Fog Computing: A Comprehensive Architectural Survey

Fog computing is an emerging technology to address computing and networking bottlenecks in large scale deployment of IoT applications. It is a promising complementary computing paradigm to cloud computing where computational, networking, storage and acceleration elements are deployed at the edge and network layers in a multi-tier, distributed and possibly cooperative manner. These elements may be virtualized computing functions placed at edge devices or network elements on demand, realizing the “computing everywhere” concept. To put the current research in perspective, this paper provides an inclusive taxonomy for architectural, algorithmic and technologic aspects of fog computing. The computing paradigms and their architectural distinctions, including cloud, edge, mobile edge and fog computing are subsequently reviewed. Practical deployment of fog computing includes a number of different aspects such as system design, application design, software implementation, security, computing resource management and networking. A comprehensive survey of all these aspects from the architectural point of view is covered. Current reference architectures and major application-specific architectures describing their salient features and distinctions in the context of fog computing are explored. Base architectures for application, software, security, computing resource management and networking are presented and are evaluated using a proposed maturity model.

[1]  Victor C. M. Leung,et al.  Software Defined Networking, Caching, and Computing for Green Wireless Networks , 2016, IEEE Communications Magazine.

[2]  Vinay Singh,et al.  Security implementation in cloud computing using user behaviour profiling and decoy technology , 2017, 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT).

[3]  Sudip Misra,et al.  Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.

[4]  Jean-Marc Menaud,et al.  Side-channels beyond the cloud edge: New isolation threats and solutions , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).

[5]  Thomas Magedanz,et al.  A service orchestration architecture for Fog-enabled infrastructures , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[6]  Raj Jain,et al.  Network virtualization and software defined networking for cloud computing: a survey , 2013, IEEE Communications Magazine.

[7]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[8]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[9]  Alec Wolman,et al.  MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.

[10]  Hsiao-Hwa Chen,et al.  Joint mode selection and resource allocation for downlink fog radio access networks supported D2D , 2015, 2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE).

[11]  Kaibin Huang,et al.  Live Prefetching for Mobile Computation Offloading , 2016, IEEE Transactions on Wireless Communications.

[12]  Gang Sun,et al.  Towards Resource-Efficient Service Function Chain Deployment in Cloud-Fog Computing , 2018, IEEE Access.

[13]  Jordi Pérez-Romero,et al.  Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN , 2017, Comput. Stand. Interfaces.

[14]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[15]  Xu Chen,et al.  Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[16]  K. Sornalakshmi Detection of DoS attack and zero day threat with SIEM , 2017, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS).

[17]  Mario Nemirovsky,et al.  Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[18]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[19]  Robert Brzoza-Woch,et al.  Embedded systems in the application of fog computing — Levee monitoring use case , 2016, 2016 11th IEEE Symposium on Industrial Embedded Systems (SIES).

[20]  K. Rajakumar,et al.  A Study on Vehicle to Vehicle Collision Prevention Using Fog, Cloud, Big Data and Elliptic Curve Security Based on Threshold Energy Efficient Protocol in Wireless Sensor Network , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[21]  Qun Li,et al.  Challenges and Software Architecture for Fog Computing , 2017, IEEE Internet Computing.

[22]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[23]  Hui Tian,et al.  Multiuser Joint Task Offloading and Resource Optimization in Proximate Clouds , 2017, IEEE Transactions on Vehicular Technology.

[24]  Mingzhe Jiang,et al.  Fog Computing in Healthcare Internet of Things: A Case Study on ECG Feature Extraction , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[25]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[26]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[27]  Bo Sheng,et al.  A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.

[28]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[29]  Jianli Pan,et al.  Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.

[30]  Mugen Peng,et al.  Fog-computing-based radio access networks: issues and challenges , 2015, IEEE Network.

[31]  Rajkumar Buyya,et al.  Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions , 2015, J. Netw. Comput. Appl..

[32]  Cheng Huang,et al.  Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges , 2017, IEEE Communications Magazine.

[33]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[34]  Alberto Leon-Garcia,et al.  Software-defined infrastructure and the Future Central Office , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).

[35]  Doan B. Hoang,et al.  Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.

[36]  Valérie Issarny,et al.  A Perspective on the Future of Middleware-based Software Engineering , 2007, Future of Software Engineering (FOSE '07).

[37]  Wei Wang,et al.  Delay-Constrained Hybrid Computation Offloading With Cloud and Fog Computing , 2017, IEEE Access.

[38]  Min Sheng,et al.  Mobile-Edge Computing: Partial Computation Offloading Using Dynamic Voltage Scaling , 2016, IEEE Transactions on Communications.

