Evolution of Fog Computing Applications, Opportunities, and Challenges: A Systematic Review

Evolution of Fog Computing Applications, Opportunities, and Challenges: A Systematic Review

Hewan Shrestha, Puviyarai T., Sana Sodanapalli, Chandramohan Dhasarathan
Copyright: © 2021 |Pages: 17
DOI: 10.4018/IJFC.2021010101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The emerging trend of internet of things in recent times is a blessing for various industries in the world. With the increasing amount of data generated by these devices, it makes it difficult for proper data flow and computation over the regular cloud architecture. Fog computing is a great alternative for cloud computing as it supports computation in devices over a large distributed geographical area, which is a plus for fog computing. Having applications in various domains including healthcare, logistics, design, marketing, manufacturing, and many more, fog computing is a great boon for the future. Evolving fog computing in various domains with different methods and techniques has shaped a clear future for it. Applicability of fog computing in vehicular communications and storage-as-a-service has made the term more popular these days. It is a review of all the possible fog computing-enabled applications and their future scope. It also prepares a basis for further research into fog computing domain-enabled services with low latency and minimum costs.
Article Preview
Top

2. Literature Review

Zeeshan Ali et al. (2020), Fog computing, abbreviated as FC, is simply an infrastructure which contains distributed computing, where all the computing resources such as storage, applications and data are distributed among the cloud and the data source. All the security and privacy issues such as authentication and key management issues, which were seen in cloud computing are also observed in fog computing as fog computing is just an extension to the traditional cloud computing. The scheme SAKA-FC, used for authentication key exchange for fog computing may suffer from extreme vulnerabilities according to the analysis performed. There is something called BAN logic which validates the formal security analysis of the proposed scheme. Meanwhile, automated formal scheme security verification takes place by the use of AVISPA tool. Some sort of non formal security analysis is performed to manifest that the proposed scheme can encounter some known attacks. With the proposed scheme, we get same communication costs as SAKA-FC, with a small difference in computation cost of 24%.

B.V. Natesha et al. (2021), Simply to be said, fog computing is the cutting edge technology used for handling, processing and computation of huge amount of data received from edge devices and sensors such as IoT devices. Some common networking devices like router and gateways are also used for as nodes to host and provide services to the connected devices as a result of IoT applications. The major problem in fog computing is finding a perfect node and deployment and running of IoT services because this devices might be geographically distributed and have a number of limited resources with them. Two-level resource provisioning framework has been designed in this paper with the help of dockers and containerization. With the two-level resource provisioning framework, service placement platform has been formulated as a multi-objective optimization problem for minimization of service time, cost, and energy consumption of IoT applications. The multi-objective optimization problem has been solved using the Elitism Based Genetic Algorithm (EGA). The results showed that the adopted method outperformed other techniques in terms of cost, time and energy consumption.

Satish Narayana Srirama et al. (2020), Fog computing is a hybrid distributed processing model, where the future Internet-of-Things (IoT) driven applications will move from cloud-centric model to. To reduce latency and improve the network effectiveness, some of the computational tasks such as real-time data analysis are moved to the edge of the network. Fog computing has been an interesting research domain in recent times. However, parallel and fault-tolerant execution of tasks are not supported with proper approach and a framework. An Akka framework based on the Actor model for designing and executing the distributed Fog applications has been proposed in this paper. Using the Akka toolkit as an implementation for the regular Actor model, a docker containerization approach is however used to deploy the distributed applications on the Fog networks.

Complete Article List

Search this Journal:
Reset
Volume 7: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 6: 1 Issue (2023)
Volume 5: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 4: 1 Issue (2021)
Volume 3: 2 Issues (2020)
Volume 2: 2 Issues (2019)
Volume 1: 2 Issues (2018)
View Complete Journal Contents Listing