Preprints201903 0145 v1 PDF
Preprints201903 0145 v1 PDF
v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
Abstract: The development of Internet of Things (IoT) has triggered a virtual wave of
interconnection and intercommunication among enormous number of universal things. This has
caused an exceptional surge of colossal heterogeneous information, known as information
explosion. Until now, cloud computing has filled in as a proficient method to process and store
these data. Still, it came to light that by utilising just cloud computing, pesky issues like, the
expanding requests of actual-time or speed-sensitive applications and the restrictions on system
transfer speed could not be solved. Consequently, another computing platform, called fog
computing has been advanced as a supplement to the cloud arrangement. Fog computing spreads
the cloud administrations and services to the edge of the system, and brings processing,
communications and reserving and storage capacity closer to edge gadgets and end-clients and, in
the process, aims at enhancing versatility, low latency, transfer speed and safety and protection.
This paper takes an extensive and wide-ranging view of fog computing, covering several aspects.
At the outset is outlined the many-layered structural design of fog computing and its attributes.
After that, chief advances like communication and inter-exchange, computing, reserving and
storage, asset administration, naming, safety and safeguarding of privacy are delineated, while
showing how these back up and facilitate the installations and various applications. Then,
numerous applications like augmented reality (AR), healthcare, gaming and brain-machine
interface, vehicular computing, smart scenarios etc. are highlighted to explain the fog computing
application milieu. Following that, it is shown that how, despite fog computing being a features-
rich platform, it is dogged by its susceptibility to several security, privacy and safety concerns,
which stem from the nature of its widely distributed and open architecture. Finally, some
suggestions are advanced to address some of the safety challenges discussed so as to propel the
further growth of fog computing.
Keywords: Fog Computing; Cloud Computing; Security and Privacy; Edge Computing; Internet of
Things;
1. Introduction
The internet has revolutionized the computers, communication and communication technology
like nothing has ever before. The internet’s invention is one of mankind's most cherished
accomplishments. Yet, the seepage of its use and adaptation of technology is changing its terrain
rapidly. The specter of new technologies coming together and linking with each other faster has
created new paradigms like Cyber-Physical System (CPS) and the Internet of Things (IoT). What is
unimaginable is the wireless connection of devices to our physical bodies, to each other and
absolutely everything around us at any time [1, 2]. Thus, IoT implies an expansion of Internet
through which physical objects are connected virtually, with the ability to provide smart services to
its users.
Naturally, this interaction between devices is slated to create gargantuan amounts and
diversities of information and data. It is interesting to consider some figures. Cisco predicts that by
2020 some 50 billion devices will be connected to the Internet, and the data and information generated
by devices, people, things, appliances etc. will amount to 500 zettabytes. And by 2019, out of this, 45
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
percent of data generated by IoT will be interpreted, processed, analysed and saved at the network’s
edge [3,4].
Along with the mushrooming of data, the pace of data creation is fast increasing, too. For
instance, findings related to healthcare services show that 30 million users create about 25,000 tuples
data per second[5] with respect to healthcare-linked IoT communication. This means the data storage
and processing mechanisms that we have in place at present are unable to keep up with what is
expected[6]. And traditional computing versions, like distributed computing etc. are failing to
handle this deluge.
But the advent of cloud computing has emphatically altered the scenario of information
technology. By getting rid of such factors like proportional expenses, scalability, getting rid of upfront
IT investment etc., it has brought in substantial advantages for IT users[7-11].
Thus, owing to its potent computational power and capacity to store [12,13], cloud computing
emerged as an effective method for data processing. At the same time, though, there are some
inherent issues with cloud computing. For one, cloud computing is a consolidated, centralized
computing representation that performs computations in the cloud. This means that all the data,
information, requests and what have you have to be dispatched to the cloud. And while the pace of
processing of data has increased swiftly, the bandwidth of network has not kept equal pace.
So for massive amounts of data, bandwidth of network is turning out to be a hindrance in cloud
computing. And this is causing long latency, the duration of time it takes for data to go from point to
another. And the issue is compounded when increasing number of devices are linked to Internet
because applications that are sensitive to latency begin to face grave problems of long delays. For
instance, systems in some IoT applications, such as emergency response[14], smart
healthcare[15,16], traffic light system in smart transportation, smart grids[17] and other latency-
sensitive applications[18] may perforce need an extremely short response time and support of
mobility. In short, it was found that these challenges stemming from the unprecedented growth of
IoT, with respect to latency, bandwidth of network, mobility support, dependability, location
awareness, security etc., could not be effectively tackled by the model of cloud computing.
And thus emerged a new paradigm named Fog computing, to surmount the issues listed above
[19][20]. Fog computing, it is established, effortlessly facilitates working between center of cloud and
devices that are at the network edge, and thus morphs as a better solution to tackle the problems
presented by cloud computing. Bonomi et al. [21] describe Fog computing “as a geographically
distributed, highly virtualized architecture where diverse multifarious devices at the brink of
network are universally linked in conjunction to offer communication, flexible computation and
storage facilities” [22].
It is worth noting that both cloud and fog computations deliver to end users application services,
computation, storage and data[23]. But certain telling features distinguish fog from cloud. Fog is a
platform that locally processes huge amounts of data, enables installation of software on diverse
hardware[24], has dense geographical distribution, offers support for mobility[25] and is
decentralized and close to end users.
A case in point displaying and proving the aspect of latency is a system of traffic lights. In a
system of traffic lights not based on Fog, between the cloud server and monitoring probes there might
be 3 to 4 jumps or hops. This makes it difficult to make actual-time decisions and the problem of
network latency pops up. If the system is Fog-based, however, monitoring probe serves like a sensor
and the traffic lights as actuator. The Fog node can transmit a normal condensed video which can
exist in the cloud for some duration. The Fog can take an instantaneous decision to turn green the
related traffic lights when it records headlights of an ambulance flashing, to enable the health-care
vehicle to pass through without holding it. Still, what is to be noted is that the Fog is only an adjunct;
it can supplant the Cloud.
The most noteworthy facet of fog computing is that it extends the services of cloud to the brink
of the network. By gathering the local resources, it brings in close proximity such features as
communication, control, storage and computation to end clients. The topographically dispersed
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
devices at the edge of network absorb all the information and data. The net result is that the time of
data transmission and the volume of network transfer is immensely curtailed[26].
Thus the Fog platform can keep up with the requirements of applications that need latency and
also, in the process, smooth hindrances in bandwidth of network. Moreover, for users Fog is
accessible from any location, at any time, through any device that is linked to the network of Fog. It’s
no wonder then that Fog computing has found increasing favor in such areas as healthcare [27-30],
smart city [31-33] and others. Also, thanks in due parts to its quick response and small energy
expenditure [34,35], it can offer enhanced Quality of Service (QoS).
As for the fog system itself, it is made up of what are called fog nodes, which incorporate various
devices that are at the edge of network and systems of management imbedded in the devices. It also
includes some simulated edge of centers of data[36]. Fog computing serves to work as a connecting
link between cloud and edge users. This is accomplished by fog nodes by conjoining end appliances
and devices and users through the use of wireless connection platforms like Wi-Fi, Bluetooth, 4G etc.,
to make available services such storage, computation and computing. At the same time, to fully
utilize the cloud’s loaded storage and computing resources, fog nodes can also be linked, through
Internet, with cloud [37]. Thus the fog computing system facilitates speedy evaluation of data and
the process of decision making.
It must, however, be borne in mind that fog computing is just an adjunct of cloud computing. It
does neither replace nor substitute cloud computing. Edge devices and sensors create data and fog
nodes simply save and process the data. After this, the leftover significant data is shifted over the
cloud server for either further processing or saving.
