SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 6, December 2018, pp. 4646~4653
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp4646-4653  4646
Journal homepage: http://iaescore.com/journals/index.php/IJECE
A Comparison of Cloud Execution Mechanisms Fog, Edge, and
Clone Cloud Computing
T. Francis
Department of Computer Engineering, BITS Pilani University, India
Article Info ABSTRACT
Article history:
Received Mar 27, 2018
Revised Jun 7, 2018
Accepted Sep 9, 2018
Cloud computing is a technology that was developed a decade ago to provide
uninterrupted, scalable services to users and organizations. Cloud computing
has also become an attractive feature for mobile users due to the limited
features of mobile devices. The combination of cloud technologies with
mobile technologies resulted in a new area of computing called mobile cloud
computing. This combined technology is used to augment the resources
existing in Smart devices. In recent times, Fog computing, Edge computing,
and Clone Cloud computing techniques have become the latest trends after
mobile cloud computing, which have all been developed to address the
limitations in cloud computing. This paper reviews these recent technologies
in detail and provides a comparative study of them. It also addresses the
differences in these technologies and how each of them is effective for
organizations and developers.
Keyword:
Clone cloud
Edge computing
Elastic executions
Fog computing
IoT
Mobile back-ends
Mobile cloud computing
Mobile off-loading mechanisms
Virtualization
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
T. Francis,
Department of Electrical and Computer Engineering,
Department of Computer Engineering,
BITS Pilani University, India.
Email: tinajibu@gmail.com
1. INTRODUCTION
Smart devices such as, Smart phones, tablets, PCs, Net-books, etc., are trending in the market today.
These devices are compact and small, which make them handy for use. Being small, they have fewer
resources than other systems. Cloud computing was used to address the drawbacks in these devices, such as
lack of storage, computational power, and the limited battery life of Smart devices[1]. Mobile cloud
computing is an interdisciplinary combination of cloud and mobile computing. Resource constraints in
mobiles gave rise to the use of the cloud in mobiles, which was later known as Mobile Cloud computing or
MCC [2]. It is also considered as an extension to cloud computing, but at the same time, it provides services
to Smart devices. There are a number of limitations in using mobile cloud computing, as cloud data centers
are often located at remote locations from the place of request.
This makes it more susceptible to suffer from lag, network resilience, and link failures, thus, the
objective of using mobile cloud computing fails because of these issues. Also the volume and speed of data
in applications such as healthcare, manufacturing and traffic management is high hence big data analytics
tools such as mahout, sparks etc are used.They process multiple data sources, distributed memory tasks and
range of algorithms however it is still inclined to cloud data centres who provide and support their
services [3]. Hence there is need to get the cloud closer to users. Edge, Fog, and Clone clouds try to address
these issues and are differentiated from each other in terms of usage and build techniques. The most recent
Int J Elec & Comp Eng ISSN: 2088-8708 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis)
4647
developments in cloud computing are fog and edge computing. It is necessary to make a comparison of these
techniques to understand the advantages of using edge, fog, and clone cloud in different systems.
Cloud-based applications use a central server to process data, which increases the communication
between user devices. Hence, there is a need for looking beyond the cloud at the edge of cloud networks. The
aim is to explore possibilities of performing computations at edge nodes. Edge Cloud augments traditional
data centers consisting of cloud models, with service nodes placed at the network edges[4][5]. The proximity
of edge nodes, allows data processing to and from remote clouds to be done at the edge. Computing on edge
nodes closer to end-users can be exploited as a platform for application providers to improve their services.
Similarly, clone clouds provide a distributed mechanism of application execution, in contrast to
edge cloud. It automatically transforms mobile applications to benefit from the cloud [6]. This application is
a flexible run-time execution partitioner, which transfers execution onto device clones running on the cloud.
A clone allows for the dynamic execution of various applications by alternating between the clone and the
device.
In the same way, fog computing gives the user the option of performing cloud operations at
locations closer to his or her point of interest. Fog computing is similar in many ways to cloud and edge
computing. The huge influx of real-time data, and the need for processing the same, gave rise to the
terminology of fog computing [7]. Fog nodes are heterogeneous devices, ranging from high-end servers,
access points, set-top boxes, edge routers, etc., to end devices, such as mobile phones, smart watches, and
sensors. It uses existing networks and routers in nearby locations to perform operations just like the cloud [8].
Fog computing also has a better response to the Internet of Things environment and is suitable for real-time
service requests.
The goal of this study is to understand the differences between these technologies by performing a
comparative study of each of these approaches. Some of the application areas where they are useful are also
discussed.The next section provides a survey on edge, fog, and the components of their builds that make
them feasible for implementation. This study includes a comparative study on edge computing and fog
computing, a discussion on the elastic execution mechanisms using clone cloud computing, and an inspection
of off-loading mechanisms used in clones and the cost-benefit analysis to off-load. Additionally, a summary
and comparative study on fog, edge, and clone cloud mechanisms is provided.
2. SURVEY ON EDGE COMPUTING AND FOG COMPUTING
2.1. Edge Computing Review
It is known that cloud computing and mobile computing are used together to harness mobile back-
ends to augment the resources for Smart devices. However, they suffer from lag, network resilience, and link
failures. Edge computing is a terminology that is used to augment traditional data centres with service nodes
at network edges. Mobile Edge Computing (MEC) [9] allows the use of cloud and IT services within close
proximity of mobile subscribers, thus reducing the end-to-end latency. It is based on a decentralized model
that interconnects a heterogeneous cloud and it is based on the following elements:
a. Proximity: The possibility to use nodes that are nearer rather than farther away.
b. Intelligence: Use of autonomous decision making to help in the miniaturization of systems.
c. Control: Management and coordination comes from edge machines that assign or delegate
computation [10].
Hence, based on these overall elements, edge computing delivers low-latency, bandwidth-efficiency,
and resilient end-user services. Using this service, users receive latency benefits from those who are away
from the data centres. Edge computing provides a traditional data centre with extended capabilities to deploy
applications at the edge networks[11]. The proximity of users and low latency are significant advantages in
times of network congestion. These features allow the mobile network operators, vendors, as well as
application service providers, to improve existing services using edge computing, enabling significant value
addition to the respective business models. Figure 1 shows edge centre architecture through LAN and WAN
networks connected to the cloud data centre.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653
