Advertisement

Fog computing in internet of things: Practical applications and future directions

  • Rida Zojaj Naeem
  • Saman Bashir
  • Muhammad Faisal Amjad
  • Haider AbbasEmail author
  • Hammad Afzal
Article
  • 62 Downloads
Part of the following topical collections:
  1. Special issue on Fog Computing for Healthcare

Abstract

Internet of things (IoT) services have been accepted and accredited globally for the past couple of years and have had increasing interest from researchers. Fog architecture has been brought up in IoT for enhancing its competence in a variety of applications. Fog computing is an emerging concept that transforms centralized Cloud to distributed Fog by bringing storage and computation closer to the user end. The aim of this paper is to highlight the fundamental Fog three-tier model and emphasize its advantages, challenges and possible attacks. This paper will also focus on Fog computing models pertaining to IoT scenario that have been developed over the period to conquer the challenges of existing Fog computing architecture. This paper also highlights Fog’s real importance which will include a review of scenario-based examples. Moreover, open issues have also been discussed to be worked upon in future.

Keywords

Internet of things Cloud Fog computing Fog challenges Fog models 

Notes

References

  1. 1.
    Mahdikhani H, Lu R Achieving privacy-preserving multi dot-product query in Fog computing-enhanced IoT, GLOBECOM 2017 - 2017 IEEE global communications conferenceGoogle Scholar
  2. 2.
    Yang X, Shah SA, Ren A, Zhao N, Fan D, Hu F, Ur Rehman M, von Deneen KM, Tian J (2018) Wandering pattern sensing at S-band. IEEE Journal of Biomedical and Health Informatics, 1–1Google Scholar
  3. 3.
    Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660Google Scholar
  4. 4.
  5. 5.
    Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15:4Google Scholar
  6. 6.
    Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3:5Google Scholar
  7. 7.
    Zhou J, Athukorala K, Gilman E, Riekki J, Ylianttila M (2012) Cloud architecture for dynamic service composition. International Journal of Grid and High Performance Computing 4(2):17–31Google Scholar
  8. 8.
    Zhou J, Leppänen T, Harjula E, Ylianttila M, Ojala T, Yu C, Jin H, Huazhong LTY (2013) CloudThings: A common architecture for integrating the internet of things with cloud computing, Computer supported cooperative work in design (CSCWD) IEEE 17th International ConferenceGoogle Scholar
  9. 9.
    Grance PMT (2011) The NIST definition of cloud computing, NIST special publication, 800–145Google Scholar
  10. 10.
    Nisha P (2015) Fog computing and its real time applications. International Journal of Emerging Technology and advanced Engineering 5:6Google Scholar
  11. 11.
    Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions, Journal of Cloud Computing: Advances, Systems and ApplicationsGoogle Scholar
  12. 12.
    Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on Fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42Google Scholar
  13. 13.
    Mukherjee M, Shu L, Wang D (2018) Survey of Fog computing: Fundamental, Network applications, and research challenges, IEEE communications surveys and tutorials, Volume 20, No. 3 Third QuarterGoogle Scholar
  14. 14.
    Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2018) A comprehensive survey on fog computing: State-of-the-art and research challenges, IEEE Communications Surveys and Tutorials, Volume 20, No. 1 First QuarterGoogle Scholar
  15. 15.
    Naha RK, Garg S, Georgakopoulos D, Jayaraman PP, Gao L, Xiang Y, Ranjan R (2018) Fog computing: Survey of trends, architectures, Requirements, and Research Directions, ResearchGateGoogle Scholar
  16. 16.
