To see the other types of publications on this topic, follow the link: Fog Computing.

Journal articles on the topic 'Fog Computing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Fog Computing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bhatt, Chintan, and C. K. Bhensdadia. "Fog Computing." International Journal of Grid and High Performance Computing 9, no. 4 (2017): 105–13. http://dx.doi.org/10.4018/ijghpc.2017100107.

Full text
Abstract:
The Internet of Things could be a recent computing paradigm, defined by networks of extremely connected things – sensors, actuators and good objects – communication across networks of homes, buildings, vehicles, and even individuals whereas cloud computing could be ready to keep up with current processing and machine demands. Fog computing provides architectural resolution to deal with some of these issues by providing a layer of intermediate nodes what's referred to as an edge network [26]. These edge nodes provide interoperability, real-time interaction, and if necessary, computational to th
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Songqing, Tao Zhang, and Weisong Shi. "Fog Computing." IEEE Internet Computing 21, no. 2 (2017): 4–6. http://dx.doi.org/10.1109/mic.2017.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pagel, Peter, and Stefan Schulte. "Fog Computing." Informatik Spektrum 42, no. 4 (2019): 233–35. http://dx.doi.org/10.1007/s00287-019-01211-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Matt, Christian. "Fog Computing." Business & Information Systems Engineering 60, no. 4 (2018): 351–55. http://dx.doi.org/10.1007/s12599-018-0540-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mangla, Cherry, Shalli Rani, and Henry Kwame Atiglah. "Secure Data Transmission Using Quantum Cryptography in Fog Computing." Wireless Communications and Mobile Computing 2022 (January 22, 2022): 1–8. http://dx.doi.org/10.1155/2022/3426811.

Full text
Abstract:
Fog computing’s idea is to bring virtual existence into objects used on a daily basis. The “objects” layer of fog architecture is also known as the smart object layer (SOL). SOL has provided the fog network with a strong platform to outperform. Although the fog architecture decentralizes data, uses more data centers, and collects and transmits it to adjacent servers for faster processing in fog networks, it faces several security challenges. The security problems of fog computing need to be alleviated for the exploitation of all benefits of fog computing in classical networks. This article has
APA, Harvard, Vancouver, ISO, and other styles
6

Sookhak, Mehdi, F. Richard Yu, Ying He, et al. "Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing." IEEE Vehicular Technology Magazine 12, no. 3 (2017): 55–64. http://dx.doi.org/10.1109/mvt.2017.2667499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yacelga, Andres Leon, Nelson B. Arevalo, and Luis Albarracin Zambrano. "Fog Computing in the Industrial Internet of Things: Challenges, Trends, and Strategies." Fusion: Practice and Applications 13, no. 2 (2023): 91–105. http://dx.doi.org/10.54216/fpa.130208.

Full text
Abstract:
The Industrial Internet of Things (IIoT) has ushered in a new era of connectivity and intelligence in industrial settings. At the heart of this transformative landscape lies Fog Computing, a distributed computing paradigm that brings processing power and intelligence closer to the edge of industrial networks. This paper provides a comprehensive survey of Fog Computing's pivotal role in IIoT, elucidating its significance, challenges, emerging trends, and strategies for successful implementation. We delve into the challenges that industrial environments present for Fog Computing, encompassing is
APA, Harvard, Vancouver, ISO, and other styles
8

Ahuja, Sanjay P., and Niharika Deval. "From Cloud Computing to Fog Computing." International Journal of Fog Computing 1, no. 1 (2018): 1–14. http://dx.doi.org/10.4018/ijfc.2018010101.