4648
Figure 1. Edge centre architecture in LAN/WAN network
2.1.1. Model of an Edge System
Edge computing supports primitive virtualization instead of hypervisor-based hardware
virtualization. In the paper by Satyanarayanan [12], edge computing is discussed as a new paradigm in which
substantial computing and storage resources are done at micro data centres placed at the Internet’s edge in
close proximity to mobile devices or sensors. The WiCloud architecture by Hongxing [13] consists of a
layered architecture that includes a physical layer, virtual layer, and a function and service layer. The paper
by Chang et al. [14] gives a general model of an edge cloud that can work with all types of edge services and
also IoT platforms.
2.1.2. Applications Based on Edge Computing
The Follow Me Edge (FME) architecture is an edge service architecture proposed by
Dutta et al. [15], where the service continuously follows the user to the closest edge. Migration is done to
ensure that no data is lost. To realize the FME architecture, the edge operator needs to keep updated
information about resources and user locations. The SLA consists of an integrated architecture of edge
operators, a shared storage concept, and service migration, which are enforced in the FME architecture. A
framework for mobile edge computing to support diverse applications in a Smart city scenario, by reducing
core network traffic through Smart MEC, is the overall idea. Another open sensor platform developed on the
basis of edge computing is proposed in Waggle, a wireless program that uses sensors to measure air borne
pollutants. It is an OpenStack-based, edge platform that consists of a node controller that manages a sensor
data cache, reads simple sensor values, and manages the network stack and encryption.
The edge computing for the sensor platform addresses resilience, performance, isolation, and data
privacy. Nebula [10] is a dispersed cloud infrastructure that uses edge. It was developed by the University of
Minnesota to support distributed data-intensive computing and for efficient movement and availability of
large quantities of data to compute resources. It acts as a decentralized cloud, working at the edge of the
network and helping with the devices lacking resources. Femto Cloud, discussed in work by Ammar et. Al.
[16] are a collection of co-located devices used to provide a cloud service at the edge. The Femto Cloud
provides a dynamic, self-configuring, and multi-device mobile cloud out of a cluster of mobile devices. The
architecture is designed to enable multiple mobile devices to be configured into a coordinated cloud
computing service. From the study on edge computing and its applications, it is seen that migration of
resources has provided application-aware provisioning in edge-based applications.
2.2. Fog Computing Review
Fog computing was first introduced by Cisco Systems, Inc., for wireless data transfer between
distributeddevices in an IoT network paradigm. Fog computing, or fog, is an architecture that uses one or
more collaborative end-user clients or near-user edge devices to carry out storage, communication, control,
configuration, measurement, and management. Many research papers consider fog and edge computing
complementary to one another. Similar to edge computing, fog computing is carried out closer to the end
user’s networks. It is also a virtualized platform located between end users and cloud data centres hosted on
the Internet. It enables computing at the edge of the network[17]. Edge routers are advertised for processor
Int J Elec & Comp Eng ISSN: 2088-8708 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis)
4649
speed, number of cores, and built-in network storage, and are used as fog servers. There is also a cellular base
station, and a Wi-Fi access point or femto cell router as a server. In fog computing, facilities or
infrastructures that can provide resources for services at the edge of the network are called “fog nodes.”
Figure 2 demonstrates a three-layer user/ fog/cloud network. Fog computing provides advantages in terms of
reduction in delay, power consumption, and reduces data traffic over the network.
Figure 2. Three-layer user/fog/cloud
2.2.1. Fog Computing Areas and Applications
Fog computing is used as open architectures for developing Smart living environments with
potentially thousands of vendors. The Open Fog Consortium [18] is a global system in collaboration with
ARM, Cisco, Dell, Intel, Microsoft, etc., to accelerate the adoption of fog computing and to build a common
reference architecture covering hardware and software platforms and highly sophisticated capabilities. The
fog network connects every component of the fog. Emerging techniques, such as software-defined
networking (SDN) and network function virtualization (NFV), are proposed to create flexible and easy to
maintain network environments.
The employment of SDN and NFV can ease the implementation and management, increase network
scalability, and reduce costs in many aspects of fog computing, such as resource allocation, VM migration,
traffic monitoring, application-aware control, and programmable interfaces[19]. Augmented reality and real-
time video analytics are one of the areas supported by fog computing, which can maximize throughput and
reduce latency in both processing and transmission for high stream video streaming processes. The Internet
of Things and Connected Smart devices have given way to fog computing principles, which has been used in
various domains, such as Vehicular networks, Body Area Networks (BAN), and the Smart Grid. Fog
computing allows for greater support and better response time to the Internet of things environment, it is
suitable for real-time service requests, and it shares resources efficiently [8].
2.3. Comparison between Fog and Edge Computing
Cloudlet is a resource-rich computer like “cloud in a box,” which is available for use by nearby
mobile devices. Bahl et. al. [20] built Cloudlet, ahead of fog computing, but now agree with the concept of
fog computing. In fog computing, infrastructures are provided as resources for services at the edge of the
network. They are called fog nodes, which are similar to cloudlets. They can be resource-poor devices, such
as set-top-boxes, access points, routers, switches, base stations, and end devices, or resource-rich machines
such as Cloudlet and IOx. This study reviews power consumption by cloud and fog resources.
Mathematically, it has been proven that by using fog resources, power consumption is minimum in different
applications. As fog computing is a relatively new concept in cloud computing, the presence of secure sand-
boxes for the implementation of fog applications brings about new challenges in terms of trust and privacy.
Fog are a type of mini-clouds in the network for increasing resource availability, thus by doing so, isolation
and sandboxing mechanisms must be in place to ensure bidirectional trust among cooperating parties.
Standardization mechanisms on the network should take place at the terminal and node end of fog networks.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653
4650
There is also a lack of central entity controlling the fog; hence, it is difficult to assert if a given device is
indeed hosting a component.
At the same time, there are many open-ended issues in edge computing where application
deployment strategies, edge node security, and failure recovery, are some of the issues that need further
research. As edge is in close proximity to end-users, it enables reduction of latency. It also provides radio
network capability, including access to network information and integration with operator network services.
These are some of the advantages of using edge computing. Table 1 presents a comparative study of fog and
edge cloud computing. In the next section a different perspective of distributed cloud computing, using
elastic execution mechanisms between devices and a cloud, is discussed. Further, a comparison on clone