[39]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[40]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[41]  Keke Chen,et al.  Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds , 2016, AsiaCCS.

[42]  Tibor Cinkler,et al.  Survey of platforms for massive IoT , 2018, 2018 IEEE International Conference on Future IoT Technologies (Future IoT).

[43]  Hao Liang,et al.  Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption , 2016, IEEE Internet of Things Journal.

[44]  Charles C. Byers,et al.  Architectural Imperatives for Fog Computing: Use Cases, Requirements, and Architectural Techniques for Fog-Enabled IoT Networks , 2017, IEEE Communications Magazine.

[45]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[46]  Rajkumar Buyya,et al.  Seamless application execution in mobile cloud computing: Motivation, taxonomy, and open challenges , 2015, J. Netw. Comput. Appl..

[47]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[48]  M. Eder,et al.  Hypervisor-vs . Container-based Virtualization , 2016 .

[49]  Hung-Yu Wei,et al.  Fog RAN over General Purpose Processor Platform , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).

[50]  Eui-nam Huh,et al.  Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[51]  Jameela Al-Jaroodi,et al.  A service-oriented middleware for cloud of things and fog computing supporting smart city applications , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[52]  Subhadra Sahoo,et al.  An Optimized Encryption Technique using an Arbitrary Matrix with Probabilistic Encryption , 2015 .

[53]  Sergio Barbarossa,et al.  The Fog Balancing: Load Distribution for Small Cell Cloud Computing , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[54]  Nelson Luis Saldanha da Fonseca,et al.  Class of service in fog computing , 2017, 2017 IEEE 9th Latin-American Conference on Communications (LATINCOM).

[55]  Eui-nam Huh,et al.  Dynamic resource provisioning through Fog micro datacenter , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[56]  Rajkumar Buyya,et al.  iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..

[57]  Neha Thakur Introduction to Jamming Attacks and Prevention Techniques using Honeypots in Wireless Networks , .

[58]  Ammar Rayes,et al.  Internet of Things Security and Privacy , 2017 .

[59]  Mohand Tahar Kechadi,et al.  Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.

[60]  Rajkumar Buyya,et al.  Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.

[61]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[62]  Mahadev Satyanarayanan,et al.  Just-in-time provisioning for cyber foraging , 2013, MobiSys '13.

[63]  Angelos Stavrou,et al.  Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks , 2015, RAID.

[64]  Sergio Barbarossa,et al.  Small Cell Clustering for Efficient Distributed Fog Computing: A Multi-User Case , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[65]  Tie Qiu,et al.  Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..

[66]  Fredrik Tufvesson,et al.  5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice , 2017, IEEE Journal on Selected Areas in Communications.

[67]  Sepehr Kazemian,et al.  Virtualized SDN-Based End-to-End Reference Architecture for Fog Networking , 2018, 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[68]  Ayman I. Kayssi,et al.  Edge computing enabling the Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[69]  Martin Gilje Jaatun,et al.  Handling compromised components in an IaaS cloud installation , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[70]  Bruno Volckaert,et al.  Fog Computing: Enabling the Management and Orchestration of Smart City Applications in 5G Networks , 2017, Entropy.

[71]  J.G. Tront,et al.  Battery Exhaustion Attack Detection with Small Handheld Mobile Computers , 2007, 2007 IEEE International Conference on Portable Information Devices.

[72]  Y. Navaneeth Krishnan,et al.  Fog computing — Network based cloud computing , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).

[73]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[74]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[75]  Tansu Alpcan,et al.  Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.

[76]  Camilius A. Sanga,et al.  A Survey on Detection of Sinkhole Attack in Wireless Sensor Network , 2015, ArXiv.

[77]  Yi Sun,et al.  An Optimal Offloading Partitioning Algorithm in Mobile Cloud Computing , 2016, QEST.

[78]  Rajkumar Buyya,et al.  Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.

[79]  Marília Curado,et al.  Service Orchestration in Fog Environments , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).

[80]  Antonio Brogi,et al.  QoS-Aware Deployment of IoT Applications Through the Fog , 2017, IEEE Internet of Things Journal.

[81]  Harsh Kumar Singh,et al.  An efficient data replication and load balancing technique for fog computing environment , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[82]  Rong Yu,et al.  Scalable Fog Computing with Service Offloading in Bus Networks , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[83]  Cheng Li,et al.  Securing SDN Infrastructure of IoT–Fog Networks From MitM Attacks , 2017, IEEE Internet of Things Journal.

[84]  Igor Radusinovic,et al.  Software-Defined Fog Network Architecture for IoT , 2016, Wireless Personal Communications.

