A Survey on Fog Computing in IoT

Authors

  • Mansoor Ahmad Rasheed University of Management and Technology
  • Jabar Saleem University of Management and Technology, Lahore Pakistan
  • Hudabia Murtaza University of Management and Technology, Lahore Pakistan
  • Hafiz Abdullah Tanweer University of Management and Technology, Lahore Pakistan
  • Mannan Ahmad Rasheed University of Management and Technology, Lahore Pakistan
  • Mishaal Ahmed University of Management and Technology, Lahore Pakistan

DOI:

https://doi.org/10.21015/vtse.v9i4.727

Abstract

Technological advancements in computing and wireless handheld devices have increased tremendously the rate of connected devices to the internet.  To solve problems of our daily life are being controlled by these devices that created a new approach called as Internet of things. Cloud computing is a promising solution to store data and perform computations for IoT. But it has many issues like latency, traffic congestion, and poor quality of services. Health-related IoT applications are intolerant to delay or poor quality of service. To tackle these issues a new model of computing known as fog computing came into existence. Fog computing helps for effective communication and processing of the massive data that tackles issues caused by cloud computing in a significant way. This study discusses different types of fog computing architectures, some of the issues related to security and privacy along with their possible solutions. In this survey, some practical applications of fog computing in IoT are discussed which can ease our daily problems.

References

C. E.-t.-E. I. Analytics, "for Electric Utilities Solution Overview," URL https://www. cisco. com/c/en/us/solutions/collateral/data-center-virtualization/big-data/solution-overview-c22-740248. html, 2018.

P. Varshney and Y. Simmhan, "Demystifying fog computing: Characterizing architectures, applications and abstractions," in 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 2017: IEEE, pp. 115-124. DOI: https://doi.org/10.1109/ICFEC.2017.20

A. V. Dastjerdi and R. Buyya, "Fog computing: Helping the Internet of Things realize its potential," Computer, vol. 49, no. 8, pp. 112-116, 2016. DOI: https://doi.org/10.1109/MC.2016.245

N. Bessis and C. Dobre, Big data and internet of things: a roadmap for smart environments. Springer, 2014. DOI: https://doi.org/10.1007/978-3-319-05029-4

E. Wikström and U. M. Emilsson, "Autonomy and control in everyday life in care of older people in nursing homes," Journal of Housing for the Elderly, vol. 28, no. 1, pp. 41-62, 2014. DOI: https://doi.org/10.1080/02763893.2013.858092

O. C. A. W. Group, "OpenFog reference architecture for fog computing," OPFRA001, vol. 20817, p. 162, 2017.

G. Infrastructure, "Amazon Web Services," URL: http://aws. amazon. com/aboutaws/global-infrastructure/(visited on 2017-03-14), 2018.

S. Krishnan and J. L. U. Gonzalez, "Getting Started with Google Cloud Platform," in Building Your Next Big Thing with Google Cloud Platform: Springer, 2015, pp. 13- DOI: https://doi.org/10.1007/978-1-4842-1004-8_2

M. Mukherjee, L. Shu, and D. Wang, "Survey of fog computing: Fundamental, network applications, and research challenges," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 1826-1857, 2018. DOI: https://doi.org/10.1109/COMST.2018.2814571

D. M. Vistro, A. U. Rehman, A. Abid, M. S. Farooq, and M. Idrees, "Analysis of cloud computing based blockchain issues and challenges," Journal of Critical Reviews, vol. 7, no. 10, pp. 1482-1492, 2020.

H. ElSawy, E. Hossain, and M.-S. Alouini, "Analytical modeling of mode selection and power control for underlay D2D communication in cellular networks," IEEE Transactions on Communications, vol. 62, no. 11, pp. 4147-4161, 2014. DOI: https://doi.org/10.1109/TCOMM.2014.2363849

M. S. Farooq, S. Riaz, A. Abid, K. Abid, and M. A. Naeem, "A Survey on the Role of IoT in Agriculture for the Implementation of Smart Farming," IEEE Access, vol. 7, pp. 156237-156271, 2019.