cloud, fog, and edge computing is presented.
Table 1. Comparison between Fog and Edge Computing
Fog Computing Edge Computing
1. Deployed at the local premises of mobile users. Deployed as a traditional data centre with extended capabilities.
2.
Virtualized device with build-in data storage,
computing, and communication facility.
Uses an edge server similar to a traditional data centre server.
3. Can be adapted from existing system components. It is completely built as new system or a mini cloud data centre.
4.
Energy consumption of fog is less than cloud
services, but overhead is high compared to cloud.
Edge uses less resources than the cloud and initial overhead to
build is high compared to cloud
5. No central entity controlling the fog cloud.
Edge server using cloud technologies and virtualization used to
control edge components.
6.
May not be controlled by network operators, uses an
ad-hoc distribution.
Allows the mobile network operators to improve existing services
with edge.
3. CLONE CLOUD: ELASTIC EXECUTION MECHANISM IN THE CLOUD
The advantages of cloud computing are the services offered by cloud providers, i.e. Software-as-a-
Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). To address the inherent
problem of resource constraint in mobile devices, the concept of off-loading data and computation to cloud
service providers is used. Examples, such as crowd sourcing, image processing, use of GPS, and Internet data
happen outside the device using mobile cloud computing. Augmented Smartphone applications, with clone
cloud, address challenges in ways to off-load execution to the cloud infrastructure. Clone cloud technology
was introduced by Chun [21] for off-loading execution from the Smartphone to a computational
infrastructure hosting in the cloud of Smartphone clones. The idea was proposed on the simple concept that
allows Smartphones to host its expensive and exotic applications. The novelty of the approach is that replicas
are loosely synchronized and virtualized on emulated devices.
The framework is a cloud-based, fine-grained, thread-level, application partitioner, which clones the
entire mobile platform during runtime execution into the cloud Virtual Machine and runs the mobile
application inside the Virtual Machine, without performing any change in the application code. This
approach also replicates the whole Smartphone image, with few or no modifications, into powerful VM
replicas, thus transforming a single machine computation into a distributed computation semi-automatically.
The aim of off-loading is also to minimize the communication and execution cost between the mobile device
and its surrogates. Figure 3 shows a replica of a clone cloud-based architecture with a thread to distribute the
process execution.
Figure 3. Clone cloud-based architecture
Int J Elec & Comp Eng ISSN: 2088-8708 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis)
4651
3.1. Related Study on Clone Clouds
A study by Chang [22] performed a cost analysis by using different clone cloud resource allocation
strategies. The paper uses computer-intensive java applications for elastic execution mechanisms in the
cloud, and they are compared for remote processing speed, cost, and energy savings, along-side the
unmodified application. It also proved that comparisons of remote and local executions on netbooks and
laptops were reduced from 5% to 50%, as compared to fog and edge computing elastic executions, which
required reduced amounts of cloud services. Infrastructure development that is needed in fog and edge
computing is not required in clone clouds. Elastic executions offer more flexibility to developers and end-
users to choose cloud services at their preference. The advantages of using a clone cloud is that they late-bind
the decision to off-load executions to the cloud infrastructure, thus giving more autonomy to end-users.
Many frameworks are developed for off-loading computations on clone clouds, such as the one by
Bal [23], which provides a system to off-load mobile device applications. The application generates code
from the original application as a remote service, identical to the local one, where the remote versions are run
on a multi-core computer instance, and takes full advantage of parallelism. If remote resources are not
available (such as network connectivity), then the application can run on local resources entirely. The clone
cloud uses Virtual Machine migration to off-load part of their application workload to a resource-rich server
through either 3G or Wi-Fi.
The cost model analyses the cost of execution of the application on the device and the migration
cost. Virtual Migration reports provide an energy saving from 60% to 90% for different types of applications,
such as chess, games, and face recognition systems. There are also many other elastic platforms for code off-
load, such as a system level clone and delegated surrogates on the cloud. In all these mechanisms, the most
important requirement is the availability of network connectivity. The main idea of using a clone cloud is fast
execution and minimum cost of sending data to the cloud, thus significantly reducing the execution cost on
the device. There are methods to achieve this through analysis of constraints required to partition the
application and clone it in the cloud.
Before off-loading, a cost-benefit analysis should be done to evaluate the benefits of off-loading and
the potential gain, by evaluating the predicted cost of execution with user-specific requirements. The cost
analysis is determined by using a profiler to keep track of devices energy used, network characteristics, and
application characteristics. Based on the information from the profiler, the application decides whether to off-
load the application. Some applications do allow an optimizer to decide which methods are to be migrated so
that the cost of migration and execution is minimized [24]. Monitory cost is also one of the aspects to be
considered while migrating applications to the cloud. Clone cloud approaches have various ways of using
cloud resources to enhance the computing capabilities of mobile devices. It uses migration and re-integration
methods to split modules of application between cloud and clone. Therefore, the overall performance and
credibility of these augmentation approaches is highly dependent on the cloud-based resource characteristics.
Performance, availability, elasticity, vulnerability to security attacks, reliability, cost, and distance are major
characteristics to be considered by cloud service providers when augmenting[25]. Elastic execution strategies
use different approaches compared to fog and edge computing. The next section summarizes these different
cloud methodologies.
4. EVALUATION OF DIFFERENT CLOUD EXECUTION MODELS
From the studies presented, it is seen that all of these technology providers provide different types of
cloud services. The final benefits are for the end-user to use these services according to each user’s
requirements. Edge computing and fog computing are setup to limit the latency between cloud data centres
and end devices. All data centres are connected by Internet connections between users and cloud services,
which are long, thin, and susceptible to network failures. Internet access is provided by ISPs in different
regions. Urban areas have good access to cellular towers, because of the density of population and hence,
Internet connectivity is also available in these areas. However, there are reduced numbers of towers in rural
areas, therefore Internet access and access to cloud services is minimum. Thus, it can be argued that good
access to cellular towers gives good Internet connectivity, which in turn provides good access to cloud
providers. From a business perspective, the more data and computation obtained is of advantage, as data is
charged per minute to consumers. Hence, limited and adequate use of the Internet is beneficial to all. Clone