Fog computing, undoubtedly, is a dynamic, versatile resources-rich platform. Still, it’s widely
dispersed and open structural design renders it vulnerable to various kinds of attacks, endangering
the safety and security of its operation. For instance, in IoT fog nodes are frequently the primary
group of processors that data or information meets, and have the assets to execute a full hardware
root of trust. This root of trust can be stretched to all applications and procedures operating upon
them, and thereafter to the Cloud [38]. If a hardware root of trust is missing, different assault
situations can hobble the fog’s software frameworks, permitting the assaulters to establish their sway.
Thus, with the ascent of the fog, newer dangerous issues relating to trust and safety have sprung
forth[39]. As it happens, however, because of the fog’s attributes of diversification, mobility and wide
universal dispersion, the available current techniques are inadequate to counter the security
threats[40]. This paper specifically dwells on the issues of safety, security and trust pertaining to fog
computing. This paper also undertakes an extensive survey of fog computing. It details various
aspects of fog computing, including its design and architecture, main technologies involved, the
applications where fog computing can be put to effective use and the security and trust issues and
other challenges.
The survey paper’s first chapter gives a general introduction to fog computing. In chapter 2, the
architecture and attributes and characteristics of fog computing are enumerated. Chapter 3 dwells on
the main technologies involved in fog computing. Chapter 4 focuses on certain prominent
applications vis-a-vis fog computing. Chapter 5 shines a light on the challenges, security and trust
issues dogging fog computing. And the conclusion is presented in chapter 6.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
mobile gadgets and their users’ locations and the manner in which they obtain data[47]. This
contributes to enhancing quality of service and the system’s performance.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
safeguard data through isolation and encryption by offering integrity checks, policy of access control,
isolation techniques and schemes of encryption. Additionally, it can prevent the glitches and risks
arising out of upgradation of system. Unlike the remote upgrade that takes place in conventional
devices, only the updating of micro applications and algorithms at the fog end is required and not
the Over-the-Air Technology (OTA) rmware system of upgradation employed in remote
upgradation.
2.1.8. Interoperability
Fog computing is diversified and heterogeneous in nature in which end gadgets and fog nodes are
supplied by various providers located at different locations and the fog nodes end up being employed
in different scenarios. So, it becomes imperative for fog nodes to interlink, cooperate and interconnect
with a wide variety of providers so as to be able to deliver and support a wide array of services [54].
A case in point is the fog computing-backed streaming service that necessitates working together
of various providers, in which services end up being allocated across different locations and domains
[25]. Here, consider the scenario of the fog computing related system of smart transportation. In this,
with vital transfer of data among smart vehicles, fog nodes and applications, traffic lights and signals,
what is needed is quick analysis of actual-time data. Therefore, to make sure that there is safe
cooperation and collaboration and interoperability between various resources employed in fog
computing. [52,53}, a scheme of management of resources in the form of a policy has been
propounded.
In order to be able to deliver applications and services, fog computing relies on certain technologies.
These technologies chiefly comprise storage and communication technologies, computing, privacy
and security protection, naming, resource management etc. These technologies are fully aligned
with fog computing’s properties and fulfil its requirements of applications. Below are listed the
main technologies that support the fog computing platform.
Fog computing is an intuitive dynamic computing platform in which fog nodes freely fulfil the
demands of end users for data processing and computation. In order to deliver the capabilities of
fast turnaround and low-latency, it requires the backing of certain computing technologies.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
In an effort to achieve management of latency, Oueis et al. [54] put forth an effective induction
protocol in which several nodes working with each other complete computation jobs jointly within
the parameters of latency. In a separate study, for management of latency Intharawijitr et al. [55]
propounded a fog computing design geared to achieve low-latency. To resolve the delay in
communication and computing, they proposed a mathematical formula to help guide the choice and
selection of nodes in the network of fog that could offer the least delay.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
uneven connectivity[63]. For instance, SDN can surmount the above problems in fog computing
vehicle’s network. Truong et al. [64] have suggested an SDN and fog computing- propped-up novel
ad hoc network design named FSDN for vehicles, which will solve the problems of poor and uneven
connectivity and those related to flexibility and scalability. Additionally, by merging with fog
computing, SDN can lessen latency and optimise the use of resources.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
Among diversified devices, gadgets and things, for collaboration and communication, a
competent and established naming mechanism is a must. In fog computing, conventional naming
mechanisms like DNS and Uniform Resource Identifier (URI) that are employed extensively in
present networks, can meet requirements of applications up to a limit. But the location of most
devices, gadgets and things at the edge renders them decidedly mobile and restricted in resources.
This, in turn, renders these mechanisms inflexible in some situations to be in sync with the
vibrant fog computing platform. Also, the popular IP-based naming system could not be employed
because of cost considerations. Consequently, some novel naming methods have been put forth that
would be in sync with fog computing’s features. These novel methods, for instance, are called Data
Networking(NDN) [73-74] and Mobility First[75].
DN: A growth of IP design, it takes into account “the contents (What) rather than the addresses
(Where).” With tier-layered data, NDN packets summon names rather than source and destination
location and address. It has the ability to give monikers to anything, whether computers, humans,
books, sensors etc. Its chief aim is to enhance the competence, scalability and safety and stability of
the prevailing internet paradigm, making it appropriate for fog and edge computing.
MobilityFirst: It aims to tackle the glitches pertaining to wireless access and mobility to fulfil in
the present mobile Internet the requirements of naming protocols. Unlike the current system, it
detaches names from addresses on network. Currently, both the Global Unique Identification
(GUID) and Global Name Resolution Service (GNRS) are employed to affix name and addresses
together. In MobilityFirst, though, the API service focuses on names of destination or source network
objects, instead of on addresses of network. To accomplish scalability, it employs combined
name/address embedded routing. For fog computing that houses devices that move, this naming
method delivers excellent results.
As for the technology for identification of devices, applications and things, it is categorised in
three segments: physical object identification, communication identification and application
identification.
Physical object identification: Chiefly availed to identify devices, gadgets and things, this kind
of identification embraces, as identifiers, natural property and ID code. The natural property
identifier uses behaviour attributes, biometric, information about space and time or other attributes
as identifier[76-77]. This is also termed non-ID verification. On the other hand, the ID code identifier
comprises alphabets or numbers with some rules attached to them, such as ubiquitous ID (uID) [78],
European Article Number(EAN), Electronic Product Code (EPC) [79] etc.
Communication identification: This one is employed to verify the identity of devices, gadgets or
network nodes, especially those that have the capability to deal in communication. Among these, the
popular forms are: IP address [80], MAC address, E.164 number, etc. Application identification: In
fog platform this one is concerned with identifying the different applications, such as uniform
resource locator (URL), domain name etc.
In terms of resolution technology, the Object Name Service (ONS), which is part of EPC global
network is the most popularly used resolution service [81]. In fog computing, ONS is in sync and
supports the mobility attribute. In their study, Hu et al. [43] advanced a fog computing entrenched
framework of identification and resolution. It was found that it identified and resolved persons from
their faces and, in the process, also preserved bandwidth and enhanced efficiency of processing. The
method could also double up as a reference for non-ID verification.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
In 5G wireless networks Bastug et al. [82] have propounded an ardent dedicated caching
mechanism that would energetically, on its own, stash the sought-for information even prior to users
asking for it. If this pre-catch scheme and stratagem can be incorporated in fog computing, it can
come in handy in smart vehicular and traffic applications. The system could anticipate proactively
the demands of drivers and stash them in edge devices and at base stations, thus significantly
lessening traffic demands at peak times.
