Advertisement

Fog computing perception mechanism based on throughput rate constraint in intelligent Internet of Things

  • Jiang FeiEmail author
  • Ma Xiaoping
Original Article
  • 41 Downloads

Abstract

Due to the low power consumption, dense deployment, and unattended setup of the Internet of Things, it is more difficult to guarantee its security. In order to solve the source reliability problem, a fog computing perception mechanism based on throughput rate constraint is proposed in this paper. The core idea is the throughput rate constraint and perception strategy in fog computing, which are introduced to fog access points. The improved throughput rate constraint can achieve efficient information perception to eliminate these uncertainty and instability results and obtain more complete and reliable measurement data than a single sensor, which can improve the transmission efficiency of the network and the accuracy of the environment perception. And then, using multi-information perception to establish the prediction model can infer the degree distribution of fog node in FC network, and the transmission efficiency of the network and the accuracy of the environment perception are close to 90%. According to the results of theoretical analysis and simulation, the model has the characteristics of reliable node perception data and flexible expansion, and can effectively improve the reliability of the data source of the Internet of Things.

Keywords

Internet of Things Fog computing Throughput rate constraint Multi-information perception Degree distribution Environment perception 

Notes

References

  1. 1.
    Chen Y-K (2012) Challenges and opportunities of Internet of things, in the proceedings of 17th Asia and South Pacific Design Automation Conference, 30 Jan.一02 Feb., Santa Clara, CA, USAGoogle Scholar
  2. 2.
    Lakra AV, Yadav DK (2015) Multi-objective tasks scheduling algorithm for cloud computing throughput optimization. Procedia Computer Science 48:107–113CrossRefGoogle Scholar
  3. 3.
    Jourdren L et al (2012) Eoulsan: a cloud computing-based framework facilitating high throughput sequencing analyses. Bioinformatics 28(11):1542–1543CrossRefGoogle Scholar
  4. 4.
    Perera C et al (2017) Fog computing for sustainable smart cities: a survey. ACM Comput Surv 503:32–45Google Scholar
  5. 5.
    Jalali F et al (2016) Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun 34(5):1728–1739CrossRefGoogle Scholar
  6. 6.
    Li S, Maddahali MA, Avestimehr AS (2017) Coding for distributed fog computing. IEEE Commun Mag 55(4):34–40CrossRefGoogle Scholar
  7. 7.
    Dastjerdi AV, Buyya R (2016) Fog computing: helping the Internet of things realize its potential. Computer 49(8):112–116CrossRefGoogle Scholar
  8. 8.
    Alrawais A et al (2017) Fog computing for the Internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42CrossRefGoogle Scholar
  9. 9.
    Xia KJ, Wang JQ, Wu Y (2017) Robust alzheimer disease classification based on feature integration fusion model for Magnetic[J]. Journal of Medical Imaging & Health Informatics 7(6):1171–1176Google Scholar
  10. 10.
    Paya, Ashkan, Marinescu D (2017) Energy-aware load balancing and application scaling for the cloud ecosystem. IEEE Transactions on Cloud Computing PP 99(2017):1–1Google Scholar
  11. 11.
    Yan Q et al (2018) A multi-level DDoS mitigation framework for the industrial Internet of things. IEEE Commun Mag 56(2):30–36CrossRefGoogle Scholar
  12. 12.
    Bittencourt LF et al (2017) Mobility-aware application scheduling in fog computing. IEEE Cloud Computing 4(2):26–35MathSciNetCrossRefGoogle Scholar
  13. 13.
    Preden JS, Tammemae K, Jantsch A, Leier M, Riid A, Calis E (2015) The benefits of self-awareness and attention in fog and mist computing. Computer 48(7):37–45CrossRefGoogle Scholar
  14. 14.
    Moses J et al. (2011) Shared resource monitoring and throughput optimization in cloud-computing datacenters. IEEE International Parallel & Distributed Processing Symposium IEEE Computer SocietyGoogle Scholar
  15. 15.
    Jararweh Y et al (2014) High-throughput encryption for Cloud computing storage system. International Journal of Cloud Applications & Computing 4(2):1–14CrossRefGoogle Scholar
  16. 16.
    Xia KJ, Yin HS, Zhang YD (2019) Deep semantic segmentation of kidney and space-occupying lesion area based on SCNN and ResNet models combined with SIFT-Flow Algorithm[J]. J Med Syst 43(1):2Google Scholar
  17. 17.
    Tang B et al (2017) Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans Ind Inf 13(5):2140–2150CrossRefGoogle Scholar
  18. 18.
    Song F et al (2017) Smart collaborative caching for information-centric IoT in fog computing. Sensors 11:17Google Scholar
  19. 19.
    Albela MS et al (2017) A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17:9Google Scholar
  20. 20.
    Zeng D et al (2016) Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Trans Comput 65(12):3702–3712MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Risso FGO (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Mag 554:18–20Google Scholar
  22. 22.
    Jin Y, Xia K (2018) Intelligent location and recognition mechanism of abnormal point of medical image based on reliable transmission in medial CT scanner local big data Networks[J]. Journal of Medical Imaging & Health Informatics 8(3):609–617Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information and ControlChina University of Mining and TechnologyXuzhouChina
  2. 2.School of Information EngineeringSuzhou UniversitySuzhouChina

Personalised recommendations