cloud-based, distributed execution strategies provide effective utilization of cloud resources from the
consumer’s perspective. Remote areas are further benefited by fog and edge computing due to limited
connectivity issues.
Thus, network proximity offers a number of advantages in terms of reduced number of hops, fast
responding cloud services, etc., in the cloud[26]. In urban areas, network proximity is good because of good
connectivity, while the counter is true in rural areas. Unlike the free surrogate resources, utilizing cloud
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653
4652
infrastructure levies financial charges to the end-users. Mobile users pay for consumed infrastructure
resources according to the SLAs negotiated with cloud vendors. In certain scenarios, users prefer local
execution or application termination because of the monetary cost of cloud infrastructures. However, user
payment is of advantage to cloud vendors so that they can maintain their services and deliver reliable, robust,
and secure services to the mobile users[27]. Thus, it can be concluded that in cities and industrial hubs, clone
cloud-based distributed cloud execution is beneficial, while small towns and villages should take advantages
of edge and fog computing. Table 2 provides the comparative study of all of the different cloud execution
mechanisms.
Table 2. Comparison between Fog, Edge, and Clone Cloud Models
5. CONCLUSION
This paper provides an overview of the recent developments in the area of cloud computing and
mobile cloud computing. The paper focuses on the recent concepts of fog, edge, and clone-based
computational off-loading services. Fog computing and edge computing are the latest in the development of
cloud services, by bringing the cloud services closer to the end-user thus, reducing time of execution on
cloud servers. These technologies are compared with existing technologies of clone cloud-based
computational off-loading mechanisms. Clone clouds are categorized into different types of augmentation
strategies, thus limiting the use of cloud resources. Altogether, these findings indicate there are advantages in
using clone cloud, fog, and edge computing-based approaches. It is evident from the study that areas of
utilization of cloud resources have an impact on services offered. The recent approaches of fog and edge
computing are suitable for users with limited connectivity issues, and clone clouds are suitable for optimal
use of cloud services.
ACKNOWLEDGEMENTS
I would like to thank all the unknown reviewers for the comments and suggestions.
REFERENCES
[1] “A Review on Efficient Virtual Machine Live Migration : Challenges , requirements and technology of VM ... A
Review on Efficient Virtual Machine Live Migration : Challenges , requirements and technology of VM migration
in cloud,” Ij-Closer, no. May, 2016.
[2] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., vol.
29, no. 1, pp. 84–106, 2013.
[3] Y. Beeharry, T. P. Fowdur, V. Hurbungs, V. Bassoo, and V. Ramnarain-Seetohul, “Analysing transportation data
with open source big data analytic tools,” Indones. J. Electr. Eng. Informatics, vol. 5, no. 2, pp. 174–184, 2017.
[4] P. Garcia Lopez et al., “Edge-centric Computing,” ACM SIGCOMM Comput. Commun. Rev., vol. 45, no. 5, pp.
37–42, 2015.
[5] Y. Yu, “Mobile Edge Computing Towards 5G : Vision , Recent Progress , and Open Challenges,” pp. 89–99.
[6] Y. Zhang, H. Liu, L. Jiao, and X. Fu, “To offload or not to offload: An efficient code partition algorithm for mobile
cloud computing,” 2012 1st IEEE Int. Conf. Cloud Networking, CLOUDNET 2012 - Proc., pp. 80–86, 2012.
[7] X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G. J. Ren, “Foggy clouds and cloudy fogs: A real
need for coordinated management of fog-to-cloud computing systems,” IEEE Wirel. Commun., vol. 23, no. 5, pp.
120–128, 2016.
[8] F. Ai-doghmant, Z. Chaczko, A. R. Ajayan, and R. Klempous, “A Review on Fog Computing Technology,” pp.
1525–1530, 2016.
Edge Computing Fog Computing Clone Cloud
1. Close to end-user. Close to end-user. Uses distributed mechanism to obtain
Cloud Services.
2. Latency benefit for users
away from data centres.
Latency benefit for users away
from data centres.
Latency benefit through adaptive
execution schemes in the cloud.
3. Has own security and load
balancing.
Limited security, distributed load
balancing.
Distributed load balancing and execution.
4. Forms a three-layer service
model.
Forms a three layer service
model
Forms a two-layer service model.
5. No cost analysis to transfer No cost analysis to transfer Overhead cost and analysis taken at the
time of offload.
6. Resource allocation done by
edge node.
Resource allocation done by fog
node.
Low cost for surrogate resources
utilization.
Int J Elec & Comp Eng ISSN: 2088-8708 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis)
4653
[9] B. Varghese, N. Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopoulos, “Challenges and Opportunities in
Edge Computing,” pp. 20–26, 2016.
[10] M. Ryden, K. Oh, A. Chandra, and J. Weissman, “Nebula : Distributed Edge Cloud for Data Intensive Computing.”
[11] H. Chang, A. Hari, S. Mukherjee, and T. V. Lakshman, “Bringing the cloud to the edge,” in 2014 IEEE Conference
on Computer Communications Workshops (INFOCOM WKSHPS), 2014, pp. 346–351.
[12] M. Satyanarayanan, “The Emergence of Edge Computing,” Computer (Long. Beach. Calif)., vol. 50, no. 1, pp. 30–
39, Jan. 2017.
[13] H. Li, G. Shou, Y. Hu, and Z. Guo, “Mobile edge computing: Progress and challenges,” Proc. - 2016 4th IEEE Int.
Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud 2016, pp. 83–84, 2016.
[14] C. Liu et al., “A New Deep Learning-based Food Recognition System for Dietary Assessment on An Edge
Computing Service Infrastructure,” vol. 1374, no. c, pp. 1–13, 2017.
[15] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, “Mobile Edge Computing Potential in Making Cities
Smarter,” IEEE Commun. Mag., vol. 55, no. 3, pp. 38–43, Mar. 2017.
[16] K. Habak, M. Ammar, K. A. Harras, and E. Zegura, “FemtoClouds : Leveraging Mobile Devices to Provide Cloud
Service at the Edge.”
[17] P. P, D. K. G., Y. P, M. Venkata Ganesh, and V. B, “Fog Computing: Issues, Challenges and Future Directions,”
Int. J. Electr. Comput. Eng., vol. 7, no. 6, p. 3669, 2017.
[18] T. Z. Bruce McMillin, “Fog Computing for Smart Living,” Computer (Long. Beach. Calif)., no. February, p. 2017,
2017.
[19] S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing : Concepts , Applications and Issues,” in Mobidata, 2015, pp.
37–42.
[20] M. Satyanarayanan, P. Bahl, R. Cáceres, and N. Davies, “The case for VM-based cloudlets in mobile computing,”
IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, 2009.
[21] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “CloneCloud,” in Proceedings of the sixth conference on
Computer systems - EuroSys ’11, 2011, p. 301.
[22] Y. Chang, S. Hung, N. J. C. Wang, and B. Lin, “CSR : a Cloud-assisted Speech Recognition Service for Personal
Mobile Device,” in 2011 International Conference on Parallel Processing, 2011, pp. 305–314.
[23] R. Kemp, N. Palmer, T. Kielmann, and H. Bal, “Cuckoo : a Computation Offloading Framework for Smartphones,”
in Second International ICST Conference,MobiCASE 2010.
[24] M. Shiraz, S. Abolfazli, Z. Sanaei, and A. Gani, “A study on virtual machine deployment for application
outsourcing in mobile cloud computing,” J. Supercomput., vol. 63, no. 3, pp. 946–964, 2013.
[25] J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi, “Journal of Network and Computer Applications
Application partitioning algorithms in mobile cloud computing : Taxonomy , review and future directions,” J.
Netw. Comput. Appl., vol. 48, pp. 99–117, 2015.
[26] H. J. La and S. D. Kim, “A taxonomy of offloading in mobile cloud computing,” Proc. - IEEE 7th Int. Conf. Serv.
Comput. Appl. SOCA 2014, pp. 147–153, 2014.
[27] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud-Based Augmentation for Mobile Devices:
Motivation, Taxonomies, and Open Challenges,” pp. 1–32, 2013.