    Cisco delivers vision of Fog computing to accelerate value from billions of connected devices, https://newsroom.cisco.com/press-release-content?articleId=1334100
  17. 17.
    Ivan S, Sheng W (2014) The Fog computing paradigm: Scenarios and security issues, Computer science and information systems, FedCSIS. Federated ConferenceGoogle Scholar
  18. 18.
    Swati A, Shashank Y, Arun K (2016) An efficient Architecture and algorithm for resource provisioning in Fog computing. International Journal of Information Engineering and Electronic Business 8(1):48–61Google Scholar
  19. 19.
    Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: A platform for internet of things and analytics, Big data and internet of things: A roadmap for smart environments. Springer, pp 169–186Google Scholar
  20. 20.
    Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things, MCC’12Google Scholar
  21. 21.
    Lyu L, Jin J, Rajasegarar S, He X, Palaniswami M (2017) Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. IEEE Internet Things J 4:5Google Scholar
  22. 22.
    Kavvadia E, Sagiadinos S, Oikonomou K, Tsioutsiouliklis G, Issa S (2015) Elastic virtual machine placement in cloud computing network environments. Comput Netw 93(Part 3):435– 447Google Scholar
  23. 23.
    Vaquero LM, Rodero-Merino L (2014) Finding your way in the Fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review 44(5):27– 32Google Scholar
  24. 24.
    Zhan Z-H, Liu X-F, Gong Y-J, Zhang J, Shu-HungChung H, Li Yun (2015) Scheduling, cloud computing resource a survey of its evolutionary approaches. ACM Comput Surv 47(4):63Google Scholar
  25. 25.
    Stojmenovic I (2014) Fog computing: A Cloud to the ground support for smart things and machine-to-machine networks. Telecommunication Networks and Applications Conference (ATNAC), 2014 AustralasianGoogle Scholar
  26. 26.
    Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312Google Scholar
  27. 27.
    Swati A, Shashank Y, Arun K (2015) An architecture for elastic resource allocation in Fog computing. IJCSC J 6(2):201–207Google Scholar
  28. 28.
    Chiang M, Zhang T (2016) Fog and IoT: An overview of research opportunities. IEEE Internet Things J 6:854–864Google Scholar
  29. 29.
    Yigitoglu E, Mohamed M, Liu L, Ludwig H (2017) Foggy: A framework for continuous automated IoT application deployment in Fog computing, AI and Mobile Services (AIMS) IEEE International ConferenceGoogle Scholar
  30. 30.
    Kapsalis A, Kasnesis P, Venieris IS, Kaklamani DI, Patrikakis CZ (2017) A Cooperative Fog approach for effective workload balancing, IEEE Cloud Computing, Volume 4, Issue 2Google Scholar
  31. 31.
    Zhang H, Xiao Y, Bu S, Niyato D, Yu FR, Han Z (2017) Computing resource allocation in three-tier IoT Fog networks: A joint optimization approach combining stackelberg game and matching. IEEE Internet Things J 4(5):1204–1215Google Scholar
  32. 32.
    Masip-Bruin X, Marín-Tordera E, Tashakor G, Jukan A, Ren G-J (2016) Foggy clouds and cloudy Fogs: a real need for coordinated management of Fog-to-cloud computing systems. IEEE Wirel Commun 23 (5):120–128Google Scholar
  33. 33.
    Sarkar S, Misra S (2016) Theoretical modelling of Fog computing: A green computing paradigm to support IoT applications, IET Networks, volume 5, Issue No. 2Google Scholar
  34. 34.
    Alippi C, Fantacci R, Marabissi D, Roveri M (2016) A cloud to the ground: The new frontier of intelligent and autonomous networks of things. IEEE Commun Mag 54(12):14–20Google Scholar
  35. 35.
    Al Faruque MA, Vatanparvar K (2016) Energy management-as-a-service over fog computing platform. IEEE Internet Things J 3(2):161–169Google Scholar
  36. 36.
    Wang W, Wang Q, Sohraby K (2017) Multimedia Sensing as a Service (MSaaS): Exploring resource saving potentials of at cloud-edge IoT and Fogs. IEEE Internet Things J 4(2):487–495Google Scholar
  37. 37.