Gaspar, L. Mendes, M. Matthé, N. Michailow, A. Festag, and G. Fettweis, "LTE-compatible 5G PHY based on generalized frequency division multiplexing," in 2014 11th International Symposium on Wireless Communications Systems (ISWCS), 2014: IEEE, pp. 209-213. DOI: https://doi.org/10.1109/ISWCS.2014.6933348

E. Bastug, M. Bennis, and M. Debbah, "Living on the edge: The role of proactive caching in 5G wireless networks," IEEE Communications Magazine, vol. 52, no. 8, pp. 82-89, 2014. DOI: https://doi.org/10.1109/MCOM.2014.6871674

Stojmenovic and S. Wen, "The fog computing paradigm: Scenarios and security issues," in 2014 federated conference on computer science and information systems, 2014: IEEE, pp. 1-8. DOI: https://doi.org/10.15439/2014F503

S. Yi, C. Li, and Q. Li, "A Survey of Fog Computing: Concepts," Applications and Issues Department of Computer Science College of William and Mary Williamsburg, VA, USA https://dl. acm. org/doi/pdf/10.1145/2757384.2757397, 2016.

K. Saharan and A. Kumar, "Fog in comparison to cloud: A survey," International Journal of Computer Applications, vol. 122, no. 3, 2015. DOI: https://doi.org/10.5120/21679-4773

L. Rao, X. Liu, L. Xie, and W. Liu, "Coordinated energy cost management of distributed internet data centers in smart grid," IEEE Transactions on Smart Grid, vol. 3, no. 1, pp. 50-58, 2011. DOI: https://doi.org/10.1109/TSG.2011.2170100

J. Galvão, J. Sousa, J. Machado, J. Mendonça, T. Machado, and P. V. Silva, "Mechanical design in industry 4.0: Development of a handling system using a modular approach," in International Conference on Innovation, Engineering and Entrepreneurship, 2018: Springer, pp. 508-514. DOI: https://doi.org/10.1007/978-3-319-91334-6_69

M. Mukherjee et al., "Security and privacy in fog computing: Challenges," IEEE Access, vol. 5, pp. 19293-19304, 2017.

D. M. Vistro, A. U. Rehman, M. S. Farooq, A. Abid, and M. Idrees, "A SURVEY ON CLOUD COMPUTING SECURITY WITH CROSS PLATFORM," Journal of Critical Reviews, vol. 7, no. 10, pp. 1439-1445, 2020.

R. Mahmud, R. Kotagiri, and R. Buyya, "Fog computing: A taxonomy, survey and future directions," in Internet of everything: Springer, 2018, pp. 103-130.

S. G. Wayangankar and P. P. Jorvekar, "Survey on Internet of Things in the Fog," in 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), 2018: IEEE, pp. 80-86. .

F. L. Wang, J. Fong, and M. Choy, "Blended learning for programming courses: A case study of outcome based teaching & learning," Blended Learning, p. 30, 2007.

R. Mahmud, R. Kotagiri, and R. Buyya, "Fog computing: A taxonomy, survey and future directions," in Internet of everything: Springer, 2018, pp. 103-130. DOI: https://doi.org/10.1007/978-981-10-5861-5_5

V. B. C. Souza, W. Ramírez, X. Masip-Bruin, E. Marín-Tordera, G. Ren, and G. Tashakor, "Handling service allocation in combined fog-cloud scenarios," in 2016 IEEE international conference on communications (ICC), 2016: IEEE, pp. 1-5. DOI: https://doi.org/10.1109/ICC.2016.7511465

O. Simeone, A. Maeder, M. Peng, O. Sahin, and W. Yu, "Cloud radio access network: Virtualizing wireless access for dense heterogeneous systems," Journal of Communications and Networks, vol. 18, no. 2, pp. 135-149, 2016.

I. T. Haque and N. Abu-Ghazaleh, "Wireless software defined networking: A survey and taxonomy," IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2713-2737, 2016. DOI: https://doi.org/10.1109/COMST.2016.2571118

M. S. Farooq and S. Akram, "IoT IN AGRICULTURE: CHALLENGES AND OPPORTUNITIES," J. Agric. Res, vol. 59, no. 1, pp. 63-87, 2021..