More Related Content

What's hot

Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
IJERA Editor
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
IJECEIAES
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET Journal
 
A Cloud-based Online Access on Smart Energy Metering in the Philippines
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesA Cloud-based Online Access on Smart Energy Metering in the Philippines
A Cloud-based Online Access on Smart Energy Metering in the Philippines
IJAEMSJORNAL
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
dbpublications
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
IJCNC
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
Baden Hughes
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
Ashok Mannai
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
ANKIT KUMAR
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
IRJET Journal
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
AbdulMajidFarooqi
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
ijcsa
 
Gcc notes unit 1
Gcc notes unit 1Gcc notes unit 1
Gcc notes unit 1
haritha madala
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
Techglyphs
 

What's hot (20)

Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council5G Edge Computing Whitepaper, FCC Advisory Council
5G Edge Computing Whitepaper, FCC Advisory Council
 
A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC) A Comparative Study: Taxonomy of High Performance Computing (HPC)
A Comparative Study: Taxonomy of High Performance Computing (HPC)
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
A Cloud-based Online Access on Smart Energy Metering in the Philippines
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesA Cloud-based Online Access on Smart Energy Metering in the Philippines
A Cloud-based Online Access on Smart Energy Metering in the Philippines
 
Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions Fog Computing: Issues, Challenges and Future Directions
Fog Computing: Issues, Challenges and Future Directions
 
Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
Fog Computing – Enhancing the Maximum Energy Consumption of Data Servers.
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
Disambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities ResearchersDisambiguating Advanced Computing for Humanities Researchers
Disambiguating Advanced Computing for Humanities Researchers
 
GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
 
seminar on cloud computing report
seminar on cloud computing reportseminar on cloud computing report
seminar on cloud computing report
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
IRJET - Cloud Computing and IoT Convergence
IRJET -  	  Cloud Computing and IoT ConvergenceIRJET -  	  Cloud Computing and IoT Convergence
IRJET - Cloud Computing and IoT Convergence
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
Cloud versus cloud
Cloud versus cloudCloud versus cloud
Cloud versus cloud
 
Computation grid as a connected world
Computation grid as a connected worldComputation grid as a connected world
Computation grid as a connected world
 
Gcc notes unit 1
Gcc notes unit 1Gcc notes unit 1
Gcc notes unit 1
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
 

Similar to A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing

CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
IJCNCJournal
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
IJIR JOURNALS IJIRUSA
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
ijceronline
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
Rezgar Mohammad
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
HODCS6
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
IJECEIAES
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
IJCNCJournal
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
Souvik Pal
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
MeymunaMohammed1
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
ijccsa
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Fog computing
Fog computing Fog computing
Fog computing
Pachipulusu Giridhar
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
IRJET Journal
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
ijceronline
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
vijayalaxmipatil2002
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
Nitin Kumar Yadav
 

Similar to A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing (20)

CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
40120130405016
4012013040501640120130405016
40120130405016
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
Clarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answersClarifying fog computing and networking 10 questions and answers
Clarifying fog computing and networking 10 questions and answers
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
A Survey On Mobile Cloud Computing
A Survey On Mobile Cloud ComputingA Survey On Mobile Cloud Computing
A Survey On Mobile Cloud Computing
 
Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 

More from IJECEIAES

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
IJECEIAES
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
IJECEIAES
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
IJECEIAES
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
IJECEIAES
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
IJECEIAES
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
IJECEIAES
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
IJECEIAES
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
IJECEIAES
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
IJECEIAES
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
IJECEIAES
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 

More from IJECEIAES (20)

Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...Bibliometric analysis highlighting the role of women in addressing climate ch...
Bibliometric analysis highlighting the role of women in addressing climate ch...
 
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...Voltage and frequency control of microgrid in presence of micro-turbine inter...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
 
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...Enhancing battery system identification: nonlinear autoregressive modeling fo...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
 
Smart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a surveySmart grid deployment: from a bibliometric analysis to a survey
Smart grid deployment: from a bibliometric analysis to a survey
 
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...Use of analytical hierarchy process for selecting and prioritizing islanding ...
Use of analytical hierarchy process for selecting and prioritizing islanding ...
 