Full text
Abstract:
This article describes how in recent years, Cloud Computing has emerged as a fundamental computing paradigm that has significantly changed the approach of enterprises as well as end users towards implementation of Internet technology. The key characteristics such as on-demand resource provision, scalability, rapid elasticity, higher flexibility, and significant cost savings have influenced enterprises of all sizes in the wide and successful adoption of Cloud Computing. Despite numerous advantages, Cloud Computing has its fair share of downsides as well. One of those major concerns is latency i
APA, Harvard, Vancouver, ISO, and other styles
9

R, Dhivya Sree. "Fog Computing in IoT." International Journal of Research Publication and Reviews 4, no. 4 (2023): 3214–15. http://dx.doi.org/10.55248/gengpi.4.423.36600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Menon, Varun G., and Joe Prathap. "Vehicular Fog Computing." International Journal of Vehicular Telematics and Infotainment Systems 1, no. 2 (2017): 15–23. http://dx.doi.org/10.4018/ijvtis.2017070102.

Full text
Abstract:
In recent years Vehicular Ad Hoc Networks (VANETs) have received increased attention due to its numerous applications in cooperative collision warning and traffic alert broadcasting. VANETs have been depending on cloud computing for networking, computing and data storage services. Emergence of advanced vehicular applications has led to the increased demand for powerful communication and computation facilities with low latency. With cloud computing unable to satisfy these demands, the focus has shifted to bring computation and communication facilities nearer to the vehicles, leading to the emer
APA, Harvard, Vancouver, ISO, and other styles
11

M, Kannan, and Aboorva S. "ENHANCEMENT OF FOG CACHING USING NATURE INSPIRATION OPTIMIZATION TECHNIQUE BASED ON CLOUD COMPUTING." International Journal of Advanced Research 13, no. 05 (2025): 388–94. https://doi.org/10.21474/ijar01/20914.

Full text
Abstract:
An new concept called fog computing brings cloud computing closer to the network edge, allowing for data processing, storage, and application execution near end users. Nonetheless, effective fog node management—especially with regard to caching—remains a significant obstacle. Caching techniques are essential for boosting fog computing's overall performance since they lower latency, use less bandwidth, and make apps more responsive.
APA, Harvard, Vancouver, ISO, and other styles
12

Rashid Abdulqadir, Hindreen, Subhi R. M. Zeebaree, Hanan M. Shukur, et al. "A Study of Moving from Cloud Computing to Fog Computing." Qubahan Academic Journal 1, no. 2 (2021): 60–70. http://dx.doi.org/10.48161/qaj.v1n2a49.

Full text
Abstract:
The exponential growth of the Internet of Things (IoT) technology poses various challenges to the classic centralized cloud computing paradigm, including high latency, limited capacity, and network failure. Cloud computing and Fog computing carry the cloud closer to IoT computers in order to overcome these problems. Cloud and Fog provide IoT processing and storage of IoT items locally instead of sending them to the cloud. Cloud and Fog provide quicker reactions and better efficiency in conjunction with the cloud. Cloud and fog computing should also be viewed as the safest approach to ensure th
APA, Harvard, Vancouver, ISO, and other styles
13

Sakhi, Abdlehak, Salah-Eddine Mansour, and Abderrahim Sekkaki. "Enhancing security mechanisms for robot-fog computing networks." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1660–66. https://doi.org/10.11591/ijeecs.v33.i3.pp1660-1666.

Full text
Abstract:
The evolution from conventional Internet usage to the internet of things (IoT) is reshaping communication norms significantly. Cloud computing, while prevalent, faces challenges like limited capacity, high latency, and network failures, especially when handling connected objects, leading to the emergence of fog computing as a more suitable approach for IoT. However, establishing secure connections among heterogeneous IoT entities is complex due to resource disparities and the unsuitability of existing security protocols for resource-constrained devices. This article explores fog computing's ar
APA, Harvard, Vancouver, ISO, and other styles
14

Gautam, Monika, and Jyoti . "Fog Computing: A Review." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4003–7. http://dx.doi.org/10.22214/ijraset.2022.45952.