X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, "Security in vehicular ad hoc networks," IEEE communications magazine, vol. 46, no. 4, pp. 88-95, 2008. DOI: https://doi.org/10.1109/MCOM.2008.4481346

M. S. Farooq, S. Riaz, A. Abid, T. Umer, and Y. B. Zikria, "Role of IoT technology in agriculture: A systematic literature review," Electronics, vol. 9, no. 2, p. 319, 2020.

V. Albino, U. Berardi, and R. M. Dangelico, "Smart cities: Definitions, dimensions, performance, and initiatives," Journal of urban technology, vol. 22, no. 1, pp. 3-21, 2015. DOI: https://doi.org/10.1080/10630732.2014.942092

R. Ghosh and Y. Simmhan, "Distributed scheduling of event analytics across edge and cloud," ACM Transactions on Cyber-Physical Systems, vol. 2, no. 4, pp. 1-28, 2018.

H. Gedawy, S. Tariq, A. Mtibaa, and K. Harras, "Cumulus: A distributed and flexible computing testbed for edge cloud computational offloading," in 2016 Cloudification of the Internet of Things (CIoT), 2016: IEEE, pp. 1-6. DOI: https://doi.org/10.1109/CIOT.2016.7872920

T. Jiang, H. Fang, and H. Wang, "Blockchain-based internet of vehicles: Distributed network architecture and performance analysis," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4640-4649, 2018.

S. Coicheci and I. Filip, "Self-driving vehicles: current status of development and technical challenges to overcome," in 2020 IEEE 14th International Symposium on Applied Computational Intelligence and Informatics (SACI), 2020: IEEE, pp. 000255-000260.

W. Schwarting, J. Alonso-Mora, and D. Rus, "Planning and decision-making for autonomous vehicles," Annual Review of Control, Robotics, and Autonomous Systems, vol. 1, pp. 187-210, 2018. DOI: https://doi.org/10.1146/annurev-control-060117-105157

P. Szikora and N. Madarász, "Self-driving cars—The human side," in 2017 IEEE 14th international scientific conference on informatics, 2017: IEEE, pp. 383-387. DOI: https://doi.org/10.1109/INFORMATICS.2017.8327279

R. Ghebleh, "A comparative classification of information dissemination approaches in vehicular ad hoc networks from distinctive viewpoints: A survey," Computer Networks, vol. 131, pp. 15-37, 2018. DOI: https://doi.org/10.1016/j.comnet.2017.12.003

Y. Sun, R. Lu, X. Lin, X. Shen, and J. Su, "An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications," IEEE Transactions on Vehicular Technology, vol. 59, no. 7, pp. 3589-3603, 2010. DOI: https://doi.org/10.1109/TVT.2010.2051468

A. K. Simpson, F. Roesner, and T. Kohno, "Securing vulnerable home IoT devices with an in-hub security manager," in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017: IEEE, pp. 551-556. DOI: https://doi.org/10.1109/PERCOMW.2017.7917622

A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the internet of things: Security and privacy issues," IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017. DOI: https://doi.org/10.1109/MIC.2017.37

M. B. Barcena and C. Wueest, "Insecurity in the Internet of Things," Security response, symantec, 2015.

N. B. Truong, G. M. Lee, and Y. Ghamri-Doudane, "Software defined networking-based vehicular adhoc network with fog computing," in 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015: Ieee, pp. 1202-1207. DOI: https://doi.org/10.1109/INM.2015.7140467

J. C. Nobre et al., "Vehicular software-defined networking and fog computing: Integration and design principles," Ad Hoc Networks, vol. 82, pp. 172-181, 2019.

A. Muthanna et al., "Secure and reliable IoT networks using fog computing with software-defined networking and blockchain," Journal of Sensor and Actuator Networks, vol. 8, no. 1, p. 15, 2019.

D. Pliatsios, P. Sarigiannidis, S. Goudos, and G. K. Karagiannidis, "Realizing 5G vision through Cloud RAN: technologies, challenges, and trends," EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, pp. 1-15, 2018. DOI: https://doi.org/10.1186/s13638-018-1142-1

H. M. Abdel-Atty, R. S. Alhumaima, S. M. Abuelenin, and E. A. Anowr, "Performance analysis of fog-based radio access networks," IEEE Access, vol. 7, pp. 106195-106203, 2019.