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
 
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 

A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 6, December 2018, pp. 4646~4653 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i6.pp4646-4653  4646 Journal homepage: http://iaescore.com/journals/index.php/IJECE A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing T. Francis Department of Computer Engineering, BITS Pilani University, India Article Info ABSTRACT Article history: Received Mar 27, 2018 Revised Jun 7, 2018 Accepted Sep 9, 2018 Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers. Keyword: Clone cloud Edge computing Elastic executions Fog computing IoT Mobile back-ends Mobile cloud computing Mobile off-loading mechanisms Virtualization Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: T. Francis, Department of Electrical and Computer Engineering, Department of Computer Engineering, BITS Pilani University, India. Email: tinajibu@gmail.com 1. INTRODUCTION Smart devices such as, Smart phones, tablets, PCs, Net-books, etc., are trending in the market today. These devices are compact and small, which make them handy for use. Being small, they have fewer resources than other systems. Cloud computing was used to address the drawbacks in these devices, such as lack of storage, computational power, and the limited battery life of Smart devices[1]. Mobile cloud computing is an interdisciplinary combination of cloud and mobile computing. Resource constraints in mobiles gave rise to the use of the cloud in mobiles, which was later known as Mobile Cloud computing or MCC [2]. It is also considered as an extension to cloud computing, but at the same time, it provides services to Smart devices. There are a number of limitations in using mobile cloud computing, as cloud data centers are often located at remote locations from the place of request. This makes it more susceptible to suffer from lag, network resilience, and link failures, thus, the objective of using mobile cloud computing fails because of these issues. Also the volume and speed of data in applications such as healthcare, manufacturing and traffic management is high hence big data analytics tools such as mahout, sparks etc are used.They process multiple data sources, distributed memory tasks and range of algorithms however it is still inclined to cloud data centres who provide and support their services [3]. Hence there is need to get the cloud closer to users. Edge, Fog, and Clone clouds try to address these issues and are differentiated from each other in terms of usage and build techniques. The most recent
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis) 4647 developments in cloud computing are fog and edge computing. It is necessary to make a comparison of these techniques to understand the advantages of using edge, fog, and clone cloud in different systems. Cloud-based applications use a central server to process data, which increases the communication between user devices. Hence, there is a need for looking beyond the cloud at the edge of cloud networks. The aim is to explore possibilities of performing computations at edge nodes. Edge Cloud augments traditional data centers consisting of cloud models, with service nodes placed at the network edges[4][5]. The proximity of edge nodes, allows data processing to and from remote clouds to be done at the edge. Computing on edge nodes closer to end-users can be exploited as a platform for application providers to improve their services. Similarly, clone clouds provide a distributed mechanism of application execution, in contrast to edge cloud. It automatically transforms mobile applications to benefit from the cloud [6]. This application is a flexible run-time execution partitioner, which transfers execution onto device clones running on the cloud. A clone allows for the dynamic execution of various applications by alternating between the clone and the device. In the same way, fog computing gives the user the option of performing cloud operations at locations closer to his or her point of interest. Fog computing is similar in many ways to cloud and edge computing. The huge influx of real-time data, and the need for processing the same, gave rise to the terminology of fog computing [7]. Fog nodes are heterogeneous devices, ranging from high-end servers, access points, set-top boxes, edge routers, etc., to end devices, such as mobile phones, smart watches, and sensors. It uses existing networks and routers in nearby locations to perform operations just like the cloud [8]. Fog computing also has a better response to the Internet of Things environment and is suitable for real-time service requests. The goal of this study is to understand the differences between these technologies by performing a comparative study of each of these approaches. Some of the application areas where they are useful are also discussed.The next section provides a survey on edge, fog, and the components of their builds that make them feasible for implementation. This study includes a comparative study on edge computing and fog computing, a discussion on the elastic execution mechanisms using clone cloud computing, and an inspection of off-loading mechanisms used in clones and the cost-benefit analysis to off-load. Additionally, a summary and comparative study on fog, edge, and clone cloud mechanisms is provided. 2. SURVEY ON EDGE COMPUTING AND FOG COMPUTING 2.1. Edge Computing Review It is known that cloud computing and mobile computing are used together to harness mobile back- ends to augment the resources for Smart devices. However, they suffer from lag, network resilience, and link failures. Edge computing is a terminology that is used to augment traditional data centres with service nodes at network edges. Mobile Edge Computing (MEC) [9] allows the use of cloud and IT services within close proximity of mobile subscribers, thus reducing the end-to-end latency. It is based on a decentralized model that interconnects a heterogeneous cloud and it is based on the following elements: a. Proximity: The possibility to use nodes that are nearer rather than farther away. b. Intelligence: Use of autonomous decision making to help in the miniaturization of systems. c. Control: Management and coordination comes from edge machines that assign or delegate computation [10]. Hence, based on these overall elements, edge computing delivers low-latency, bandwidth-efficiency, and resilient end-user services. Using this service, users receive latency benefits from those who are away from the data centres. Edge computing provides a traditional data centre with extended capabilities to deploy applications at the edge networks[11]. The proximity of users and low latency are significant advantages in times of network congestion. These features allow the mobile network operators, vendors, as well as application service providers, to improve existing services using edge computing, enabling significant value addition to the respective business models. Figure 1 shows edge centre architecture through LAN and WAN networks connected to the cloud data centre.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653 4648 Figure 1. Edge centre architecture in LAN/WAN network 2.1.1. Model of an Edge System Edge computing supports primitive virtualization instead of hypervisor-based hardware virtualization. In the paper by Satyanarayanan [12], edge computing is discussed as a new paradigm in which substantial computing and storage resources are done at micro data centres placed at the Internet’s edge in close proximity to mobile devices or sensors. The WiCloud architecture by Hongxing [13] consists of a layered architecture that includes a physical layer, virtual layer, and a function and service layer. The paper by Chang et al. [14] gives a general model of an edge cloud that can work with all types of edge services and also IoT platforms. 2.1.2. Applications Based on Edge Computing The Follow Me Edge (FME) architecture is an edge service architecture proposed by Dutta et al. [15], where the service continuously follows the user to the closest edge. Migration is done to ensure that no data is lost. To realize the FME architecture, the edge operator needs to keep updated information about resources and user locations. The SLA consists of an integrated architecture of edge operators, a shared storage concept, and service migration, which are enforced in the FME architecture. A framework for mobile edge computing to support diverse applications in a Smart city scenario, by reducing core network traffic through Smart MEC, is the overall idea. Another open sensor platform developed on the basis of edge computing is proposed in Waggle, a wireless program that uses sensors to measure air borne pollutants. It is an OpenStack-based, edge platform that consists of a node controller that manages a sensor data cache, reads simple sensor values, and manages the network stack and encryption. The edge computing for the sensor platform addresses resilience, performance, isolation, and data privacy. Nebula [10] is a dispersed cloud infrastructure that uses edge. It was developed by the University of Minnesota to support distributed data-intensive computing and for efficient movement and availability of large quantities of data to compute resources. It acts as a decentralized cloud, working at the edge of the network and helping with the devices lacking resources. Femto Cloud, discussed in work by Ammar et. Al. [16] are a collection of co-located devices used to provide a cloud service at the edge. The Femto Cloud provides a dynamic, self-configuring, and multi-device mobile cloud out of a cluster of mobile devices. The architecture is designed to enable multiple mobile devices to be configured into a coordinated cloud computing service. From the study on edge computing and its applications, it is seen that migration of resources has provided application-aware provisioning in edge-based applications. 2.2. Fog Computing Review Fog computing was first introduced by Cisco Systems, Inc., for wireless data transfer between distributeddevices in an IoT network paradigm. Fog computing, or fog, is an architecture that uses one or more collaborative end-user clients or near-user edge devices to carry out storage, communication, control, configuration, measurement, and management. Many research papers consider fog and edge computing complementary to one another. Similar to edge computing, fog computing is carried out closer to the end user’s networks. It is also a virtualized platform located between end users and cloud data centres hosted on the Internet. It enables computing at the edge of the network[17]. Edge routers are advertised for processor
