter. 2018. Energy-efficient decision making for mobile cloud offloading. IEEE Trans. Cloud Comput. (2018). DOI:https://doi.org/10.1109/TCC.2018.2789446Google Scholar
- Changqiao Xu, Tianjiao Liu, Jianfeng Guan, Hongke Zhang, and Gabriel-Miro Muntean. 2013. CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Trans. Mobile Comput. 12, 11 (2013), 2193--2205.Google ScholarDigital Library
- George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16, 2 (2014), 1024--1049.Google ScholarCross Ref
- Jianxiao Yang, Benoît Geller, and Stéphanie Bay. 2011. Bayesian and hybrid Cramér--Rao bounds for the carrier recovery under dynamic phase uncertain channels. IEEE Trans. Sign. Process. 59, 2 (2011), 667--680.Google ScholarDigital Library
- Lei Yang, Jiannong Cao, Hui Cheng, and Yusheng Ji. 2015. Multi-user computation partitioning for latency sensitive mobile cloud applications. IEEE Trans. Comput. 64, 8 (2015), 2253--2266.Google ScholarDigital Library
- M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, and M. Nemirovsky. 2014. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing. In Proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD’14). 325--329. DOI:https://doi.org/10.1109/CAMAD.2014.7033259Google Scholar
- Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 ACM Workshop on Mobile Big Data (Mobidata’15). ACM, 37--42.Google ScholarDigital Library
- Changsheng You and Kaibin Huang. 2016. Multiuser resource allocation for mobile-edge computation offloading. arXiv preprint arXiv:1604.02519 (2016).Google Scholar
- Changsheng You, Kaibin Huang, Hyukjin Chae, and Byoung-Hoon Kim. 2017. Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wireless Commun. 16, 3 (2017), 1397--1411.Google ScholarDigital Library
- Engin Zeydan, Ejder Bastug, Mehdi Bennis, Manhal Abdel Kader, Ilyas Alper Karatepe, Ahmet Salih Er, and Mérouane Debbah. 2016. Big data caching for networking: Moving from cloud to edge. IEEE Commun. Mag. 54, 9 (2016), 36--42.Google ScholarCross Ref
- Guanglin Zhang, Wenqian. Zhang, Yu. Cao, Demin Li, and Lin Wang. 2018. Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices. IEEE Trans. Industr. Inf. 14, 10 (2018), 4642--4655.Google ScholarCross Ref
- Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Cooperative content caching in 5G networks with mobile edge computing. IEEE Wireless Commun. 25, 3 (2018), 80--87.Google ScholarCross Ref
- Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Mobile edge computing and networking for green and low-latency Internet of Things. IEEE Commun. Mag. 56, 5 (2018), 39--45.Google ScholarCross Ref
- Ke Zhang, Yuming Mao, Supeng Leng, Yejun He, and Yan Zhang. 2017. Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Vehic. Technol. Mag. 12, 2 (2017), 36--44.Google ScholarCross Ref
- Ke Zhang, Yuming Mao, Supeng Leng, Quanxin Zhao, Longjiang Li, Xin Peng, Li Pan, Sabita Maharjan, and Yan Zhang. 2016. Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access 4, 8 (2016), 5896--5907.Google ScholarCross Ref
- Meng Zhang, Hongbin Luo, and Hongke Zhang. 2015. A survey of caching mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1473--1499.Google ScholarDigital Library
- Weiwen Zhang, Yonggang Wen, and Dapeng Oliver Wu. 2015. Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Trans. Wireless Commun. 14, 1 (2015), 81--93.Google ScholarDigital Library
- Yaoxue Zhang. 2004. Transparence computing: Concept, architecture and example. Chin. J. Electr. 32, S1, Article 169 (2004), 5 pages.Google Scholar
- Yaoxue Zhang, Kehua Guo, Ju Ren, Yuezhi Zhou, Jianxin Wang, and Jianer Chen. 2017. Transparent computing: A promising network computing paradigm. Comput. Sci. Eng. 1, 2 (2017), 7--20.Google ScholarDigital Library
- Yaoxue Zhang, Ju Ren, Jiagang Liu, Chugui Xu, Hui Guo, and Yaping Liu. 2017. A survey on emerging computing paradigms for big data. Chin. J. Electr. 26, 1 (2017), 1--12. DOI:https://doi.org/10.1049/cje.2016.11.016Google ScholarCross Ref
- Yaoxue Zhang, Laurencetianruo Yan, Yuezhi Zhou, and Wenyuan Kuang. 2013. Information security underlying transparent computing: Impacts, visions and challenges. Web Intell. Agent Syst. 8, 2 (2013), 203--217.Google ScholarCross Ref
- Yaoxue Zhang and Yuezhi Zhou. 2006. Transparent computing: A new paradigm for pervasive computing. In Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC’06). Springer-Verlag, Berlin, 1--11. DOI:https://doi.org/10.1007/11833529_1Google ScholarDigital Library
- Yaoxue Zhang and Yuezhi Zhou. 2007. 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA’07). IEEE, 394--403.Google ScholarDigital Library
- Yaoxue Zhang and Yuezhi Zhou. 2013. Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services. Tsing. Sci. Technol. 18, 1 (Feb. 2013), 10--21.Google ScholarCross Ref
- Tianchu Zhao, Sheng Zhou, Xueying Guo, Yun Zhao, and Zhisheng Niu. 2015. A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing. In Proceedings of the IEEE GLOBECOM Workshops. IEEE, 1--6.Google ScholarCross Ref
- Yun Zhao, Sheng Zhou, Tianchu Zhao, and Zhisheng Niu. 2015. Energy-efficient task offloading for multiuser mobile cloud computing. In Proceedings of the IEEE International Conference on Cognitive Computing (ICCC’15). IEEE, 1--5.Google ScholarCross Ref
- Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H Vincent Poor. 2016. Cluster content caching: An energy-efficient approach to improve quality of service in cloud radio access networks. IEEE J. Select. Areas Commun. 34, 5 (2016), 1207--1221.Google ScholarDigital Library
- Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, and Min Ji. 2018. CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 1 (2018), 730--738.Google ScholarDigital Library
Index Terms
- A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet
Recommendations
A Survey of Fog Computing: Concepts, Applications and Issues
Mobidata '15: Proceedings of the 2015 Workshop on Mobile Big DataDespite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by ...
All one needs to know about fog computing and related edge computing paradigms: A complete survey
AbstractWith the Internet of Things (IoT) becoming part of our daily life and our environment, we expect rapid growth in the number of connected devices. IoT is expected to connect billions of devices and humans to bring promising advantages ...
Next generation cloud computing
The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now ...
Comments