Additionally, it is worth noting that edge devices have constricted capacity for storage. So to
enhance fog computing’s overall service strengths, the technology of storage extension can prove
very beneficial. In their study, Hassan et al. [47] have come up with the new concept of leveraging
personal storage in mobile gadgets, as a method for storage extension that is secure and competent.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
4. Applications
It is now established that fog computing especially serves well those applications that thrive on
low latency [37,90]. That’s why, in several areas that mandate low latency, such as urgent services,
cyber physical systems, healthcare etc. fog computing has found enthusiastic favour. Below are listed
certain applications that embrace fog computing:
4.2 Healthcare
Healthcare is the one area in which fog computing based applications have been cited most often.
In the past few years, a wide range of healthcare services and works relating to diagnosis, detection,
health illnesses etc. have been propounded.
Talking about the attributes of fog computing, M. Yannuzzi et al. [16] and [93] stress on areas in
healthcare where fog computing can be profitably employed.
In their work, Cao et al. [15] have put forth a system called FAST which in reality is a system of
distributed analytics backed by fog computing to keep track of fall alleviation. In this protocol, they
have included algorithms for identifying fall, and the system disseminates the analytics across the
network through the separation of identifying task between the server and devices at the edge, which
are basically phones that users carry.
In another initiative, M. Ahmad et al. [94] displayed Health Fog, a model in which fog computing
is put to use as a connection link between the cloud and end users. The structure of Health Fog is
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
such that it lessens the cost arising out of added communication. In systems that are similar, this cost
works out much higher.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
In their study, Zao et al [96] created a fog computing based computer interaction game that linked
brain with data. As the person is playing, the data created by EEG head-set reveals the state of the
player’s brain and, in effect, serves to save time because the data does not have to be transmitted to
main servers for processing. The system uses a blend of cloud and fog servers, allowing for non-stop
actual-time processing and categorisation.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
The fog computing platform also serves as an extremely favourable mode for Urgent computing,
such as, for instance, in providing backing for disaster related occurrences that require immediate
evaluation, help and reactions. In this regard M. Aazam et al. [98] built up a support framework for
making flood related decisions. This system employs fog nodes to process the obtained genuine
information and trigger alerts in the event of flood occurrence.
Also, M. Aazam, E.-N. Huh et al. [99] exhibited E-HAMC (Emergency Help Alert Mobile Cloud)
program that endeavours to react expeditiously to a demand of a client in the event of an emergency
circumstance. Fog computing has been put to another use in the optimisation of web [100]. Any
request made by the user on the web is initially processed through the fog or edge servers, which
secure them later from the centre system or network where the web servers are located and then alter
and locally store these documents. Thus, fog gadgets or devices can possibly be utilised as local
storing and reserving points.
Fog computing gadgets and devices may confront genuine framework security concerns, since
fog gadgets are normally used in places that are outside the ambit of safeguarding and observation.
Subsequently, they wind up exposed to malicious assaults like information seizing and listening in
that may jeopardise the working and systems of fog gadgets. Cloud computing is fortunately lucky
to have myriad solutions, which might not be effective in case of fog computing, as the gadgets and
devices that rely on fog computing operate at network’s brink. This paper surveys some of the
following security issues and challenges facing fog computing.
5.1 Trust
Trust assumes a noteworthy part in encouraging relations in light of past associations among fog
nodes and edge gadgets. A fog node is regarded as the most crucial part as it is responsible for
guaranteeing security and namelessness for end clients [28]. Additionally, this part should be trusted
for carrying out its task, as they should be guaranteed that the fog node actualises the worldwide
covering process on their discharged information and unleashes only non-threatening actions. This
requires a certain degree of trust among all nodes that operate within the network of fog.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
A malignant node offers crucial information of other users to a noxious broker that evaluates this
information and
The malignant broker offers information of other nodes to its colluders, so as to befool other users
into thinking that the colluders are the appropriate entity.
Thus, it can be inferred that the brokers might be noxious and the fog faces conniving assaults.
To diminish the security dangers and vulnerabilities, the examination [101] suggests content related
PSS with varying protection in a fog setting that would guarantee the reliable working and delivery
of publish and subscribe.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
it by means of node 2 in region A. And if node 1 desires to secure the trust value of node 5, it is
required to get it through node 4 in area B. At the same time, they can also figure out their area trust
estimations and transmit them to the cloud.
5.2 Assault
Devices and gadgets with fog nodes are carried to all sorts of places including those where protection
is weak or absent. Hence they may face malevolent assaults [110]. Also, a noxious client can either
record wrong or false readings, spoof IP locations and addresses or alter its own smart meter [111].
In their research, C. Li, Z. Qin et al. [113] have discussed the safety concern of an OpenFlow
channel between the controller and its operators in IoT fog. Since all the controller charges are sent
through this channel, once assaulted, the system is totally manipulated by an aggressor. For both the
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
providers of network services and their clients it is a calamity. In this context, I. Stojmenovic et al.
[114] advanced the antidote of utilising the Bloom filter to recognise MitM assault. In their study,
Stojmenovic et al. have probed MitM assault and its covert features through the investigation of fog
gadget’s memory consumption and CPU [110]. One can likewise take care of the issue by making use
of encryption and decryption [115].
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
In their research, Mandlekar et al. draw attention to the fact that unapproved entry should be
identified and genuine information ought to be preserved without getting hacked [40]. Subsequently,
to match a user’s behaviour with that of regular users for verification, they take recourse to the
technology of behaviour profiling and decoy information.
Privacy safeguarding is absolutely essential in the light of users' numerous worries about their
delicate information [27]. Diverse protection safeguarding approaches, plans and techniques are put
forth, particularly in healthcare area [28-30,123]. In the light of various advances, outlined below are
certain related works.
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
On the other hand, R. Lu, K. Heung et al. [128] point out that most privacy saving information
conglomeration plans bolster information aggregation for diversified IoT gadgets only and are not
able to combine total hybrid IoT gadgets' information into a single unit. Consequently, a lightweight
privacy saving information total plan for the fog-upgraded IoT is advanced.
In their study, Elmisery et al. examine and uncover the revelation limit amongst publicity and privacy
as also between oneself and others [28]. On the other hand, Hu et al. advance a privacy protecting
plan for distinguishing face by utilising the fog [129]. Fog-entrenched vehicular provisional network
is another protocol that is beneficial for the fog and vehicular cloud, for which a safe and privacy-
safeguarding navigation plan is propounded [130].
5.6. Others
Service accessibility: It incorporates how to lessen denial of service (DOS). At the point when there
are a large number of client demands for the same service, DOS happens if hackers exploit the
situation for assaulting [131]. It is suggested that a novel plan for shielding DOS assaults [132] ought
to be sought. Newer techniques should be thought of to prevent needless utilisation and wastage of
resources and provide adequate reserving capacities to enhance the accessibility of services.
Secure applications: Meanwhile, Khan et al. abridge the potential security concerns found in the
below listed fog applications: web advancement, virtualised radio access, smart meters, 5G portable
systems, vehicular systems and street safety, medicinal services frameworks, sustenance traceability,
observation video handling, discourse information, management of asset and resources, enlarged
brain-PC interface, catastrophe response, energy decrease and unfriendly environments [21].
Because not all fog nodes are replete with resources, heavy applications that need resource-
constricted nodes are not exactly simple as contrasted with traditional information centrals. Such hot
applications chiefly centre around vehicles [124,105,133-134] and healthcare [135,27]. Encoding
critical information can enhance the safety of the applications while conjuring APIs. At the same time,
if an excessive number of APIs are conjured and conveyed, they may devour an excessive number of
assets, thus adversely impacting typical access to them and even causing the application system to
become immobile.