Full text
Abstract:
Abstract: Fog computing provides different types of services & all these services are accessed through different AP (access points) or STB (set top boxes). The fog computing infrastructure provides different services close to client or user. In some way fog computing behaves similar to cloud computing. Both computing technologies provide application, storage, data and computing services to their registered clients. But fog computing provides services close to its end users as compared to cloud computing that provides services remotely. Also fog computing provides thick geographical distrib
APA, Harvard, Vancouver, ISO, and other styles
15

Jiang, Jiafu, Linyu Tang, Ke Gu, and WeiJia Jia. "Secure Computing Resource Allocation Framework For Open Fog Computing." Computer Journal 63, no. 4 (2020): 567–92. http://dx.doi.org/10.1093/comjnl/bxz108.

Full text
Abstract:
Abstract Fog computing has become an emerging environment that provides data storage, computing and some other services on the edge of network. It not only can acquire data from terminal devices, but also can provide computing services to users by opening computing resources. Compared with cloud computing, fog devices can collaborate to provide users with powerful computing services through resource allocation. However, as many of fog devices are not monitored, there are some security problems. For example, since fog server processes and maintains user information, device information, task par
APA, Harvard, Vancouver, ISO, and other styles
16

Ahmed, Kosrat Dlshad, and Subhi R. M. Zeebaree. "Resource Allocation in Fog Computing: A Review." International Journal of Science and Business 5, no. 2 (2021): 54–63. https://doi.org/10.5281/zenodo.4461876.

Full text
Abstract:
Coupled with resource retrained system and devices, Internet of things network requires effective utilization of Fog Computing system. With increasing demand and requirements for enhancing the performance, fog computing scenario requires increased output, less latency, greater performance etc. This review takes the concept of fog computing one step further by reviewing available literature on the components of fog computing to determine the effective outcomes for different settings and management of the network consideration. Contributing to the development appropriate settings and management
APA, Harvard, Vancouver, ISO, and other styles
17

Sakhi, Abdlehak, Salah-Eddine Mansour, and Abderrahim Sekkaki. "Enhancing security mechanisms for robot-fog computing networks." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 3 (2024): 1660. http://dx.doi.org/10.11591/ijeecs.v33.i3.pp1660-1666.

Full text
Abstract:
<p>The evolution from conventional Internet usage to the internet of things (IoT) is reshaping communication norms significantly. Cloud computing, while prevalent, faces challenges like limited capacity, high latency, and network failures, especially when handling connected objects, leading to the emergence of fog computing as a more suitable approach for IoT. However, establishing secure connections among heterogeneous IoT entities is complex due to resource disparities and the unsuitability of existing security protocols for resource-constrained devices. This article explores fog compu
APA, Harvard, Vancouver, ISO, and other styles
18

Al-khafajiy, Mohammed, Thar Baker, Hilal Al-Libawy, Zakaria Maamar, Moayad Aloqaily, and Yaser Jararweh. "Improving fog computing performance via Fog-2-Fog collaboration." Future Generation Computer Systems 100 (November 2019): 266–80. http://dx.doi.org/10.1016/j.future.2019.05.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

., Shruti, Himanshi Babbar, and Shalli Rani. "Security Architecture and Its Methodology for Fog Computing." ECS Transactions 107, no. 1 (2022): 4549–62. http://dx.doi.org/10.1149/10701.4549ecst.

Full text
Abstract:
With the rise of Internet of Things (IoT) based applications, cloud computing faced lots of challenges like bandwidth limitation and latency in real time applications. Therefore, fog computing came into existence. It is not a replacement of cloud computing but complements it. The services of fog computing are extended to the edge of the network making communication fast and secure. On the other hand, Software Defined Network (SDN) is also discussed, which is helpful in providing network virtualization. In this paper, study about fog computing and SDN, their characteristics, architecture, appli
APA, Harvard, Vancouver, ISO, and other styles
20

Ms. Meenu and Dr. Devender Kumar. "Integration Of Blockchain With Fog Computing To Improvise Security & Privacy Issues." international journal of engineering technology and management sciences 8, no. 1 (2024): 292–98. http://dx.doi.org/10.46647/ijetms.2024.v08i01.038.