[85]  Sudip Misra,et al.  Theoretical modelling of fog computing: a green computing paradigm to support IoT applications , 2016, IET Networks.

[86]  Md. Abdul Hamid,et al.  Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .

[87]  Songqing Chen,et al.  FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[88]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[89]  Kwang-Cheng Chen,et al.  Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks , 2015, IEEE Access.

[90]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[91]  Souvik Sengupta,et al.  Taxonomy and Resource Modeling in Combined Fog-to-Cloud Systems , 2018, Proceedings of the Future Technologies Conference (FTC) 2018.

[92]  Albert Y. Zomaya,et al.  A Taxonomy and Survey of Energy-Efficient Data Centers and Cloud Computing Systems , 2010, Adv. Comput..

[93]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[94]  Xavier Masip-Bruin,et al.  Managing resources continuity from the edge to the cloud: Architecture and performance , 2018, Future Gener. Comput. Syst..

[95]  Marimuthu Palaniswami,et al.  PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[96]  Kriti Bhushan,et al.  DDoS attack defense framework for cloud using fog computing , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[97]  Carol J. Fung,et al.  VGuard: A distributed denial of service attack mitigation method using network function virtualization , 2015, 2015 11th International Conference on Network and Service Management (CNSM).

[98]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[99]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[100]  S. K. Dubey,et al.  Security and Privacy in Cloud Computing: A Survey , 2013 .

[101]  Vlado Keselj,et al.  N-gram-based detection of new malicious code , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[102]  Sergio Barbarossa,et al.  Joint Optimization of Radio and Computational Resources for Multicell Mobile-Edge Computing , 2014, IEEE Transactions on Signal and Information Processing over Networks.

[103]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[104]  Nils Gruschka,et al.  Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[105]  Song Guo,et al.  Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System , 2016, IEEE Transactions on Computers.

[106]  Tony Q. S. Quek,et al.  Offloading in Mobile Edge Computing: Task Allocation and Computational Frequency Scaling , 2017, IEEE Transactions on Communications.

[107]  Robert H. Deng,et al.  Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..

[108]  Josep Domingo-Ferrer,et al.  Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..

[109]  Eyal de Lara,et al.  Cloudpath: a multi-tier cloud computing framework , 2017, SEC.

[110]  Jing He,et al.  Security in Fog Computing through Encryption , 2016 .

[111]  A. Khelifi,et al.  Using ISO 27001 in teaching information security , 2012, IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society.

[112]  Hanan Lutfiyya,et al.  DCSim: A data centre simulation tool for evaluating dynamic virtualized resource management , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[113]  Ms Indu Sahu,et al.  Mobile Cloud Computing: Issues and Challenges , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[114]  Dario Sabella,et al.  Mobile-Edge Computing Architecture: The role of MEC in the Internet of Things , 2016, IEEE Consumer Electronics Magazine.

[115]  Yong Li,et al.  System architecture and key technologies for 5G heterogeneous cloud radio access networks , 2015, IEEE Netw..

[116]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[117]  Xiaolei Wang,et al.  A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection , 2015, MCS '15.

[118]  Enzo Baccarelli,et al.  Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study , 2017, IEEE Access.

[119]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[120]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[121]  Abdelkader H. Ouda,et al.  Cloud-based DDoS attacks and defenses , 2013, International Conference on Information Society (i-Society 2013).

[122]  Chungang Yan,et al.  Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets , 2017, IEEE Internet of Things Journal.

[123]  Piero Castoldi,et al.  TelcoFog: A Unified Flexible Fog and Cloud Computing Architecture for 5G Networks , 2017, IEEE Communications Magazine.

[124]  Kang Kai,et al.  Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues , 2016 .

[125]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[126]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[127]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[128]  Mahmoud Al-Ayyoub,et al.  CloudExp: A comprehensive cloud computing experimental framework , 2014, Simul. Model. Pract. Theory.

[129]  Abdul Hanan Abdullah,et al.  A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing , 2017, IEEE Access.

[130]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[131]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[132]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[133]  Samer Salam,et al.  Internet of Things From Hype to Reality , 2017 .

[134]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[135]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[136]  Ajey Singh,et al.  Evaluating a cryptographic Overview of Attacks on Cloud Computing , 2012 .

[137]  Mugen Peng,et al.  Network Slicing in Fog Radio Access Networks: Issues and Challenges , 2017, IEEE Communications Magazine.

[138]  Haibo He,et al.  A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities , 2015, ASE BD&SI.

[139]  Rongxing Lu,et al.  Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing , 2015, 2015 IEEE International Conference on Communications (ICC).

[140]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[141]  Gürkan Gür,et al.  Software-Defined Edge Defense Against IoT-Based DDoS , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).