Secure sharing innovation: This happens when the data is shared among numerous websites [28],
such as harmonious coordination between fog nodes and services. For sharing of services in the fog
social networks can be innovatively utilised. In the social fog, to endorse security services correctly
together with a mechanism that facilitates crowd sensing, an innovative model of provision of
security service has been advanced [136].
6. Conclusion
Fog computing is a vibrant computing protocol that assumed prominence and witnessed fast growth
with the advent of mobile internet, CPS and Internet of Things (IoT). An exceptionally virtualised
fabric, fog computing is not deemed as a substitution for cloud computing. Fog computing is the
platform that spreads from the outer brinks of where information is produced to the point where it
will ultimately be saved and stored. The information might end up getting stored in a user's
information centre or in the cloud itself.
Fog computing is a multi-tier distributed network platform for edge gadgets and devices. This
makes it possible for an increasing number of services, uses and applications to be shifted from the
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
cloud. For devices that are at the edge and for conventional depositories of cloud computing
information, fog computing makes available several services, such as networking, saving and storage
and data processing [137]. In its working fog computing confers myriad benefits: it enormously
lessens the time of information exchange and the volume of system transmission. It also more than
adequately fulfils the requirements of actual-time or latency-demanding applications and renders
barriers related to bandwidth of networks easy to surmount [138].
For all its positive features, though, fog computing becomes susceptible and defenceless against
security dangers and attacks, precisely because of the nature of its dispersed and open architecture.
This comprehensive and wide-ranging survey takes a detailed look at fog computing, encompassing
its several prominent features, from its architecture, characteristics, relevant technologies involved to
various applications it supports to the security, trust and other issues linked with it. As has been
noted earlier, unlike the cloud which is a centralised entity, fog computing, because of its vulnerable
features of wide distribution and remote operability, can become exposed to newer security threats
and challenges.
In view of the above, it is pertinent to take note of certain recommendations. Firstly, we require
new techniques. Fog is a widely dispersed platform. Therefore, executing safety and security
protocols to achieve integrity of data might adversely impact to a large extent its quality of service
(QoS). Consequently, we have to discover new techniques to enhance the security and trust issues of
the Fog.
Secondly, we require newer interfaces. Since fog nodes are required to collaborate with various
hardware entities supplied by various sellers, new interfaces are a must to guarantee computing
processes that can be relied upon.
Thirdly, we need new conventions or protocols. There are already some protocols designed and
put in place, like the ones in [139-141]. But new protocols that would on their own discover instances
of trust and safety endangerments are sorely missing in the current structure of the fog. Hence, it is
imperative to come up with a new set of counter-steps to guard against trust and safety related
breaches [142].
References
1. L. Atzori, A. Iera, G. Morabito. The internet of things: A survey. Computer Networks. 2010, 54 (15), 2787–
2805, doi:10.1.1.719.9916.
2. H. Ning, H. Liu, J. Ma, L. T. Yang, R. Huang. Cybermatics: Cyber physical social thinking hyperspace-
based science and technology. Future Generation Computer Systems. 2016, 56, 504–522,
doi: http://dx.doi.org/10.1016/j.future.2015.07.012.
3. D. Evans. The internet of things: How the next evolution of the internet is changing everything. CISCO
White Paper 1, 2011, 1–11.
4. Cisco global cloud index: Forecast and methodology. 2016-2018 white paper.
5. R. Cortes, X. Bonnaire, O. Marin, P. Sens. Stream processing of healthcare sensor data: Studying user
traces to identify challenges from a big data perspective. Procedia Computer Science. 2015, 52 (1), 1004–
1009, doi: 10.1016/j.procs.2015.05.093.
6. Z. He, Z. Cai, J. Yu, X. Wang, Y. Sun, Y. Li. Cost-efficient strategies for restraining rumor spreading in
mobile social networks. IEEE Transactions on Vehicular Technology. 2017, 66 (3), 2789–2800, doi:
10.1109.TVT.2016.2585591.
7. M. H. Ghahramani, M. C. Zhou, and C. T. Hon. Toward Cloud Computing QoS Architecture: Analysis of
Cloud Systems and Cloud Services. IEEE/CAA Journal of Automatica Sinica. 2017, Vol. 4, No. 1, pp. 5-17,
doi: 10.1109./JAS.2017.7510313.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
8. Y. Xia, M. Zhou, X. Luo, and Q. Zhu. Stochastic Modeling and Quality Evaluation of Infrastructure-as-a-
Service Clouds. IEEE Trans. on Automation Science and Engineering. 2015, 12(1), pp. 160-172, doi:
10.1109./TASE.2013.2276477.
9. H. Yuan, J. Bi, W. Tan, M. C. Zhou, B. H. Li, and J. Li. “TTSA: An Effective Scheduling Approach for Delay
Bounded Tasks in Hybrid Clouds.” IEEE Transactions on Cybernetics. 2017, vol.47, no. 11, , pp. 3658– 3668,
doi:10.1109/TCYB.2016.2574766.
10. P. Y. Zhang and M. C. Zhou. Dynamic Cloud Task Scheduling Based on a Two-stage Strategy. IEEE
Transactions on Automation Science and Engineering. 2018, 15(2), 772-783, DOI: 10.1109/TASE.2017.2693688.
11. W. B. Zheng, M. C. Zhou, Y. N. Xia, L. Wu, Xin Luo, S. C. Pang, and Q. S. Zhu. Percentile performance
estimation of unreliable IaaS clouds and their cost-optimal capacity decision. IEEE ACCESS. 2017, Vol. 5,
pp. 2808 – 2818, doi:10.1109/ACCESS.2017.2666793.
12. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I.
Stoica. A view of cloud computing. Comm of the Acm. 2010, 53 (4), 50–58, doi:10.1145/1721654.1721672.
13. N. Fernando, S. W. Loke, W. Rahayu. Mobile cloud computing: A survey. Future Generation Computer
Systems. 2013, 29 (1), 84106.1070, doi: https://doi.org/10.1016/j.future.2012.05.023.
14. T. Qiu, R. Qiao, D. Wu. Eabs: An event-aware backpressure scheduling scheme for emergency internet of
things. IEEE Transactions on Mobile Computing. 2017, 17(1), 72-84, doi:10.1109/TMC.2017.2702670.
15. Y. Cao, S. Chen, P. Hou, D. Brown, Fast: A fog computing assisted distributed analytics system to monitor
fall for stroke mitigation, in: IEEE International Conference on Networking, Architecture and Storage,
2015, pp. 2–11, doi: 10.1109/NAS.2015.7255196.
16. V. Stantchev, A. Barnawi, S. Ghulam, J. Schubert, G. Tamm. Smart items, fog and cloud computing as
enablers of servitization in healthcare. Sensors & Transducers. 2015, 185 (2), 121–128.
17. T. Qiu, K. Zheng, H. Song, M. Han, B. Kantarci. A local-optimization emergency scheduling scheme with
self-recovery for smart grid. IEEE Transactions on Industrial Informatics. 2017, 13(6), 3195-3205,
doi:10.1109/TII.2017.2715844.
18. H. R. Arkian, A. Diyanat, A. Pourkhalili. Mist: Fog-based data analytics scheme with cost-efficient
resource provisioning for iot crowdsensing applications. Journal of Network & Computer Applications. 2017,
82, 152–165, doi:10.1016/j.jnca.2017.01.012.
19. G. Luo and Y. Pan, ZTE Communications Special Issue on Cloud computing, Fog computing, and Dew
computing. ZTE Communications. 2017, 15(1) 2.
20. T. H. Luan, L. Gao, Z. Li, L. Sun. Fog computing: Focusing on mobile users at the edge, arXiv preprint
arXiv:1502.01815. 2015.
21. F. Bonomi. i Connected vehicles, the Internet of Things, and Fog computing, in Proc. VANET, Las Vegas,
CA, USA, 2011, 13-15.