Full text
Abstract:
The concept of fog computing was suggested to help cloud computing for the fast data processing of Internet of Things (IoT) based applications. Even, fog computing faces many challenges such as Security, Privacy & Storage. One way to handle these challenges is to integrate blockchain with fog computing. There are several applications of blockchain and fog computing integration that have been proposed, recently, due to their lucrative benefits such as enhancing security and privacy. Also we have to systematically review the literature on both the technologies (blockchain & fog computing
APA, Harvard, Vancouver, ISO, and other styles
21

Zhurylo, Oleh, and Oleksii Liashenko. "Architecture and iot security systems based on fog computing." INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, no. 1 (27) (July 2, 2024): 54–66. http://dx.doi.org/10.30837/itssi.2024.27.054.

Full text
Abstract:
The subject of the study is is the security architecture of the Internet of Things (IoT) based on fog computing, which allows providing efficient and secure services for many IoT users. The goal is to investigate the security architecture for IoT systems based on fog computing. To achieve the goal, the following tasks were solved: the concept of fog computing is proposed, its architecture is considered and a comparative analysis of fog and cloud computing architectures is made; the principles of designing and implementing the architecture of a fog computing system are outlined; multi-level sec
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Jiayi, Abdelkader Ouda, and Raafat Abu-Rukba. "Authentication and Key Agreement Protocol in Hybrid Edge–Fog–Cloud Computing Enhanced by 5G Networks." Future Internet 16, no. 6 (2024): 209. http://dx.doi.org/10.3390/fi16060209.

Full text
Abstract:
The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and fog computing offloads IoT processing. Integrating 5G and fog computing can address cloud computing’s deficiencies, but security challenges remain, especially in Authentication and Key Agreement aspects due to the distributed and dynamic nature of fog computing. This study presents an innovative mutual Authentication and Key Agreement protocol that
APA, Harvard, Vancouver, ISO, and other styles
23

Aljawarneh, Nader Mohammad, Mohamad M. Taamneh, Nouh Alhndawi, Khaled Abed AlQader alomari, and Fawzieh Masa'd. "Fog computing-based logistic supply chain management and organizational agility: The mediating role of user satisfaction." Uncertain Supply Chain Management 9, no. 3 (2021): 767–78. http://dx.doi.org/10.5267/j.uscm.2021.4.001.

Full text
Abstract:
Although fog computing-based logistic supply chain management (Fog computing-based LSCM) is an emerging technology that proved a high impact on services and products, little research has focused on fog computing-based LSCM. Drawing on the Kano model and organization's theory this paper investigates the effect of fog computing-based LSCM on organizational agility. And the role of user satisfaction as mediator between fog computing-based LSCM and organizational agility. A quantitative approach was used, a questionnaire was designed for data collection, Cronbach's Alpha test was performed on a pi
APA, Harvard, Vancouver, ISO, and other styles
24

Kumar, M. Santhosh, K. Ganesh Reddy, and Rakesh Kumar Donthi. "SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing." International Journal of Information Technology and Computer Science 16, no. 1 (2024): 1–12. http://dx.doi.org/10.5815/ijitcs.2024.01.01.

Full text
Abstract:
Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly
APA, Harvard, Vancouver, ISO, and other styles
25

SURESHKUMAR, SWETHA, and DR N. GOB. "FOG COMPUTING IN CLOUD SYSTEM." International Journal of Research Publication and Reviews 5, no. 3 (2024): 3362–71. http://dx.doi.org/10.55248/gengpi.5.0324.0760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yehia, Ibrahim Alzoubi, Al-Ahmad Ahmad, and Jaradat Ashraf. "Fog computing security and privacy issues, open challenges, and blockchain solution: An overview." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5081–88. https://doi.org/10.11591/ijece.v11i6.pp5081-5088.

Full text
Abstract:
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; howev
APA, Harvard, Vancouver, ISO, and other styles
27

Journal, IJSREM. "Fog Computing: A Systematic Review of Architecture, IoT Integration, Algorithms and Research Challenges with Insights into Cloud Computing Integration." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38045.