[142]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[143]  Sarah Abdallah,et al.  Identity-based authentication scheme for the Internet of Things , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).

[144]  Rajkumar Buyya,et al.  Fog Computing: Principles, Architectures, and Applications , 2016, ArXiv.

[145]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[146]  Ranesh Kumar Naha,et al.  Fog Computing Architecture: Survey and Challenges , 2018, ArXiv.

[147]  H. Madsen,et al.  Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[148]  Ivan Stojmenovic,et al.  Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[149]  Mahadev Satyanarayanan,et al.  A Brief History of Cloud Offload: A Personal Journey from Odyssey Through Cyber Foraging to Cloudlets , 2015, GETMBL.

[150]  Nejib Ben Hadj-Alouane,et al.  A platform as-a-service for hybrid cloud/fog environments , 2016, 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN).

[151]  Xavier Masip-Bruin,et al.  Towards a proper service placement in combined Fog-to-Cloud (F2C) architectures , 2018, Future Gener. Comput. Syst..

[152]  Michael S. Berger,et al.  Cloud RAN for Mobile Networks—A Technology Overview , 2015, IEEE Communications Surveys & Tutorials.

[153]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[154]  Ahmed Ghoneim,et al.  Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.

[155]  Meikang Qiu,et al.  Defending jamming attack in wide-area monitoring system for smart grid , 2015, Telecommun. Syst..

[156]  Di Chen,et al.  Backhaul traffic balancing and dynamic content-centric clustering for the downlink of Fog Radio Access Network , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[157]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[158]  Vincenzo Grassi,et al.  A game-theoretic approach to computation offloading in mobile cloud computing , 2015, Mathematical Programming.

[159]  Antonio Pascual-Iserte,et al.  Optimization of Radio and Computational Resources for Energy Efficiency in Latency-Constrained Application Offloading , 2014, IEEE Transactions on Vehicular Technology.

[160]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[161]  Yacine Ghamri-Doudane,et al.  Software defined networking-based vehicular Adhoc Network with Fog Computing , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[162]  Ahmed Shawish,et al.  Cloud Computing: Paradigms and Technologies , 2014 .

[163]  Mohsen Sharifi,et al.  A Survey and Taxonomy of Cyber Foraging of Mobile Devices , 2012, IEEE Communications Surveys & Tutorials.

[164]  Jun Shen,et al.  Facilitating Social Collaboration in Mobile Cloud-Based Learning: A Teamwork as a Service (TaaS) Approach , 2014, IEEE Transactions on Learning Technologies.

[165]  Ta Nguyen Binh Duong,et al.  Secure Virtual Machine Placement in Infrastructure Cloud Services , 2017, 2017 IEEE 10th Conference on Service-Oriented Computing and Applications (SOCA).

[166]  Depeng Jin,et al.  Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures , 2016, IEEE Transactions on Vehicular Technology.

[167]  Lorenzo Martignoni,et al.  A Framework for Behavior-Based Malware Analysis in the Cloud , 2009, ICISS.

[168]  Said El Hajji,et al.  Secure Cloud Computing through Homomorphic Encryption , 2014, ArXiv.

[169]  Tim Verbelen,et al.  Cloudlets: bringing the cloud to the mobile user , 2012, MCS '12.

[170]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[171]  Hari Balakrishnan,et al.  CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.

[172]  Anfeng Liu,et al.  A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[173]  Shamik Sengupta,et al.  CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN , 2014, 2014 IEEE Military Communications Conference.

[174]  Mahmoud Al-Ayyoub,et al.  Collusion attacks in Internet of Things: Detection and mitigation using a fog based model , 2017, 2017 IEEE Sensors Applications Symposium (SAS).

[175]  Peter Desnoyers,et al.  Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.

[176]  Reihaneh Safavi-Naini,et al.  Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.

[177]  Zhiwu Huang,et al.  A Combinatorial Optimization for Energy-Efficient Mobile Cloud Offloading over Cellular Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[178]  Walid Saad,et al.  Proactive edge computing in latency-constrained fog networks , 2017, 2017 European Conference on Networks and Communications (EuCNC).

[179]  Lifeng Sun,et al.  A Survey of Cloudlet Based Mobile Computing , 2015, 2015 International Conference on Cloud Computing and Big Data (CCBD).

[180]  Rami Bahsoon,et al.  Conceptual framework for dynamic trust monitoring and prediction , 2010, ICCS.

[181]  Bhaskar Krishnamachari,et al.  Hermes: Latency Optimal Task Assignment for Resource-constrained Mobile Computing , 2017, IEEE Transactions on Mobile Computing.