22. S. Yi, Z. Hao, Z. Qin, Q. Li. Fog computing: Platform and applications, in: 2015 Third IEEE Workshop on
Hot Topics in Web Systems and Technologies, 2015, pp. 73–78.
23. S. Ivan and W. Sheng. The Fog Computing Paradigm Scenarios and Security Issues, in Proc. of the 2014
Federated Conference on Computer Science and Information Systems. 2014, 1-8.
24. S. Khan, S. Parkinson, and Y. Qin. Fog computing security: a review of current applications and security
solutions. Journal of Cloud Computing: Advances, Systems and Applications. 2017, 6(19), DOI 10.1186/s13677-
017-0090-3.
25. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the Internet of Things, in
Proc. of MCC'12. 2012,13-15.
26. S. K. Datta, C. Bonnet, J. Haerri. Fog computing architecture to enable consumer centric internet of things
services, in: International Symposium on Consumer Electronics, 2015, pp. 1–2
27. H. A. Al Hamid, S. M. M. Rahman, M. S. Hossain, A. Almogren, and A. Alamri. A Security Model for
Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog computing Facility with
Pairing-Based Cryptography. IEEE Access. 2017, 5, 22313-22328 DOI:10.1109/ACCESS. 2017.2757844.
28. A. M. Elmisery, S. Rho, and D. Botvich. A Fog Based Middleware for Automated Compliance with OECD
Privacy Principles in Internet of Healthcare Things. IEEE Access. 2016, 4, 8418-8841,
doi:10.1109/ACCESS.20162631546.
29. S. R. Moosavia, T. N. Gia, E. Nigussie, A. M. Rahmania, S. Virtanen, H. Tenhunena, and J. Isoaho. End-
to-end security scheme for mobility enabled healthcare Internet of Things. Future Generation Computer
Systems. 2016, 64, 108-124, doi:https://doi.org/10.1016/j.future.2016.02.020.
30. X. Liu, R. H. Deng, Y Yang, H. N. Tran, and S. Zhong. Hybrid Privacy-preserving Clinical Decision
Support System in Fog-cloud Computing. Future Generation Computer Systems. 2018, 78, 825-837, 2018,
doi:https://doi.org/10.1016/j.future.2017.03.018.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
31. B. Tang, Z. Chen, G. Hefferman, S. Pei, T. Wei, H. He, and Q. Yang. Incorporating Intelligence in Fog
computing for Big Data Analysis in Smart Cities. IEEE Trans. on Industrial Informatics. 2017, 13(5), 2140-
2150, doi:10.1109/TII.2017.2679740 .
32. B. Molina, C. E. Palau, G. Fortino, A. Guerrieri, and C. Savaglio. Empowering smart cities through
interoperable Sensor Network Enablers, in Proc. of 2014 IEEE International Conference on Systems, Man
and Cybernetics (SMC), IEEE. 2014 ,7-12.
33. F. Cicirelli, A. Guerrieri, G. Spezzano, and A. Vinci. An edge-based platform for dynamic Smart City
applications, Future Generation Computer Systems. 2017, Volume 76, pp. 106-118, ISSN 0167-739X,
http://dx.doi.org/10.1016/j.future.2017.05.034, 2017.
34. Z. Li, X. Zhou, Y. Liu, H. Xu, and L. Miao. A Non-Cooperative Differential Game-Based Security Model
in Fog computing. China Communications. 2017, 14(1), 180-189, doi:10.1109/CC.2017.7839768.
35. V. Sharma,J. D. Lim, J. N. Kim, and I. You. SACA: Self-Aware Communication Architecture for IoT Using
Mobile Fog Servers. Mobile Information Systems. 2017, 1-17, https://doi.org/10.1155/2017/3273917.
36. H. Zhang, Y. Xiao, S. Bu, D. Niyato, R. Yu, Z. Han. Fog computing in multi-tier data center networks: A
hierarchical game approach, in: 2016 IEEE International Conference on Communications (ICC), 2016, pp.
1–6.
37. M. Aazam, E. N. Huh. Fog computing: The cloud-iot/ioe middleware paradigm. IEEE Potentials. 2016, 35
(3), 40–44, doi:10.1109/MPOT.2015.2456213.
38. G. Fortino, A. Guerrieri, W. Russo, and C. Savaglio. Integration of agent-based and cloud computing for
the smart objects-oriented IoT, in Proc. of the 2014 IEEE 18th International Conference on Computer
Supported Cooperative Work in Design, IEEE. 2014.
39. C. C. Byers. Architectural Imperatives for Fog computing: Use Cases, Requirements, and Architectural
Techniques for Fog-Enabled IoT Networks. IEEE Communications Magazine. 2017, 55(8), 14-20,
doi:10.1109/MCOM.2017.1600885.
40. M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M. A. Ferrag, N. Choudhury, and V. Kumar. Security and
Privacy in Fog computing: Challenges. IEEE Access. 2017, 5, 19293-19304,
DOI:10.1109/ACCESS.2017.2749422.
41. S. Sarkar, S. Misra. Theoretical modelling of fog computing: a green computing paradigm to support iot
applications. IET Networks. 2016, 5 (2), 23–29, doi:10.1049/iet-net.2015.0034.
42. J. Shi, J. Wan, H. Yan, H. Suo. A survey of cyber-physical systems, in: 2011 International Conference on
Wireless Communications and Signal Processing (WCSP), 2011, pp. 1–6.
43. P. Hu, H. Ning, T. Qiu, Y. Zhang, X. Luo. Fog computing based face identification and resolution scheme
in internet of things. IEEE Transactions on Industrial Informatics. 2017, 13 (4), 1910–1920.
44. P. Varshney, Y. Simmhan. Demystifying fog computing: Characterizing architectures, applications and
abstractions. arXiv preprint arXiv:1702.06331. 2017, 1–23.
45. T. H. Luan, L. Gao, Z. Li, Y. Xiang, G. Wei, L. Sun. Fog computing: Focusing on mobile users at the edge.
Computer Science. arXiv.1502.01815. 2015, 1–11.
46. M. S. Hossain, M. Atiquzzaman. Cost analysis of mobility protocols. Telecommunication Systems. 2013, 52
(4), 2271–2285, doi: https://doi.org/10.1007/s11235-011-9532-2.
47. M. A. Hassan, M. Xiao, Q. Wei, S. Chen. Help your mobile applications with fog computing, in: IEEE
International Conference on Sensing, Communication, and Networking - Workshops, 2015, pp. 1–6
48. F. Bonomi, R. Milito, P. Natarajan, J. Zhu. Fog Computing: A Platform for Internet of Things and
Analytics. Springer International Publishing. 2014.
49. K. Hong, D. Lillethun, U. Ramachandran, B. Ottenwlder, B. Koldehofe. Mobile fog: a programming model
for large-scale applications on the in ternet of things, in: ACM SIGCOMM Workshop on Mobile Cloud
Computing, 2013, pp. 15–20.
50. K. Kang, C. Wang, T. Luo. Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and
issues. Journal of China Universities of Posts & Telecommunications. 2016, 23 (2), 56–96, doi:
https://doi.org/10.1016/S1005-8885(16)60021-3.
51. Y. Zhang, D. Niyato, P. Wang, I. K. Dong. Optimal energy management policy of mobile energy gateway.
IEEE Transactions on Vehicular Technology. 2016, 65 (5), 3685–3699, doi:10.1109/TVT.2015.2445833.
52. F. Bonomi, R. Milito, P. Natarajan, J. Zhu. Fog Computing: A Platform for Internet of Things and
Analytics, Springer International Publishing, 2014, 169-186, doi:10.1007/978-3-319-05029-4_7.