Full text
Abstract:
With the continuous evolution of technology, the prevalence of the Internet of Things (IoT) has grown significantly. However, with this rise comesa number of challenges for integrated Cloud Computing (CC), including security, performance, latency, and network issues. Fortunately, Fog Computing is a solution that addresses these concerns by bringing CC closer to IoT devices. Essentially, fog serves as a data hub that processes and stores information locally on the fog node, rather than sending it to a cloud server. This results in faster response times and higher- quality services compared to t
APA, Harvard, Vancouver, ISO, and other styles
28

Bhardwaj, Akashdeep. "Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments." International Journal of Fog Computing 1, no. 1 (2018): 35–49. http://dx.doi.org/10.4018/ijfc.2018010103.

Full text
Abstract:
This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which ext
APA, Harvard, Vancouver, ISO, and other styles
29

Kuchuk, Heorhii, and Eduard Malokhvii. "INTEGRATION OF IOT WITH CLOUD, FOG, AND EDGE COMPUTING: A REVIEW." Advanced Information Systems 8, no. 2 (2024): 65–78. http://dx.doi.org/10.20998/2522-9052.2024.2.08.

Full text
Abstract:
Purpose of review. The paper provides an in-depth exploration of the integration of Internet of Things (IoT) technologies with cloud, fog, and edge computing paradigms, examining the transformative impact on computational architectures. Approach to review. Beginning with an overview of IoT's evolution and its surge in global adoption, the paper emphasizes the increasing importance of integrating cloud, fog, and edge computing to meet the escalating demands for real-time data processing, low-latency communication, and scalable infrastructure in the IoT ecosystem. The survey meticulously dissect
APA, Harvard, Vancouver, ISO, and other styles
30

Bala, Mohammad Irfan, and Mohammad Ahsan Chishti. "Survey of applications, challenges and opportunities in fog computing." International Journal of Pervasive Computing and Communications 15, no. 2 (2019): 80–96. http://dx.doi.org/10.1108/ijpcc-06-2019-059.

Full text
Abstract:
Purpose Fog computing is a new field of research and has emerged as a complement to the cloud which can mitigate the problems inherent to the cloud computing model such as unreliable latency, bandwidth constraints, security and mobility. This paper aims to provide detailed survey in the field of fog computing covering the current state-of-the-art in fog computing. Design/methodology/approach Cloud was developed for IT and not for Internet of Things (IoT); as a result, cloud is unable to meet the computing, storage, control and networking demands of the IoT applications. Fog is a companion for
APA, Harvard, Vancouver, ISO, and other styles
31

An, Xingshuo, Fuhong Lin, Shenggang Xu, Li Miao, and Chao Gong. "A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing." Security and Communication Networks 2018 (August 1, 2018): 1–9. http://dx.doi.org/10.1155/2018/1821804.

Full text
Abstract:
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a m
APA, Harvard, Vancouver, ISO, and other styles
32

Mohammed, Zainab Khalid. "Enhancing IoNT performance with fog computing: A hybrid architecture for real-time data processing." Computer and Telecommunication Engineering 2, no. 4 (2024): 3028. https://doi.org/10.54517/cte3028.

Full text
Abstract:
<p>The rapid evolution of the Internet of Nano Things (IoNT) and Fog Computing presents new opportunities for creating advanced smart systems that are both efficient and responsive. Integrating IoNT with Fog Computing offers a powerful paradigm that can address the limitations of cloud-centric architectures, particularly in terms of latency, bandwidth, and real-time processing. The paper explores the synergistic combination of IoNT and Fog Computing, focusing on the development of a hybrid architecture that leverages the proximity and computational capabilities of fog nodes to process da
APA, Harvard, Vancouver, ISO, and other styles
33

Raman, Arumugam So. "Potentials of Fog Computing in Higher Education." International Journal of Emerging Technologies in Learning (iJET) 14, no. 18 (2019): 194. http://dx.doi.org/10.3991/ijet.v14i18.10765.

