Open Access   Article Go Back

Fog Computing: A Look on Present Scenario and Hopes for Future Research

Kalpit G. Soni1 , Hiren Bhatt2 , Dhaval Patel3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-9 , Page no. 195-200, Sep-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i9.195200

Online published on Sep 30, 2019

Copyright © Kalpit G. Soni, Hiren Bhatt, Dhaval Patel . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kalpit G. Soni, Hiren Bhatt, Dhaval Patel, “Fog Computing: A Look on Present Scenario and Hopes for Future Research,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.195-200, 2019.

MLA Style Citation: Kalpit G. Soni, Hiren Bhatt, Dhaval Patel "Fog Computing: A Look on Present Scenario and Hopes for Future Research." International Journal of Computer Sciences and Engineering 7.9 (2019): 195-200.

APA Style Citation: Kalpit G. Soni, Hiren Bhatt, Dhaval Patel, (2019). Fog Computing: A Look on Present Scenario and Hopes for Future Research. International Journal of Computer Sciences and Engineering, 7(9), 195-200.

BibTex Style Citation:
@article{Soni_2019,
author = {Kalpit G. Soni, Hiren Bhatt, Dhaval Patel},
title = {Fog Computing: A Look on Present Scenario and Hopes for Future Research},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {195-200},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4876},
doi = {https://doi.org/10.26438/ijcse/v7i9.195200}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.195200}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4876
TI - Fog Computing: A Look on Present Scenario and Hopes for Future Research
T2 - International Journal of Computer Sciences and Engineering
AU - Kalpit G. Soni, Hiren Bhatt, Dhaval Patel
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 195-200
IS - 9
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
317 275 downloads 140 downloads
  
  
           

Abstract

According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT devices are generally handled in cloud infrastructure. Though, dealing with IoT application requests on the cloud exclusively is not a proficient result for some IoT applications particularly time-sensitive ones. These issues can be settled by utilizing another idea called, Fog computing. Fog computing has become one of the major fields of research from both academia and industry perspectives. The ongoing research commitments on few issues in fog computing are figuring out in this paper. At long last, this paper also highlights some open issues in fog with IoT, which will determine the future research direction for implementing Fog computing paradigm.