53. C. Dsouza, G. J. Ahn, M. Taguinod. Policy-driven security management for fog computing: Preliminary
framework and a case study, in: IEEE International Conference on Information Reuse and Integration,
2015, pp. 16–23.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
54. J. Oueis, E. C. Strinati, S. Sardellitti, S. Barbarossa. Small cell clustering for efficient distributed fog
computing: A multi-user case, in: 2015 IEEE 82nd Vehicular Technology Conference (VTC Fall), 2015, pp.
1–5.
55. K. Intharawijitr, K. Iida, H. Koga. Analysis of fog model considering computing and communication
latency in 5g cellular networks, in: IEEE International Conference on Pervasive Computing and
Communication Workshops, 2016, pp. 1–4.
56. X. Zheng, Z. Cai, J. Li, H. Gao. A study on application-aware scheduling in wireless networks. IEEE
Transactions on Mobile Computing. 2017, 16 (7), 1787–1801 doi:10.1109/TMC.2016.2613529.
57. W. Gao, Opportunistic peer-to-peer mobile cloud computing at the tactical edge, in: IEEE Military
Communications Conference, 2014, pp. 1614–1620.
58. R. Mijumbi, J. Serrat, J. L. Gorricho, N. Bouten. Network function virtualization: State-of-the-art and
research challenges. IEEE Communications Surveys & Tutorials. 2015, 18 (1), 236–262,
doi:10.1109/COMST.2015.2477041.
59. B. Han, V. Gopalakrishnan, L. Ji, S. Lee. Network function virtualization: Challenges and opportunities
for innovations. IEEE Communications Magazine. 2015, 53 (2), 90–97, doi:10.1109/MCOM.2015.7045396.
60. A. Nunes, M. Mendonca, X. N. Nguyen, K. Obraczka. A survey of software-defined networking: Past,
present, and future of programmable networks. IEEE Communications Surveys & Tutorials. 16 (3) (2014)
1617–1634, doi:10.1109/SURV.2014.012214.00180.
61. D. Kreutz, F. M. V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky, S. Uhlig.
Software-defined networking: A comprehensive survey. Proceedings of the IEEE. 2014, 103 (1), 10–13,
doi:10.1109/JPROC.2014.2371999.
62. H. Kim, N. Feamster. Improving network management with software defined networking. IEEE
Communications Magazine. 2013, 51 (2), 114–119, doi:10.1109/MCOM.2013.6461195.
63. A. Natraj. fog computing focusing on users at the edge of internet of things. International Journal of
Engineering Research. 2016, 5 (5), 1004–1155.
64. N. B. Truong, G. M. Lee, Y. Ghamri-Doudane. Software defined networking-based vehicular adhoc
network with fog computing, in: IFIP/IEEE International Symposium on Integrated Network
Management, 2015, pp. 1202–1207.
65. M. Peng, Y. Li, Z. Zhao, C. Wang. System architecture and key technologies for 5g heterogeneous cloud
radio access networks. IEEE Network, 2014, 29 (2), 6–14, doi:10.1109/MNET.2015.7064897.
66. M. Chen, Y. Zhang, Y. Li, S. Mao. Emc: Emotion-aware mobile cloud computing in 5g. IEEE Network. 2015,
29 (2), 32–38, doi:10.1109/MNET.2015.7064900.
67. D. Amendola, N. Cordeschi, E. Baccarelli. Bandwidth management vms live migration in wireless fog
computing for 5g networks, in: IEEE International Conference on Cloud Networking, 2016, pp. 21–26.
68. M. Peng, S. Yan, K. Zhang, C. Wang. Fog-computing-based radio access networks: issues and challenges.
IEEE Network. 2015, 30 (4), 46–53 doi:10.1109/MNET.2016.7513863.
69. R. P. Davey, D. Grossman, M. Rasztovitswiech, D. B. Payne, D. Nesset, A. E. Kelly, A. Rafel, S. Appathurai,
S. H. Yang. Long-reach passive optical networks. Journal of Lightwave Technology. 2009, 27 (3), 273–291.
70. W. Zhang, B. Lin, Q. Yin, T. Zhao. Infrastructure deployment and optimization of fog network based on
microdc and lrpon integration. Peer-to-Peer Networking and Applications. 2017, 10 (3), 579–591,
doi:10.1007/s12083-016-0476-x.
71. C. Papagianni, A. Leivadeas, S. Papavassiliou. A cloud-oriented content delivery network paradigm:
Modeling and assessment. IEEE Transactions on Dependable & Secure Computing. 2013, 10 (5), 287–300,
doi:10.1109/TDSC.2013.12.
72. Coile, D. In, D. O’Mahony. Accounting and accountability in content distribution architectures: A survey.
ACM Computing Surveys. 2015, 47 (4), 59:1–59:35, doi:10.1145/2723701.
73. Z. U. A. Jaffri, Z. Ahmad, M. Tahir. Named data networking (ndn), new approach to future internet
architecture design: A survey. International Journal of Informatics and Communication Technology. 2013, 2(3),
155–165, doi: http://dx.doi.org/10.11591/ij-ict.v2i3.5122.
74. L. Zhang, A. Afanasyev, J. Burke, V. Jacobson, K. Clafy, P. Crowley, C. Papadopoulos, L. Wang, B. Zhang.
Named data networking. Acm Sigcomm Computer Communication Review. 2014, 44 (3), 66–73.
75. D. Raychaudhuri, K. Nagaraja, A. Venkataramani. MobilityFirst: a robust and trustworthy mobility-
centric architecture for the future internet. AcmSigmobile Mobile Computing & Communications Review. 2012,
16 (3), 2–13, doi:10.1145/2412096.2412098.
76. P. Hu, H. Ning, T. Qiu, Y. Xu, X. Luo, A. K. Sangaiah. A unified face identification and resolution scheme
using cloud computing in internet of things. Future Generation Computer Systems. 2018, 81, 582-592,
doi:10.1016/j.future.2017.03.030.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
77. H. Ning, Y. Fu, S. Hu, H. Liu. Tree-code modeling and addressing for non id physical objects in the
internet of things. Telecommunication Systems. 2015, 58 (3), 195–204, doi: https://doi.org/10.1007/s11235-
014-9867-6.
78. N. Koshizuka, K. Sakamura. Ubiquitous id: standards for ubiquitous computing and the internet of
things. IEEE Pervasive Computing. 2010, (4), 98–101, doi:10.1109/MPRV.2010.87.
79. D. L. Brock, The electronic product code (epc), Auto-ID Center White Paper MIT-AUTOID-WH-002. 2001,
1–21.
80. S. Hong, D. Kim, M. Ha, S. Bae, S. J. Park, W. Jung, J.-E. Kim. Snail: an ip-based wireless sensor network
approach to the internet of things. IEEE Wireless Communications. 2010, 17(6), 34–42,
doi:10.1109/MWC.2010.5675776.
81. B. Ning, G. Li, Y. Chen, D. Qu. Distributed architecture of object naming service, in: Proceedings of the
2009 3rd International Conference on Teaching and Computational Science (WTCS 2009), 2012, pp. 251–
257.
82. E. Bastug, M. Bennis, M. Debbah. Living on the edge: The role of proactive caching in 5g wireless
networks. IEEE Communications Magazine. 2014, 52 (8), 82–89, doi:10.1109/MCOM.2014.6871674.
83. P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, X. Yao. Security and privacy preservation scheme of face
identification and resolution framework using fog computing in internet of things. IEEE Internet of Things
Journal. 2017, 4(5), 1143-1155, doi:10.1109/JIOT.2017.2659783.