Full text
Abstract:
This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users,
APA, Harvard, Vancouver, ISO, and other styles
34

Malik, Babur Hayat, Faisal Mahmood, Sohail Shahzad, et al. "From cloud computing to fog computing in Healthcare big data." MATEC Web of Conferences 189 (2018): 03011. http://dx.doi.org/10.1051/matecconf/201818903011.

Full text
Abstract:
In Healthcare big data, data is originated from various heterogeneous sources. Numerous novel base particular healthcare applications offered to handling source of data from electronic health record (EHR) to medical images. Imaging, Electronic Health Report, technology in light of sensor and numerous different procedures created an immense measure of Healthcare data. Cloud computing development was an excellent paradigm to substantiate big data which incited find of imperceptible examples. Cloud computing is a developing new registering design intended to answer different contending administra
APA, Harvard, Vancouver, ISO, and other styles
35

Alzoubi, Yehia Ibrahim, Ahmad Al-Ahmad, and Ashraf Jaradat. "Fog computing security and privacy issues, open challenges, and blockchain solution: An overview." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5081. http://dx.doi.org/10.11591/ijece.v11i6.pp5081-5088.

Full text
Abstract:
<span lang="EN-US">Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirement
APA, Harvard, Vancouver, ISO, and other styles
36

Qureshi, Ramsha, Muhammad Asad, Saima Tunio, Sirajuddin Qureshi, Mughees Ahmed, and Ali Ghulam. "A Survey on Security Issues and Attacks of Fog Computing." VFAST Transactions on Software Engineering 11, no. 1 (2023): 1–11. http://dx.doi.org/10.21015/vtse.v11i1.1309.

Full text
Abstract:
There is a link between the cloud and the Internet of Things (IoT). The layer that makes up the dispersed network environment is exactly what it is. Cloud computing is brought out to the edge of the network through the type of networking topology referred as fog computing. Users can benefit greatly from fog computing. Fog's primary role, similar to cloud computing, is to allow people mobility. Fog computing is becoming more and more popular, whereas at the same time, security dangers are growing every day. Users' identification & verification are crucial. The fact of fog computing cannot e
APA, Harvard, Vancouver, ISO, and other styles
37

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Fog Computing: A Primer." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (2017): 405. http://dx.doi.org/10.23956/ijarcsse.v7i7.165.

Full text
Abstract:
Fog computing (FC) was proposed in 2012 by Cisco as the ideal computing model for providing real-time computing services and storage to support the resource-constrained Internet of Things (IoT) devices. Thus, FC may be regarded as the convergence of the IoT and the Cloud, combining the data-centric IoT services and pay-as-you-go characteristics of clouds. This paper provides a brief introduction of fog computing.
APA, Harvard, Vancouver, ISO, and other styles
38

Papageorgiou, Nikos, Yiannis Verginadis, Dimitris Apostolou, and Gregoris Mentzas. "Fog computing context analytics." IEEE Instrumentation & Measurement Magazine 22, no. 6 (2019): 53–59. http://dx.doi.org/10.1109/mim.2019.8917904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

shoker, Asmaa, Mohammed Amoon, ,. Ayman M. Bahaa-Eldin, and Nirmeen A. El-Bahnasawy. "Resource Allocation Strategy in Fog Computing: Task Scheduling in Fog Computing Systems." Journal of Communication Sciences and Information Technology 1, no. 1 (2023): 1–11. http://dx.doi.org/10.21608/jcsit.2023.306757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Pg. Ali Kumar, Dk Siti Nur Khadhijah, S. H. Shah Newaz, Fatin Hamadah Rahman, Gyu Myoung Lee, Gour Karmakar, and Thien-Wan Au. "Green Demand Aware Fog Computing: A Prediction-Based Dynamic Resource Provisioning Approach." Electronics 11, no. 4 (2022): 608. http://dx.doi.org/10.3390/electronics11040608.