R. S. Rai, "Performance Analysis of Non-Orthogonal Multiple Access (NOMA) in C-RAN, H-CRAN and F-RAN for 5G Systems," University of Kent, 2019.

Y. Zhang, X. Ma, J. Zhang, M. S. Hossain, G. Muhammad, and S. U. Amin, "Edge intelligence in the cognitive Internet of Things: Improving sensitivity and interactivity," IEEE Network, vol. 33, no. 3, pp. 58-64, 2019.

F. Al‐Turjman, H. Zahmatkesh, and R. Shahroze, "An overview of security and privacy in smart cities' IoT communications," Transactions on Emerging Telecommunications Technologies, p. e3677, 2019.

N. Tariq et al., "The security of big data in fog-enabled IoT applications including blockchain: A survey," Sensors, vol. 19, no. 8, p. 1788, 2019.

Y. Liu, J. E. Fieldsend, and G. Min, "A framework of fog computing: Architecture, challenges, and optimization," IEEE Access, vol. 5, pp. 25445-25454, 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2766923

A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, "Fog computing for Healthcare 4.0 environment: Opportunities and challenges," Computers & Electrical Engineering, vol. 72, pp. 1-13, 2018.

R. K. Naha et al., "Fog computing: Survey of trends, architectures, requirements, and research directions," IEEE access, vol. 6, pp. 47980-48009, 2018

M. Mukherjee et al., "Security and privacy in fog computing: Challenges," IEEE Access, vol. 5, pp. 19293-19304, 2017. DOI: https://doi.org/10.1109/ACCESS.2017.2749422

A. Yousefpour et al., "All one needs to know about fog computing and related edge computing paradigms: A complete survey," Journal of Systems Architecture, vol. 98, pp. 289-330, 2019.

F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, "Fog computing: A platform for internet of things and analytics," in Big data and internet of things: A roadmap for smart environments: Springer, 2014, pp. 169-186. DOI: https://doi.org/10.1007/978-3-319-05029-4_7

S. Wang, Y. Ruan, Y. Tu, S. Wagle, C. G. Brinton, and C. Joe-Wong, "Network-aware optimization of distributed learning for fog computing," IEEE/ACM Transactions on Networking, 2021.

S. Khan, S. Parkinson, and Y. Qin, "Fog computing security: a review of current applications and security solutions," Journal of Cloud Computing, vol. 6, no. 1, pp. 1-22, 2017.. DOI: https://doi.org/10.1186/s13677-017-0090-3

R. Mahmud, K. Ramamohanarao, and R. Buyya, "Latency-aware application module management for fog computing environments," ACM Transactions on Internet Technology (TOIT), vol. 19, no. 1, pp. 1-21, 2018.

J. Ni, K. Zhang, X. Lin, and X. Shen, "Securing fog computing for internet of things applications: Challenges and solutions," IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, 2017. DOI: https://doi.org/10.1109/COMST.2017.2762345

L. Li, K. Ota, and M. Dong, "Deep learning for smart industry: Efficient manufacture inspection system with fog computing," IEEE Transactions on Industrial Informatics, vol. 14, no. 10, pp. 4665-4673, 2018. DOI: https://doi.org/10.1109/TII.2018.2842821

R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah, "A user authentication scheme of IoT devices using blockchain-enabled fog nodes," in 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA), 2018: IEEE, pp. 1-8.

N. Mohan and J. Kangasharju, "Edge-Fog cloud: A distributed cloud for Internet of Things computations," in 2016 Cloudification of the Internet of Things (CIoT), 2016: IEEE, pp. 1-6. DOI: https://doi.org/10.1109/CIOT.2016.7872914

A. S. Sohal, R. Sandhu, S. K. Sood, and V. Chang, "A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments," Computers & Security, vol. 74, pp. 340-354, 2018. DOI: https://doi.org/10.1016/j.cose.2017.08.016

S. Raponi, M. Caprolu, and R. Di Pietro, "Intrusion detection at the network edge: Solutions, limitations, and future directions," in International Conference on Edge Computing, 2019: Springer, pp. 59-75.