84. T. Qiu, A. Zhao, F. Xia, W. Si, D. O. Wu. Rose: Robustness strategy for scale-free wireless sensor networks.
IEEE/ACM Transactions on Networking. 2017, 25(5), 2944-2959, doi:10.1109/TNET.2017.2713530.
85. K. Lee, D. Kim, D. Ha, U. Rajput. On security and privacy issues of fog computing supported internet of
things environment, in: International Conference on the Network of the Future, 2015, pp. 1–3.
86. U. S. Premarathne, I. Khalil, M. Atiquzzaman. Secure and reliable surveillance over cognitive radio sensor
networks in smart grid. Pervasive & Mobile Computing. 2015, 22(C), 3–15, doi:10.1016/j.pmcj.2015.05.001.
87. N. Yaakob, I. Khalil, H. Kumarage, M. Atiquzzaman, Z. Tari. By-passing infected areas in wireless sensor
networks using bpr, IEEE Transactions on Computers. 2015, 64 (6), 1594–1606, doi:10.1109/TC.2014.2345400.
88. V. Sharma, F. Song, I. You, M. Atiquzzaman. Energy efficient device discovery for reliable communication
in 5g-based iot and bsns using unmanned aerial vehicles. Journal of Network and Computer Applications.
2017, 97, 79-95, doi:https://doi.org/10.1016/j.jnca.2017.08.013.
89. W. Liu, T. Nishio, R. Shinkuma, T. Takahashi. Adaptive resource discovery in mobile cloud computing.
Computer Communications, 2014, 50 (13), 119–129, doi:10.1016/j.comcon.2014.02.006.
90. A. V. Dastjerdi, R. Buyya. Fog computing: Helping the internet of things realize its potential, Computer.
2016, 49 (8), 112–116, doi:10.1109/MC.2016.245.
91. J. Li, J. Jin, D. Yuan, M. Palaniswami, K. Moessner. Ehopes: Data centered fog platform for smart living,
in: Telecommunication Networks and Applications Conference, 2015, pp. 308–313.
92. M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero. Key ingredients in an iot recipe: Fog computing,
cloud computing, and more fog computing, in: IEEE International Workshop on Computer Aided
Modeling and Design of Communication Links and Networks, 2014, pp. 325–329.
93. Y. Shi, G. Ding, H. Wang, H. E. Roman. The fog computing service for healthcare, in: International
Symposium on Future Information and Communication Technologies for Ubiquitous Healthcare, 2015,
pp. 70–74.
94. M. Ahmad, M. B. Amin, S. Hussain, B. H. Kang, T. Cheong, S. Lee. Health fog: a novel framework for
health and wellness applications. Journal of Supercomputing. 2016, 72 (10), 3677-3695, doi:
doi:10.1007/s11227-016-1634-x.
95. X. Hou, Y. Li, M. Chen, D. Wu, D. Jin, S. Chen. Vehicular fog computing: A viewpoint of vehicles as the
infrastructures. IEEE Transactions on Vehicular Technology. 2016, 65 (6), pp.3860–3873,
doi:10.1109/TVT.2016.2532863.
96. J. K. Zao, T. T. Gan, C. K. You, E. C. Cheng, Y. T. Wang, T. Mullen, T. P. Jung. Augmented brain computer
interaction based on fog computing and linked data, in: International Conference on Intelligent
Environments, 2014, pp. 374–377.
97. T. Zhu, S. Dhelim, Z. Zhou, S. Yang, H. Ning. An architecture for aggregating information from
distributed data nodes for industrial internet of things. Computers & Electrical Engineering. 2017, 58, 337–
349, doi: https://dx.doi.org/10.10.1016/j.compeleceng,2016.08.018.
98. R. Brzoza-Woch, M. Konieczny, B. Kwolek, P. Nawrocki, T. Szyd lo, K. Zielin´ski. Holistic approach to
urgent computing for flood decision support. Procedia Computer Science. 2015, 51, 2387–2396.
99. M. Aazam, E.-N. Huh. E-hamc: Leveraging fog computing for emergencyalert service, in: 2015 IEEE
International Conference on Pervasive Computing and Communication Workshops (PerCom
Workshops), 2015, pp.518–523.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
100. J. Zhu, D. S. Chan, M. S. Prabhu, P. Natarajan, H. Hu, F. Bonomi. Improving web sites performance using
edge servers in fog computing architecture, in: 2013 IEEE Seventh International Symposium on Service
Oriented System Engineering, 2013, pp. 320–323
101. Q. Wang, D. Chen, N. Zhang, Z. Ding, and Z. Qin. PCP: A Privacy-Preserving Content-Based Publish-
Subscribe Scheme With Differential Privacy in Fog computing. IEEE Access. 5(2017)17962-17986,
doi:10.1109/ACCESS.2017.2748956.
102. C. Esposito and M. Ciampi. On security in publish/subscribe services: A survey. IEEE Commun. Surveys
Tuts. 2014, 17 (2), pp. 966-997, doi:10.1109/COMST.2014.2364616.
103. E. Onica, P. Felber, H. Mercier, and E. Riviére. Confidentiality-preserving publish/subscribe: A survey.
ACM Comput. Surv. 2016, 49(2), 1-41, doi:10.1145/2940296.
104. H. D. Kim. Applying consistency-based trust definition to collaborative filtering. KSII Trans. Internet Inf.
Syst. 2009, 3(4), 366-374.
105. S. A. Soleymani, A. H. Abdullah, M. Zareei, M. H. Anisi, C. Vargas-Rosales, M. K. Khan, and S. Goudarzi.
A Secure Trust Model based on Fuzzy Logic in Vehicular Ad Hoc Networks with Fog computing. IEEE
Access. 2017, 99, 1-10, doi:10.1109/ACCESS.2017.2733225.
106. D. Koo, Y. Shin, J. Yun, and J. Hur. A Hybrid Deduplication for Secure and Efficient Data Outsourcing in
Fog computing, in Proc. of 2016 IEEE 8th International Conference on Cloud Computing Technology and
Science. 2016, 285-293.
107. T. Wang, J. Zeng, M. D. Z. A. Bhuiyan, H. Tian, Y. Cai, Y. Chen, and B. Zhong. Trajectory Privacy
Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access. 2017, 5, 7692-7701,
doi:10.1109/ACCESS.2017.2698078.
108. T. Wang, Y. Li, Y. Chen, H. Tian, Y. Cai, W. Jia, and B. Wang. Fog-Based Evaluation Approach for
Trustworthy Communication in Sensor-Cloud System. IEEE Communications Letters. 2017, 14(8), 1-4,
doi:10.1109/LCOMM.2017.2740279.
109. T. D. Dang, D. Hoang. A Data Protection Model for Fog Computing. 2017 Second International
Conference on Fog and Mobile Edge computing (FMEC). 2017, pp.32-38.
110. P. Hua, S. Dhelima, H. Ning, and T. Qiu. Survey on fog computing: architecture, key technologies,
applications and open issues. Journal of Network and Computer Applications. 2017, 98, 27-42.
111. I. Stojmenovic and S. Wen. The Fog computing paradigm: Scenarios and security issues, in Proc. 2014
Federated Conference on Computer Science and Information Systems (FedCSIS). 2014.
112. A. S. Sohal, R. Sandhu, S. K. Sood, and V. Chang. A cybersecurity framework to identify malicious edge
device in fog computing and cloud-of-things environments, Computers & Security. 2017, 1-15, doi:
http://dx.doi.org/10.1016/j.cose.2017.08.016.
113. C. Li, Z. Qin, E. Novak, and Q. Li. Securing SDN Infrastructure of IoT-Fog Network from MitM Attacks.
IEEE Internet of Things Journal. 2017, 1-8, doi:10.1109/JIOT.2017.2685596.