Full text
Abstract:
Fog computing could potentially cause the next paradigm shift by extending cloud services to the edge of the network, bringing resources closer to the end-user. With its close proximity to end-users and its distributed nature, fog computing can significantly reduce latency. With the appearance of more and more latency-stringent applications, in the near future, we will witness an unprecedented amount of demand for fog computing. Undoubtedly, this will lead to an increase in the energy footprint of the network edge and access segments. To reduce energy consumption in fog computing without compr
APA, Harvard, Vancouver, ISO, and other styles
41

Pasupathy, Dr S. "Empowering Edge Intelligence: A Comprehensive Exploration of Fog Computing in the Era of Real-time Data Processing and the Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28339.

Full text
Abstract:
Fog computing, a paradigm that extends cloud computing closer to the edge of the network, has emerged as a transformative solution to address the growing demands of latency-sensitive applications and the massive influx of data from the Internet of Things (IoT). Unlike traditional cloud computing, which centralizes data processing and storage in distant data centers, fog computing leverages a distributed architecture, bringing computation, storage, and networking resources closer to the end-users and devices. This abstract explores the key concepts, principles, and advantages of fog computing.
APA, Harvard, Vancouver, ISO, and other styles
42

Ndungi, Rebeccah, and Bambang Sugiantoro. "THE FUTURE OF FOG COMPUTING IN KENYA." American Journal of Computing and Engineering 4, no. 2 (2021): 1–9. http://dx.doi.org/10.47672/ajce.857.

Full text
Abstract:
The study, titled "The Future of Fog Computing in Kenya," discusses fog computing, computing evolution, and the Internet of Things. It has layers ideal for fog networks. The architecture depicts the functions performed by each layer, the protocols, devices, and their functionality at various layers. Fog computing extends cloud computing and helps mitigate its difficulties. The study also goes forth to explain the various sectors where fog-computing technology is applied and the various merits associated with it. In order to improve present technology, this article will greatly help researchers
APA, Harvard, Vancouver, ISO, and other styles
43

Bhavsar, Sejal Atit, and Kirit J. Modi. "Design and Development of Framework for Platform Level Issues in Fog Computing." International Journal of Electronics, Communications, and Measurement Engineering 8, no. 1 (2019): 1–20. http://dx.doi.org/10.4018/ijecme.2019010101.

Full text
Abstract:
Fog computing is a paradigm that extends cloud computing services to the edge of the network. Fog computing provides data, storage, compute and application services to end users. The distinguishing characteristics of fog computing are its proximity to the end users. The application services are hosted on network edges like on routers, switches, etc. The goal of fog computing is to improve the efficiency and reduce the amount of data that needs to be transported to cloud for analysis, processing and storage. Due to heterogeneous characteristics of fog computing, there are some issues, i.e. secu
APA, Harvard, Vancouver, ISO, and other styles
44

Shrestha, Hewan, Puviyarai T., Sana Sodanapalli, and Chandramohan Dhasarathan. "Evolution of Fog Computing Applications, Opportunities, and Challenges." International Journal of Fog Computing 4, no. 1 (2021): 1–17. http://dx.doi.org/10.4018/ijfc.2021010101.

Full text
Abstract:
The emerging trend of internet of things in recent times is a blessing for various industries in the world. With the increasing amount of data generated by these devices, it makes it difficult for proper data flow and computation over the regular cloud architecture. Fog computing is a great alternative for cloud computing as it supports computation in devices over a large distributed geographical area, which is a plus for fog computing. Having applications in various domains including healthcare, logistics, design, marketing, manufacturing, and many more, fog computing is a great boon for the
APA, Harvard, Vancouver, ISO, and other styles
45

Dhingra, Madhavi, Samta J. Goyal, and Rajeev Goyal. "Study on Fog Computing Enabled Data Processing." Electrical and Automation Engineering 3, no. 1 (2024): 1–7. http://dx.doi.org/10.46632/eae/3/1/1.