Key-Words / Index Term

Fog computing, Internet-of-Things, Cloud computing, Cloud-based IoT

References

[1] L. Coetzee, J. Eksteen, The Internet of Things- Promise for the Future? An Introduction, IST Africa 2011, http://www.ISTafrica. org/Conference 2011
[2] L. Atzori et al., The Internet of Things: A survey, Comput. Netw.(2010), doi:10.1016/j.comnet.2010.05.010.
[3] Bolivar Torres et.al., Integration of an RFID reader to a wireless sensor network and its use to identify an individual carrying RFID tags, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.1, No.4, December 2010
[4] B. B. P. Rao, P. Saluia, N. Sharma, A. Mittal and S. V. Sharma, "Cloud computing for the Internet of Things & sensing based applications," 2012Sixth International Conference on Sensing Technology (ICST), Kolkata, pp. 374-380, 2012.
[5] G. Joshi and S. Kim, “Survey, Nomenclature and Comparison of ReaderAnti-Collision Protocols in RFID,” IETE Tech. Rev.,Vol. 25, no. 5,
[6] R. Jason Weiss, Development Dimensions International. J. Philip Craiger, University of Nebraska–Omaha
[7] S. Maharajothi, Dr S. Adaekalavan: Deadline Based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds, International Journal of Advance Research in Computer Science and Management Studies, Vol 4, Issue. 8, pp 60-66, August 2016, ISSN: 2321-7782 (Online)
[8] NIST, (2009). “Presentation on Effectively and Securely Using the Cloud Computing Paradigm v25,” http://csrc.nist.gov/groups/SNS/cloudcomputing/cloud-computing-v25.ppt, on August 29, 2009
[9] P. Mell and T. Grance: “The NIST definition of cloud computing (v15),” National Institute of Standards and Technology, Version 15, 10-7-09.
[10] Aazam, M., Huh, E.-N.: Fog computing and smart gateway based communication for a cloud of things. In: The Proceedings of IEEE Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, pp. 27–29, 2014
[11] M.M. Islam, S.Morshed, and P.Goswami, "Cloud computing: A survey on its limitations and potential solutions," International Journal of Computer Science Issues, Vol.10, no.4, pp. 159--163, 2013.
[12] E.O. Yeboah-Boateng and K.A. Essandoh, "Factors influencing the adoption of cloud computing by small and medium enterprises in developing economies," International Journal of Emerging Science and Engineering, Vol.2, no.4, pp. 13--20, 2014.
[13] R.P. Padhy and M.R. Patra, "Managing IT operations in a cloud-driven enterprise: Case studies," American Journal of Cloud Computing, Vol.1, no.1, pp. 1--18, 2013.
[14] Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B.; Daniel, J. Developing an adaptive Risk-based access control model for the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23, pp. 655–661, June 2017;
[15] Ai, Y.; Peng, M.; Zhang, K. Edge cloud computing technologies for the internet of things: A primer. Digit.Commun. Netw. 2017, in press.
[16] Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing-MCC ’12, Helsinki, Finland, 17 pp. 13–16, August 2012
[17] Manzalini and N. Crespi, “An Edge Operating System Enabling Anything-as-a-Service,” IEEE Commun. Mag., Vol. 54, no. 3, pp. 62–67, Mar. 2016.
[18] Wen, Z.; Yang, R.; Garraghan, P.; Lin, T.; Xu, J.; Rovatsos, M. Fog orchestration for internet of things services.IEEE Internet Comput., 21, 16–24, 2017
[19] Liu, Y.; Fieldsend, J.E.; Min, G. A Framework of Fog Computing: Architecture, Challenges and Optimization. IEEE Access, 4, 1–10, 2017.
[20] Peralta, G.; Iglesias-Urkia, M.; Barcelo, M.; Gomez, R.; Moran, A.; Bilbao, J. Fog computing based efficient IoT scheme for the Industry 4.0. In Proceedings of the2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their application to Mechatronics, San Sebastian, Spain,; pp.1–6, 24–26 May 2017
[21] Luan, T.H.; Gao, L.; Li, Z.; Xiang, Y.; Wei, G.; Sun, L. Fog Computing: Focusing on Mobile Users at the Edge.arXiv2015, arXiv:1502.01815.
[22] Choi, N.; Kim, D.; Lee, S.; Yi, Y. Fog Operating System for User-Oriented IoT Services: Challenges and Research Directions. IEEE Commun. Mag. 2017, 55, 2–9.
[23] Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N. Security and Privacy in Fog Computing: Challenges. IEEE Access 2017, 5, 19293–19304.
[24] Yi, S.; Hao, Z.; Qin, Z.; Li, Q. Fog computing: Platform and applications. In Proceedings of the 3rdWorkshop on Hot Topics in Web Systems and Technologies, HotWeb 2015, Washington, DC, USA, pp. 73–78, 24–25 October 2016
[25] Giang, N.K.; Blackstock, M.; Lea, R.; Leung, V.C.M. Developing IoT applications in the Fog: A Distributed Dataflow approach. In Proceedings of the 5th International Conference Internet Things, IoT 2015, Seoul, Korea, pp. 155–162, 26–28 October 2015
[26] Ketel, M. Fog-Cloud Services for IoT. In Proceedings of the Southeast Conference, Kennesaw, GA, USA, pp. 262–264, 13–15 April 2017
[27] Alenezi, A.; Zulkipli, N.H.N.; Atlam, H.F.; Walters, R.J.; Wills, G.B.The Impact of Cloud Forensic Readiness on Security. In Proceedings of the 7th International Conference on Cloud Computing and Services Science (CLOSER 2017), Porto, Portugal, pp. 511–517, 24–26 April 2017
[28] Lee, K.; Kim, D.; Ha, D.; Rajput, U.; Oh, H. On security and privacy issues of fog computing supported the Internet of Things environment. In Proceedings of the 6th International Conference on the Network of the future (NOF), Montreal, QC, USA; 2015; pp. 1–3.
[29] Yin, B.; Shen, W.; Cheng, Y.; Cai, L.X.; Li, Q. Distributed resource sharing in fog-assisted big data streaming. In Proceedings of the 2017 IEEE International Conference on Communications, Chengdu, China, pp. 1–6, 27–30 October 2017
[30] Hung, C.L.; Yan, R.Y.; Wang, H.H. Parallel image dehazing algorithm based on GPU using fuzzy system and hybrid evolution algorithm. In Proceedings of the 2016 IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Shanghai, China, pp. 581–583, 30 May–1 June 2016
[31] Hu, P.; Ning, H.; Qiu, T.; Song, H.; Wang, Y.; Yao, X. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in the Internet of Things. IEEE Internet Things J. 2017, 4, 1143–1155.
[32] Wang, L.; Liu, G.; Sun, L.A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog-based VANETs.Sensors 2017, 17, 668.
[33] Al Hamid, H.A.; Rahman, S.M.M.; Hossain, M.S.; Almogren, A.; Alamri, A.A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography. IEEE Access 2017, 5, 22313–22328.