    Chen S, Zhang T, Shi W (2017) Fog computing, vol 2Google Scholar
  38. 38.
    Bazm M-M, Lacoste M, Südholt M, Menaud J-M (2017) Side-channels beyond the cloud edge: New isolation threats and solutions, Cyber Security in Networking Conference (CSNetGoogle Scholar
  39. 39.
    Fakeeh KA (2016) Privacy and security problems in Fog computing. Commun Appl Elect (CAE) 4:6Google Scholar
  40. 40.
    Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: Challenges. IEEE Access 5:19293–19304Google Scholar
  41. 41.
    Li C, Novak QZ, Li Q (2017) Securing SDN infrastructure of IoT–Fog networks from MitM attacks. IEEE Internet Things J 4(5):1156–1164Google Scholar
  42. 42.
    Chang C, Srirama SN, Buyya R (2017) Indie Fog: An efficient fog-computing infrastructure for the internet of things. Computer 50(9):92–98Google Scholar
  43. 43.
    Dastjerdi AV, Buyya R (2016) Fog computing: Helping the internet of things realize its potential. Computer 49(8):112–116Google Scholar
  44. 44.
    Moreno-Vozmediano R, Montero RS, Hued E, Llorente IM (2017) Cross-site virtual network in cloud and fog computing. IEEE Cloud Comput 4(2):46–53Google Scholar
  45. 45.
    Holgado-Terriza R-V, Muros-Cobos G-G (2014) Distributed service-based approach for sensor data fusion in IoT Environments, Special issue wireless sensor networks and the internet of things sensorsGoogle Scholar
  46. 46.
    Ashrafi TH, Hossain MDA, Arefin SE, Das KDJ, Chakrabarty A (2017) Service based FOG computing model for IoT, Collaboration and internet computing (CIC) IEEE 3rd International ConferenceGoogle Scholar
  47. 47.
    Deng S, Huang L, Wu H, Tan W, Taheri J, Zomaya AY, Wu Z (2016) Toward mobile service computing: Opportunities and challenges. IEEE Cloud Comput 3(4):32–41Google Scholar
  48. 48.
    Wen Z, Yang R, Garraghan P, Lin T, Xu J, Rovatsos M (2017) Fog orchestration for internet of things services. IEEE Internet Comput 21(2):16–24Google Scholar
  49. 49.
    Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32 (5):64–69Google Scholar
  50. 50.
    Brogi A, Forti S (2017) QoS-aware deployment of IoT applications through the Fog. IEEE Internet Things J 4(5):1185–1192Google Scholar
  51. 51.
    Taneja M, Davy A (2016) Resource aware placement of data analytics platform in Fog computing. Procedia Comput Sci 97:153– 156Google Scholar
  52. 52.
    Taneja M, Davy A (2016) Poster abstract: Resource aware placement of data stream analytics operators on fog infrastructure for internet of things applications, edge computing (SEC) IEEE/ACM SymposiumGoogle Scholar
  53. 53.
    Taneja M, Davy A (2017) Resource aware placement of IoT application modules in fog-cloud computing paradigm integrated network and service management (IM), IFIP/IEEE symposiumGoogle Scholar
  54. 54.
    Zahra S, Alam M, Javaid Q, Wahid A, Javaid N, Malik SUR, Khan MK (2017) Fog Computing Over IoT: A secure deployment and formal verification. IEEE Access 5:27132–27144Google Scholar
  55. 55.
    Chaudhary R, Kumar N, Sherali Z (2017) Network service chaining in fog and cloud computing for the 5g environment: Data management and security challenges. IEEE Commun Mag 55(11):114–122Google Scholar
  56. 56.
    Amaxilatis D, Akrivopoulos O, Chatzigiannakis I, Tselios C (2017) Enabling stream processing for people-centric IoT based on the Fog computing paradigm, Emerging technologies and factory automation (ETFA), 22nd IEEE international conferenceGoogle Scholar
  57. 57.
    Nan Y, Li W, Bao W, Delicato FC, Pires PF, Dou Y, Zomaya AY (2017) Adaptive energy-aware computation offloading for cloud of things systems. IEEE Access 5:23947–23957Google Scholar
  58. 58.
    Name HAM, Oladipo FO, Ariwa E (2017) User mobility and resource scheduling and management in Fog computing to support IoT devices, Innovative Computing Technology (INTECH), 7th International ConferenceGoogle Scholar