Full text
Abstract:
A study into the potential and advantages of fog computing in facilitating effective data processing at the network edge is presented in this abstract. The use of fog computing architectures and technologies to improve the effectiveness, speed, and scalability of data processing operations at the network edge is known as "fog computing enabled data processing." By bringing computer resources closer to data sources, enabling real-time processing, lowering latency, and optimizing bandwidth utilization, fog computing expands the possibilities of cloud computing. This method works especially well
APA, Harvard, Vancouver, ISO, and other styles
46

Dr.A.Shaji, George. "The Role of Fog Computing in Enabling Real-Time IoT Applications." Partners Universal International Innovation Journal (PUIIJ) 02, no. 02 (2024): 39–54. https://doi.org/10.5281/zenodo.10969999.

Full text
Abstract:
The emergence of the Internet of Things (IoT), which interconnects billions of devices and produces enormous quantities of data, has brought to light the deficiencies of existing cloud computing models. Challenges such as latency, security, data integrity, bandwidth expenses, and absence of operation independence hinder the ability to conduct real-time analysis and provide appropriate responses. As an emerging architecture, fog computing addresses the most significant challenges of cloud computing in IoT environments. Through distributed fog nodes, this paper investigates how fog computing ext
APA, Harvard, Vancouver, ISO, and other styles
47

Panwar, Avnish. "Improved QoS in Fog Computing by Efficient Resource Allocation in an Internet of Things Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, no. 3 (2018): 1082–89. http://dx.doi.org/10.17762/turcomat.v9i3.13897.

Full text
Abstract:
Large-scale application migration to fog computing is now being seen in the IT industry. The IoT is a prototype for connecting everyday objects to the web, such as sensors, gadgets (including those used in healthcare), and smart cameras. By analysing the data produced by the device, the IoT proposes a paradigm that simplifies infrastructure management and disaster recovery, hence improving the quality of life for humans.Fog Computing is a new computing paradigm that has emerged in recent years to meet the needs of latency-sensitive, geographically dispersed applications with high computational
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Rubaie, Noor Razaq Obaied, Rafal Nader Neamah Kamel, and Raghda M. Alshemari. "Simulating fog computing in OMNeT++." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 979–86. http://dx.doi.org/10.11591/eei.v12i2.4201.

Full text
Abstract:
Fog computing is a technology architecture in which data from IoT devices is received in real time by a number of nodes. These nodes process the data they receive in real time, with millisecond reaction times. The nodes communicate analytical summary data to the cloud on a regular basis. Fog computing scenario demands higher output, reduced latency, and greater performance as demand and requirements for improving performance in IoT applications grow. The resources allocation in effective manner in the fog environment is also a major problem in IoT-fog computing. Fog computing has been consider
APA, Harvard, Vancouver, ISO, and other styles
49

Noor, Razaq Obaied Al-Rubaie, Nader Neamah Kamel Rafal, and M. Alshemari Raghda. "Simulating fog computing in OMNeT++." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 979~986. https://doi.org/10.11591/eei.v12i2.4201.

Full text
Abstract:
Fog computing is a technology architecture in which data from IoT devices is received in real time by a number of nodes. These nodes process the data they receive in real time, with millisecond reaction times. The nodes communicate analytical summary data to the cloud on a regular basis. Fog computing scenario demands higher output, reduced latency, and greater performance as demand and requirements for improving performance in IoT applications grow. The resources allocation in effective manner in the fog environment is also a major problem in IoT-fog computing. Fog computing has been consider
APA, Harvard, Vancouver, ISO, and other styles
50

Javed, Zainab, and Waqas Mahmood. "A Survey Based Study on Fog Computing Awareness." International Journal of Information Technology and Computer Science 13, no. 2 (2021): 49–62. http://dx.doi.org/10.5815/ijitcs.2021.02.05.

Full text
Abstract:
In this day and age, the rise in technological advancements has the potential to improve and transform our lives every day. The rapid technology innovation can have a great impact on our business operations. Currently, Cloud computing services are popular and offer a wide range of opportunities for their customers. This paper presents a survey on a more recent computing architecture paradigm known as Fog Computing. Fog networking is a beneficial solution that offers the greater facility of data storage, enhanced computing, and networking resources. This new concept of fog complements cloud sol
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!