114. I. Stojmenovic, S. Wen, X. Huang, and H. Luan. An overview of Fog computing and its security issues,
Concurrency and Computation: Practice and Experience. 2015, 28(10), 2991-3005, doi:10.1002/cpe.3485.
115. H. W. Kim, J. H. Kim, J. H. Park, and Y. S. Jeong. Time pattern locking scheme for secure multimedia
contents in human-centric device. The Scientific World Journal. 2014, 1-9, DOI:10.1155/2014/796515.
116. K. Fan, J. Wang, X. Wang, H. Li, and Y. Yang. A Secure and Verifiable Outsourced Access Control Scheme
in Fog-Cloud Computing. Sensors. 2017, 17(7), 1965, DOI:10.3390/s17071695.
117. Q. Huang, Y. Yang, and L. Wang. Secure Data Access Control With Ciphertext Update and Computation
Outsourcing in Fog computing for Internet of Things. IEEE Access. 2017, 12941-12950,
doi:10.1109/ACCESS.2017.2727054.
118. Y. Jiang, W. Susilo, Y. Mu, and F. Guo. Ciphertext-policy attribute-based encryption against key-
delegation abuse in fog computing. Future Generation Computer Systems. 2018, 78(P2), 720-729,
doi:10.1016/j.future.2017.01.026.
119. A. Alrawais, C. Hu, and X. Cheng. An Attribute-Based Encryption Scheme to Secure Fog
Communications. IEEE Access. 2017, 5, doi:10.1109/ACCESS.2017.2705076.
120. V. G. Mandlekar, V. K. Mahale, S. S. Sancheti, and M. S. Rais. Survey on Fog computing Mitigating Data
Theft Attacks in Cloud. International Journal of Innovative Research in Computer Science & Technology. 2014,
2(6), 13-16.
121. B. Mukherjee, R. L. Neupane, and P. Calyam. End-to-End IoT Security Middleware for Cloud-Fog
Communication. 2017 IEEE 4th International Conference on Cyber Security and Cloud computing. 2017,
151-156.
122. H. Wang, Z. Wang, and J. Domingo-Ferrer. Anonymous and secure aggregation scheme in fog-based
public cloud computing. Future Generation Computer Systems. 2018, 78, 712-719,
doi:10.1016/j.future.2017.02.032.
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 13 March 2019 doi:10.20944/preprints201903.0145.v1
Peer-reviewed version available at International Journal of Fog Computing (IJFC) 2020; doi:10.4018/IJFC.2020010105
123. X. Yang, F. Yin, and X. Tang. A Fine-Grained and Privacy-Preserving Query Scheme for Fog computing-
Enhanced Location-Based Service. Sensors. 2017, 17(7), 1-14, DOI:10.3390/s17071611.
124. J. Kang, R. Yu, X. Huang, and Y. Zhang. Privacy-Preserved Pseudonym Scheme for Fog Computing
Supported Internet of Vehicles. IEEE Trans. on Intelligent Transportation Systems. 2018, 19(8), 2627-2637,
doi:10.1109/tits.2017.2764095.
125. M. Dong, K. Ota, and A. Liu. Preserving Source-Location Privacy through Redundant Fog Loop for
Wireless Sensor Networks, 2015 IEEE International Conference on Computer and Information
Technology; Ubiquitous computing and Communications; Dependable, Autonomic and Secure
computing; Pervasive Intelligence and computing. 2015, pp.1835-1842.
126. R. Yang, Q. Xu, M.H. Au, Z. Yu, H. Wang, and L. Zhou. Position based cryptography with location
privacy: A step for Fog computing. Future Generation Computer Systems. 2018, 78, 799-806.
127. M. Du, K. Wang, X. Liu, S. Guo, and Y. Zhang. A Differential Privacy-based Query Model for Sustainable
Fog Data Centers. IEEE Transactions on Sustainable computing. 2017, 1-1, doi:10.1109/tsusc.2017.2715038.
128. R. Lu, K. Heung, A. Lashkari, and A. Ghorbani. A Lightweight Privacy-Preserving Data Aggregation
Scheme for Fog computing-Enhanced IoT. IEEE Access. 2017, 5, 3302-3312,
doi:10.1109/ACCESS.2017.2677520.
129. P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao. Security and Privacy Preservation Scheme of Face
Identification and Resolution Framework Using Fog computing in Internet of Things. IEEE Internet of
Things Journal. 2016, 4(5), 1143-1155, DOI 10.1109/JIOT.2017.2659783.
130. L. Wang, G. Liu, and L. Sun. A Secure and Privacy-Preserving Navigation Scheme Using Spatial
Crowdsourcing in Fog-Based VANETs. Sensors. 2017, 17(4), DOI:10.3390/s17040668.
131. R. Rios, R. Roman, J. A. Onieva, and J. Lopez, From Smog to Fog: A Security Perspective, 2017 Second
International Conference on Fog and Mobile Edge computing (FMEC). 2017, 56-61.
132. J. Liu, J. Li, L. Zhang, F. Dai, Y. Zhang, X. Meng, and J. Shen. Secure intelligent traffic light control using
fog computing. Future Generation Computer Systems. 2018, 78(P2), 817-824, doi:10.1016/j.future.2017.02.017.
133. S. Basudan, X. Lin, and K. Sankaranarayanan. A Privacy-Preserving Vehicular Crowdsensing-Based Road
Surface Condition Monitoring System Using Fog computing. IEEE Internet of Things Journal. 2017, 4(3),
772-782, doi:10.1109/JIOT.2017.2666783.
134. J. Ni, A. Zhang, X. Lin, and X. Shen. Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing.
IEEE Access. 2017, 5, 19293-19304, DOI:10.1109/ACCESS.2017.2749422.
135. J. Wu, M. Dong, K. Ota, J. Li, and Z. Guan. FCSS: Fog-computing-based Content-Aware Filtering for
Security Services in Information-Centric Social Networks. IEEE Transactions on Emerging Topics in
computing. 2017, 1-1, DOI:10.1109/TETC. 2017.2747158.
136. Cloud Security Alliance, Top Threat to Cloud computing V1.0, 2010.
137. J. Wu, Z. Su, S. Wang, and J. Li. Crowd Sensing-Enabling Security Service Recommendation for Social
Fog Computing Systems. Sensors. 2017, 17(8), 1744, DOI:10.3390/s17081744.
138. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu. Fog computing: A Platform for Internet of Things and
Analytics, In: Bessis N., Dobre C. (eds), Big Data and Internet of Things: A Roadmap for Smart
Environments. Studies in Computational Intelligence, Springer, Cham, New York. 2014, 546, 169-186.
139. X. Guan, B. Yang, C. Chen, W. Dai, and Y. Wang. A Comprehensive Overview of Cyber-Physical Systems:
From Perspective of Feedback System. IEEE/CAA Journal of Automatica Sinica. 2016, 3(1), 1-14,
doi:10.1109.JAS.2016.7373757.
140. W. Fang, W. Zhang, J. Xiao, Y. Yang, and W. Chen. A Source Anonymity-Based Lightweight Secure
AODV Protocol for Fog-Based MANET. Sensors. 2017, 17, DOI:10.3390/s17061421.
141. Y. Zhang, Y. Xiang, W Wu, and A. Alelaiwi. A variant of password authenticated key exchange protocol.
Future Generation Computer Systems. 2018, 78, 699-711, doi:10.1016/j.future.2017.02.016.
142. M. Frustaci, P. Pace, G. Aloi, and G. Fortino. Evaluating critical security issues of the IoT world: Present
and Future challenges. IEEE Internet of Things Journal. 2018, 5(4), 2483-25-95,
DOI:10.1109/JIOT.2017.2767291.