R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges," Future Generation Computer Systems, vol. 78, pp. 680-698, 2018. DOI: https://doi.org/10.1016/j.future.2016.11.009

M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities," IEEE Internet of things journal, vol. 3, no. 6, pp. 854-864, 2016. DOI: https://doi.org/10.1109/JIOT.2016.2584538

Y. Simmhan et al., "Cloud-based software platform for data-driven smart grid management," IEEE/AIP computing in science and engineering, vol. 79, 2013.

A. Arooj, M. S. Farooq, T. Umer, and R. U. Shan, "Cognitive internet of vehicles and disaster management: a proposed architecture and future direction," Transactions on Emerging Telecommunications Technologies, p. e3625, 2019.

A. Abid, M. F. Manzoor, M. S. Farooq, U. Farooq, and M. Hussain, "Challenges and Issues of Resource Allocation Techniques in Cloud Computing," KSII Transactions on Internet and Information Systems (TIIS), vol. 14, no. 7, pp. 2815-2839, 2020.

I. A. Khawaja, A. Abid, M. S. Farooq, A. Shahzada, U. Farooq, and K. Abid, "Ad-Hoc Collaboration Space for Distributed Cross Device Mobile Application Development," IEEE Access, vol. 8, pp. 62800-62814, 2020.

A. Arooj, M. S. Farooq, A. Akram, R. Iqbal, A. Sharma, and G. Dhiman, "Big Data Processing and Analysis in Internet of Vehicles: Architecture, Taxonomy, and Open Research Challenges," Archives of Computational Methods in Engineering, pp. 1-37, 2021.

O. Aziz, M. S. Farooq, A. Abid, R. Saher, and N. Aslam, "Research trends in enterprise service bus (ESB) applications: A systematic mapping study," IEEE Access, vol. 8, pp. 31180-31197, 2020.

I. Obaid, M. S. Farooq, and A. Abid, "Gamification for recruitment and job training: model, taxonomy, and challenges," IEEE Access, vol. 8, pp. 65164-65178, 2020

H. Malik, M. S. Farooq, A. Khelifi, A. Abid, J. N. Qureshi, and M. Hussain, "A Comparison of Transfer Learning Performance Versus Health Experts in Disease Diagnosis From Medical Imaging," IEEE Access, vol. 8, pp. 139367-139386, 2020.

R. Tehseen, M. S. Farooq, and A. Abid, "A framework for the prediction of earthquake using federated learning," PeerJ Computer Science, vol. 7, p. e540, 2021.

A. Abid, M. S. Farooq, I. Raza, U. Farooq, and K. Abid, "Variants of Teaching First Course in Database Systems," Bulletin of Education and Research, vol. 37, no. 2, pp. 9-25, 2015.

T. H. Luan, L. Gao, Z. Li, Y. Xiang, G. Wei, and L. Sun, "Fog computing: Focusing on mobile users at the edge," arXiv preprint arXiv:1502.01815, 2015.

C. Puliafito, E. Mingozzi, F. Longo, A. Puliafito, and O. Rana, "Fog computing for the internet of things: A survey," ACM Transactions on Internet Technology (TOIT), vol. 19, no. 2, pp. 1-41, 2019.

K. Tange, M. De Donno, X. Fafoutis, and N. Dragoni, "A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities," IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2489-2520, 2020.

A. Ahmed et al., "Fog computing applications: Taxonomy and requirements," arXiv preprint arXiv:1907.11621, 2019.

J. Singh, P. Singh, and S. S. Gill, "Fog computing: A taxonomy, systematic review, current trends and research challenges," Journal of Parallel and Distributed Computing, vol. 157, pp. 56-85, 2021.

A. Markus and A. Kertesz, "A survey and taxonomy of simulation environments modelling fog computing," Simulation Modelling Practice and Theory, vol. 101, p. 102042, 2020.

A. Markus and A. Kertesz, "A survey and taxonomy of simulation environments modelling fog computing," Simulation Modelling Practice and Theory, vol. 101, p. 102042, 2020.

Downloads

Published

2021-12-31

How to Cite

Rasheed, M. A., Saleem, J., Murtaza, H., Tanweer, H. A., Rasheed, M. A., & Ahmed, M. (2021). A Survey on Fog Computing in IoT. VFAST Transactions on Software Engineering, 9(4), 68–81. https://doi.org/10.21015/vtse.v9i4.727