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis) 4649 speed, number of cores, and built-in network storage, and are used as fog servers. There is also a cellular base station, and a Wi-Fi access point or femto cell router as a server. In fog computing, facilities or infrastructures that can provide resources for services at the edge of the network are called “fog nodes.” Figure 2 demonstrates a three-layer user/ fog/cloud network. Fog computing provides advantages in terms of reduction in delay, power consumption, and reduces data traffic over the network. Figure 2. Three-layer user/fog/cloud 2.2.1. Fog Computing Areas and Applications Fog computing is used as open architectures for developing Smart living environments with potentially thousands of vendors. The Open Fog Consortium [18] is a global system in collaboration with ARM, Cisco, Dell, Intel, Microsoft, etc., to accelerate the adoption of fog computing and to build a common reference architecture covering hardware and software platforms and highly sophisticated capabilities. The fog network connects every component of the fog. Emerging techniques, such as software-defined networking (SDN) and network function virtualization (NFV), are proposed to create flexible and easy to maintain network environments. The employment of SDN and NFV can ease the implementation and management, increase network scalability, and reduce costs in many aspects of fog computing, such as resource allocation, VM migration, traffic monitoring, application-aware control, and programmable interfaces[19]. Augmented reality and real- time video analytics are one of the areas supported by fog computing, which can maximize throughput and reduce latency in both processing and transmission for high stream video streaming processes. The Internet of Things and Connected Smart devices have given way to fog computing principles, which has been used in various domains, such as Vehicular networks, Body Area Networks (BAN), and the Smart Grid. Fog computing allows for greater support and better response time to the Internet of things environment, it is suitable for real-time service requests, and it shares resources efficiently [8]. 2.3. Comparison between Fog and Edge Computing Cloudlet is a resource-rich computer like “cloud in a box,” which is available for use by nearby mobile devices. Bahl et. al. [20] built Cloudlet, ahead of fog computing, but now agree with the concept of fog computing. In fog computing, infrastructures are provided as resources for services at the edge of the network. They are called fog nodes, which are similar to cloudlets. They can be resource-poor devices, such as set-top-boxes, access points, routers, switches, base stations, and end devices, or resource-rich machines such as Cloudlet and IOx. This study reviews power consumption by cloud and fog resources. Mathematically, it has been proven that by using fog resources, power consumption is minimum in different applications. As fog computing is a relatively new concept in cloud computing, the presence of secure sand- boxes for the implementation of fog applications brings about new challenges in terms of trust and privacy. Fog are a type of mini-clouds in the network for increasing resource availability, thus by doing so, isolation and sandboxing mechanisms must be in place to ensure bidirectional trust among cooperating parties. Standardization mechanisms on the network should take place at the terminal and node end of fog networks.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653 4650 There is also a lack of central entity controlling the fog; hence, it is difficult to assert if a given device is indeed hosting a component. At the same time, there are many open-ended issues in edge computing where application deployment strategies, edge node security, and failure recovery, are some of the issues that need further research. As edge is in close proximity to end-users, it enables reduction of latency. It also provides radio network capability, including access to network information and integration with operator network services. These are some of the advantages of using edge computing. Table 1 presents a comparative study of fog and edge cloud computing. In the next section a different perspective of distributed cloud computing, using elastic execution mechanisms between devices and a cloud, is discussed. Further, a comparison on clone cloud, fog, and edge computing is presented. Table 1. Comparison between Fog and Edge Computing Fog Computing Edge Computing 1. Deployed at the local premises of mobile users. Deployed as a traditional data centre with extended capabilities. 2. Virtualized device with build-in data storage, computing, and communication facility. Uses an edge server similar to a traditional data centre server. 3. Can be adapted from existing system components. It is completely built as new system or a mini cloud data centre. 4. Energy consumption of fog is less than cloud services, but overhead is high compared to cloud. Edge uses less resources than the cloud and initial overhead to build is high compared to cloud 5. No central entity controlling the fog cloud. Edge server using cloud technologies and virtualization used to control edge components. 6. May not be controlled by network operators, uses an ad-hoc distribution. Allows the mobile network operators to improve existing services with edge. 3. CLONE CLOUD: ELASTIC EXECUTION MECHANISM IN THE CLOUD The advantages of cloud computing are the services offered by cloud providers, i.e. Software-as-a- Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). To address the inherent problem of resource constraint in mobile devices, the concept of off-loading data and computation to cloud service providers is used. Examples, such as crowd sourcing, image processing, use of GPS, and Internet data happen outside the device using mobile cloud computing. Augmented Smartphone applications, with clone cloud, address challenges in ways to off-load execution to the cloud infrastructure. Clone cloud technology was introduced by Chun [21] for off-loading execution from the Smartphone to a computational infrastructure hosting in the cloud of Smartphone clones. The idea was proposed on the simple concept that allows Smartphones to host its expensive and exotic applications. The novelty of the approach is that replicas are loosely synchronized and virtualized on emulated devices. The framework is a cloud-based, fine-grained, thread-level, application partitioner, which clones the entire mobile platform during runtime execution into the cloud Virtual Machine and runs the mobile application inside the Virtual Machine, without performing any change in the application code. This approach also replicates the whole Smartphone image, with few or no modifications, into powerful VM replicas, thus transforming a single machine computation into a distributed computation semi-automatically. The aim of off-loading is also to minimize the communication and execution cost between the mobile device and its surrogates. Figure 3 shows a replica of a clone cloud-based architecture with a thread to distribute the process execution. Figure 3. Clone cloud-based architecture
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis) 4651 3.1. Related Study on Clone Clouds A study by Chang [22] performed a cost analysis by using different clone cloud resource allocation strategies. The paper uses computer-intensive java applications for elastic execution mechanisms in the cloud, and they are compared for remote processing speed, cost, and energy savings, along-side the unmodified application. It also proved that comparisons of remote and local executions on netbooks and laptops were reduced from 5% to 50%, as compared to fog and edge computing elastic executions, which required reduced amounts of cloud services. Infrastructure development that is needed in fog and edge computing is not required in clone clouds. Elastic executions offer more flexibility to developers and end- users to choose cloud services at their preference. The advantages of using a clone cloud is that they late-bind the decision to off-load executions to the cloud infrastructure, thus giving more autonomy to end-users. Many frameworks are developed for off-loading computations on clone clouds, such as the one by Bal [23], which provides a system to off-load mobile device applications. The application generates code from the original application as a remote service, identical to the local one, where the remote versions are run on a multi-core computer instance, and takes full advantage of parallelism. If remote resources are not available (such as network connectivity), then the application can run on local resources entirely. The clone cloud uses Virtual Machine migration to off-load part of their application workload to a resource-rich server through either 3G or Wi-Fi. The cost model analyses the cost of execution of the application on the device and the migration cost. Virtual Migration reports provide an energy saving from 60% to 90% for different types of applications, such as chess, games, and face recognition systems. There are also many other elastic platforms for code off- load, such as a system level clone and delegated surrogates on the cloud. In all these mechanisms, the most important requirement is the availability of network connectivity. The main idea of using a clone cloud is fast execution and minimum cost of sending data to the cloud, thus significantly reducing the execution cost on the device. There are methods to achieve this through analysis of constraints required to partition the application and clone it in the cloud. Before off-loading, a cost-benefit analysis should be done to evaluate the benefits of off-loading and the potential gain, by evaluating the predicted cost of execution with user-specific requirements. The cost analysis is determined by using a profiler to keep track of devices energy used, network characteristics, and application characteristics. Based on the information from the profiler, the application decides whether to off- load the application. Some applications do allow an optimizer to decide which methods are to be migrated so that the cost of migration and execution is minimized [24]. Monitory cost is also one of the aspects to be considered while migrating applications to the cloud. Clone cloud approaches have various ways of using cloud resources to enhance the computing capabilities of mobile devices. It uses migration and re-integration methods to split modules of application between cloud and clone. Therefore, the overall performance and credibility of these augmentation approaches is highly dependent on the cloud-based resource characteristics. Performance, availability, elasticity, vulnerability to security attacks, reliability, cost, and distance are major characteristics to be considered by cloud service providers when augmenting[25]. Elastic execution strategies use different approaches compared to fog and edge computing. The next section summarizes these different cloud methodologies. 