  59. 59.
    Bao W, Yuan D, Yang Z, Wang S, Li W, Zhou BB, Zomaya AY (2017) Follow Me Fog: Toward seamless handover timing schemes in a fog computing environment. IEEE Communications Magazine 55(11):72–78Google Scholar
  60. 60.
    Vilalta R, Lopez V, Giorgetti A, Peng S, Orsini V, Velasco L, Serral-Gracia R, Morris Silvia De Fina D, Cugini F, Castoldi P, Mayoral A, Casellas R, Martinez R, Verikoukis C, Munoz R (2017) TelcoFog: A unified flexible fog and cloud computing architecture for 5G networks. IEEE Commun Mag 55 (8):36–43Google Scholar
  61. 61.
    Shih Y-Y, Chung W-H, Pang A-C, Chiu T-C, Wei H-Y (2017) Enabling low-latency applications in fog-radio access networks. IEEE Netw 1:52–58Google Scholar
  62. 62.
    Sun X, Ansari N (2016) EdgeIoT: Mobile edge computing for the internet of things. IEEE Commun Mag 54(12):22–29Google Scholar
  63. 63.
    Sharma SK, Wang X (2017) Live data analytics with collaborative edge and cloud processing in wireless IoT networks. IEEE Access 5:4621–4635Google Scholar
  64. 64.
    Liu H, Chen Z, Qian L (2016) emph”The three primary colors of mobile systems. IEEE Commun Mag 54(9):15–21Google Scholar
  65. 65.
    Hu H, Wen Y, Chua T-S, Li X (2014) emph”Toward scalable systems for big data analytics: A technology tutorial. IEEE Access 2:652–687Google Scholar
  66. 66.
    Pham X-Q, Huh E-N (2017) emph”Towards task scheduling in a cloudfog computing system, 2016 18th Asia-pacific network operations and management symposium (APNOMS)Google Scholar
  67. 67.
    Choi N, Kim D, Lee S-J, Yi Y (2017) A Fog operating system for user-oriented IoT services: Challenges and Research Directions. IEEE Commun Mag 55(8):44–51Google Scholar
  68. 68.
    Yu T, Wang, X, Shami A (2017) A novel Fog computing enabled temporal data reduction scheme in IoT systems, GLOBECOM 2017 - IEEE global communications conferenceGoogle Scholar
  69. 69.
    Mollah MB, Azad Md AK, Vasilakos A (2017) Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Comput 4(1):34–42Google Scholar
  70. 70.
    Satyanarayanan M, Simoens P, Xiao Y, Pillai P, Chen Z, Ha K, Hu W, Amos B (2015) emph”Edge analytics in the internet of things, vol 14Google Scholar
  71. 71.
    Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY, Zomaya AY (2017) emph”SeDa SC: Secure data sharing in clouds. IEEE Syst J 11(2):395–404Google Scholar
  72. 72.
    Seo S-H, Nabeel M, Ding X, Bertino E (2014) emph”An efficient certificateless encryption for secure data sharing in public clouds. IEEE Trans Knowl Data Eng 26(9):2107–2119Google Scholar
  73. 73.
    Yang S (2017) IoT stream processing and analytics in the Fog. IEEE Commun Mag 55(8):22–27Google Scholar
  74. 74.
    Ma S, Liu Q, Sheu PC-Y (2018) Foglight: Visible light-enabled indoor localization system for low-power IoT devices. IEEE Internet Things J 5(1):175–185Google Scholar
  75. 75.
    Ma S, Liu Q, Sheu P (2016) On hearing your position through light for mobile robot indoor navigation, IEEE international conference on multimedia and expo workshopsGoogle Scholar
  76. 76.
    Inokuchi S, Sato K, Matsuda F (1984) Range imaging system for 3-D object recognition, Proc ICPR, pp 806–808Google Scholar
  77. 77.
    Manchester Data Encoding for Radio Communications, https://www.maximintegrated.com/en/app-notes/index.mvp/id/3435
  78. 78.
    Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: A survey. ACM Comput Surveys (CSUR) 41(3):15Google Scholar
  79. 79.
    Moshtaghi M, Rajasegarar S, Leckie C, Karunasekera S (2011) An efficient hyperellipsoidal clustering algorithm for resource-constrained environments. Pattern Recognition Elsevier 44(9):2197–2209Google Scholar
  80. 80.
    Rajasegarar S, Gluhak A, Imran MA, Nati M, Moshtaghi M, Leckie C, Palaniswami M (2014) Ellipsoidal neighborhood outlier factor for distributed anomaly detection in resource constrained networks. Pattern Recogn 47(9):2867–2879Google Scholar