4. EVALUATION OF DIFFERENT CLOUD EXECUTION MODELS From the studies presented, it is seen that all of these technology providers provide different types of cloud services. The final benefits are for the end-user to use these services according to each user’s requirements. Edge computing and fog computing are setup to limit the latency between cloud data centres and end devices. All data centres are connected by Internet connections between users and cloud services, which are long, thin, and susceptible to network failures. Internet access is provided by ISPs in different regions. Urban areas have good access to cellular towers, because of the density of population and hence, Internet connectivity is also available in these areas. However, there are reduced numbers of towers in rural areas, therefore Internet access and access to cloud services is minimum. Thus, it can be argued that good access to cellular towers gives good Internet connectivity, which in turn provides good access to cloud providers. From a business perspective, the more data and computation obtained is of advantage, as data is charged per minute to consumers. Hence, limited and adequate use of the Internet is beneficial to all. Clone cloud-based, distributed execution strategies provide effective utilization of cloud resources from the consumer’s perspective. Remote areas are further benefited by fog and edge computing due to limited connectivity issues. Thus, network proximity offers a number of advantages in terms of reduced number of hops, fast responding cloud services, etc., in the cloud[26]. In urban areas, network proximity is good because of good connectivity, while the counter is true in rural areas. Unlike the free surrogate resources, utilizing cloud
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 4646 - 4653 4652 infrastructure levies financial charges to the end-users. Mobile users pay for consumed infrastructure resources according to the SLAs negotiated with cloud vendors. In certain scenarios, users prefer local execution or application termination because of the monetary cost of cloud infrastructures. However, user payment is of advantage to cloud vendors so that they can maintain their services and deliver reliable, robust, and secure services to the mobile users[27]. Thus, it can be concluded that in cities and industrial hubs, clone cloud-based distributed cloud execution is beneficial, while small towns and villages should take advantages of edge and fog computing. Table 2 provides the comparative study of all of the different cloud execution mechanisms. Table 2. Comparison between Fog, Edge, and Clone Cloud Models 5. CONCLUSION This paper provides an overview of the recent developments in the area of cloud computing and mobile cloud computing. The paper focuses on the recent concepts of fog, edge, and clone-based computational off-loading services. Fog computing and edge computing are the latest in the development of cloud services, by bringing the cloud services closer to the end-user thus, reducing time of execution on cloud servers. These technologies are compared with existing technologies of clone cloud-based computational off-loading mechanisms. Clone clouds are categorized into different types of augmentation strategies, thus limiting the use of cloud resources. Altogether, these findings indicate there are advantages in using clone cloud, fog, and edge computing-based approaches. It is evident from the study that areas of utilization of cloud resources have an impact on services offered. The recent approaches of fog and edge computing are suitable for users with limited connectivity issues, and clone clouds are suitable for optimal use of cloud services. ACKNOWLEDGEMENTS I would like to thank all the unknown reviewers for the comments and suggestions. REFERENCES [1] “A Review on Efficient Virtual Machine Live Migration : Challenges , requirements and technology of VM ... A Review on Efficient Virtual Machine Live Migration : Challenges , requirements and technology of VM migration in cloud,” Ij-Closer, no. May, 2016. [2] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 84–106, 2013. [3] Y. Beeharry, T. P. Fowdur, V. Hurbungs, V. Bassoo, and V. Ramnarain-Seetohul, “Analysing transportation data with open source big data analytic tools,” Indones. J. Electr. Eng. Informatics, vol. 5, no. 2, pp. 174–184, 2017. [4] P. Garcia Lopez et al., “Edge-centric Computing,” ACM SIGCOMM Comput. Commun. Rev., vol. 45, no. 5, pp. 37–42, 2015. [5] Y. Yu, “Mobile Edge Computing Towards 5G : Vision , Recent Progress , and Open Challenges,” pp. 89–99. [6] Y. Zhang, H. Liu, L. Jiao, and X. Fu, “To offload or not to offload: An efficient code partition algorithm for mobile cloud computing,” 2012 1st IEEE Int. Conf. Cloud Networking, CLOUDNET 2012 - Proc., pp. 80–86, 2012. [7] X. Masip-Bruin, E. Marín-Tordera, G. Tashakor, A. Jukan, and G. J. Ren, “Foggy clouds and cloudy fogs: A real need for coordinated management of fog-to-cloud computing systems,” IEEE Wirel. Commun., vol. 23, no. 5, pp. 120–128, 2016. [8] F. Ai-doghmant, Z. Chaczko, A. R. Ajayan, and R. Klempous, “A Review on Fog Computing Technology,” pp. 1525–1530, 2016. Edge Computing Fog Computing Clone Cloud 1. Close to end-user. Close to end-user. Uses distributed mechanism to obtain Cloud Services. 2. Latency benefit for users away from data centres. Latency benefit for users away from data centres. Latency benefit through adaptive execution schemes in the cloud. 3. Has own security and load balancing. Limited security, distributed load balancing. Distributed load balancing and execution. 4. Forms a three-layer service model. Forms a three layer service model Forms a two-layer service model. 5. No cost analysis to transfer No cost analysis to transfer Overhead cost and analysis taken at the time of offload. 6. Resource allocation done by edge node. Resource allocation done by fog node. Low cost for surrogate resources utilization.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  A Comparison of Cloud Execution Mechanisms Fog, Edge, and … (T. Francis) 4653 [9] B. Varghese, N. Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopoulos, “Challenges and Opportunities in Edge Computing,” pp. 20–26, 2016. [10] M. Ryden, K. Oh, A. Chandra, and J. Weissman, “Nebula : Distributed Edge Cloud for Data Intensive Computing.” [11] H. Chang, A. Hari, S. Mukherjee, and T. V. Lakshman, “Bringing the cloud to the edge,” in 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2014, pp. 346–351. [12] M. Satyanarayanan, “The Emergence of Edge Computing,” Computer (Long. Beach. Calif)., vol. 50, no. 1, pp. 30– 39, Jan. 2017. [13] H. Li, G. Shou, Y. Hu, and Z. Guo, “Mobile edge computing: Progress and challenges,” Proc. - 2016 4th IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud 2016, pp. 83–84, 2016. [14] C. Liu et al., “A New Deep Learning-based Food Recognition System for Dietary Assessment on An Edge Computing Service Infrastructure,” vol. 1374, no. c, pp. 1–13, 2017. [15] T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, “Mobile Edge Computing Potential in Making Cities Smarter,” IEEE Commun. Mag., vol. 55, no. 3, pp. 38–43, Mar. 2017. [16] K. Habak, M. Ammar, K. A. Harras, and E. Zegura, “FemtoClouds : Leveraging Mobile Devices to Provide Cloud Service at the Edge.” [17] P. P, D. K. G., Y. P, M. Venkata Ganesh, and V. B, “Fog Computing: Issues, Challenges and Future Directions,” Int. J. Electr. Comput. Eng., vol. 7, no. 6, p. 3669, 2017. [18] T. Z. Bruce McMillin, “Fog Computing for Smart Living,” Computer (Long. Beach. Calif)., no. February, p. 2017, 2017. [19] S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing : Concepts , Applications and Issues,” in Mobidata, 2015, pp. 37–42. [20] M. Satyanarayanan, P. Bahl, R. Cáceres, and N. Davies, “The case for VM-based cloudlets in mobile computing,” IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, 2009. [21] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “CloneCloud,” in Proceedings of the sixth conference on Computer systems - EuroSys ’11, 2011, p. 301. [22] Y. Chang, S. Hung, N. J. C. Wang, and B. Lin, “CSR : a Cloud-assisted Speech Recognition Service for Personal Mobile Device,” in 2011 International Conference on Parallel Processing, 2011, pp. 305–314. [23] R. Kemp, N. Palmer, T. Kielmann, and H. Bal, “Cuckoo : a Computation Offloading Framework for Smartphones,” in Second International ICST Conference,MobiCASE 2010. [24] M. Shiraz, S. Abolfazli, Z. Sanaei, and A. Gani, “A study on virtual machine deployment for application outsourcing in mobile cloud computing,” J. Supercomput., vol. 63, no. 3, pp. 946–964, 2013. [25] J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi, “Journal of Network and Computer Applications Application partitioning algorithms in mobile cloud computing : Taxonomy , review and future directions,” J. Netw. Comput. Appl., vol. 48, pp. 99–117, 2015. [26] H. J. La and S. D. Kim, “A taxonomy of offloading in mobile cloud computing,” Proc. - IEEE 7th Int. Conf. Serv. Comput. Appl. SOCA 2014, pp. 147–153, 2014. [27] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya, “Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges,” pp. 1–32, 2013.