  81. 81.
    He J, Wei J, Chen K, Tang Z, Zhou Y, Zhang Y (2017) Multi-tier Fog computing with large-scale IoT data analytics for smart cities, vol PPGoogle Scholar
  82. 82.
    Ni J, Zhang A, Lin X, Shen XS (2017) Security, privacy, and fairness in fog-based vehicular crowdsensing. IEEE Commun Mag 55(6):146–152Google Scholar
  83. 83.
    Zhang Y, Chen M, Guizani N, Wu D, Leung VCM (2017) SOVCAN: Safety-oriented vehicular controller area network. IEEE Commun Mag 55(8):94–99Google Scholar
  84. 84.
    Sheng Z, Kenarsari-Anhari A, Taherinejad N, Leung VCM (2016) A multichannel medium access control protocol for vehicular power line communication systems. IEEE Trans Veh Technol 65(2):542–554Google Scholar
  85. 85.
    Hu B, Ratcliffe M, Qi Y, Zhao Q, Peng H, Fan D, Zheng F, Jackson M, Moore P (2011) EEG-based cognitive interfaces for ubiquitous applications: Developments and challenges, vol 26Google Scholar
  86. 86.
    Weiss A (2007) Computing in the clouds. netWorker - Cloud computing 11(4):16–25Google Scholar
  87. 87.
    Pearson S, Benameur A (2010) “Privacy, security and trust issues arising from cloud computing,” Cloud Computing Technology and Science (CloudCom), IEEE Second International ConferenceGoogle Scholar
  88. 88.
    Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154Google Scholar
  89. 89.
    Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531–5538Google Scholar
  90. 90.
    Kraemer FA, Braten AE, Tamkittikhun N, Palma D (2017) Fog computing in healthcare—a review and discussion. IEEE Access 5:9206–9222Google Scholar
  91. 91.
    Zhang Y, Gravina R, Lu H, Villari M, Fortino G (2018) PEA parallel electrocardiogram-based authentication for smart healthcare systems. J Netw Comput Appl 117:10–16Google Scholar
  92. 92.
    Arteaga-Falconi JS, Osman HA, El Saddik A (2016) ECG authentication for mobile devices. IEEE Trans Instrum Meas 65:3Google Scholar
  93. 93.
    AzamiSidek K, Mai V, Khalil I (2014) Data mining in mobile ECG based biometric identification. J Netw Comput Appl 44: 83–91Google Scholar
  94. 94.
    Kang SJ, Lee SY, Cho HI, Park H (2016) ECG authentication system design based on signal analysis in mobile and wearable devices. IEEE Signal Process Lett 23:6Google Scholar
  95. 95.
    Qian Y, Zhang Y, Ma X, Yu H, Peng L (2019) EARS: Emotion-aware recommender system based on hybrid information fusion. Information Fusion 46:141–146Google Scholar
  96. 96.
    Mubeen S, Nikolaidis P, Didic A, Pei-Breivold H, Sandström K, Behnam M (2017) Delay mitigation in offloaded cloud controllers in industrial IoT. IEEE Access 5:4418–4430Google Scholar
  97. 97.
    Xiao S, Yu H, Wu Y, Peng Z, Zhan Y (2018) Self-evolving trading strategy integrating internet of things and big data. IEEE Internet Things J 5(4):2518–2525Google Scholar
  98. 98.
    Lv S, Lv S (2011) Applying BP neural network model to forecast peak velocity of blasting ground vibration. Procedia Engineer 26:257–263Google Scholar
  99. 99.
    Wang D, Zhang M, Li Z, Song C, Fu M, Li J, Chen X (2017) System impairment compensation in coherent optical communications by using a bio-inspired detector based on artificial neural network and genetic algorithm. Opt Commun 399:1–12Google Scholar
  100. 100.
    Rahman A, Hassanain E, Hossain MS (2017) Towards a secure mobile edge computing framework for Hajj. IEEE Access 5:11768–11781Google Scholar
  101. 101.
    Chen R-Y (2017) An intelligent value stream-based approach to collaboration of food traceability cyber physical system by Fog computing. Food Control, Elsvier 71:124–136Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.National University of Sciences and TechnologyIslamabadPakistan

Personalised recommendations