This document provides a survey of fog computing that discusses its key concepts, applications, and issues. It defines fog computing as a scenario that provides computation, storage, and networking services between end devices and cloud servers at the edge of the network. Representative applications of fog computing discussed include augmented reality, real-time video analytics, content delivery/caching, and mobile big data analytics. Potential issues covered include fog networking, quality of service concerns regarding connectivity, reliability, and capacity, and resource management challenges in dynamically provisioning and scheduling resources across fog nodes.
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Imagine yourself in the world where the users of the computer of today’s internet world don’t have to run, install or store their application or data on their own computers, imagine the world where every piece of your information or data would reside on the Cloud (Internet).
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
Security and Privacy Issues of Fog Computing: A SurveyHarshitParkar6677
Abstract. Fog computing is a promising computing paradigm that ex-
tends cloud computing to the edge of networks. Similar to cloud comput-
ing but with distinct characteristics, fog computing faces new security
and privacy challenges besides those inherited from cloud computing. In
this paper, we have surveyed these challenges and corresponding solu-
tions in a brief manner.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Imagine yourself in the world where the users of the computer of today’s internet world don’t have to run, install or store their application or data on their own computers, imagine the world where every piece of your information or data would reside on the Cloud (Internet).
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
Over the past decade cloud computing has interrupted nearly every part of IT. Sales, marketing, finance and support all of these applications are being reengineered to take advantage of cloud's instant access no download and pay as we go attributes. The term cloud computing is sometimes used to refer to a new paradigm some even speak of a new technology.
Fog computing has emerged as a new paradigm for architecting IoT applications that require greater scalability, performance and security. This talk will motivate the need to Fog Computing and explain what it is and how it differs from other initiatives in Telco such as Mobile/Multiple-Access Edge Computing.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods
go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a
developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Group seminar report on cloud computingSandhya Rathi
It is short and sobar.It contains information of
Architectural Considerations in that contains Cloud Platform, Cloud Storage, Cloud Services..... Types of Services is also contain in that
Software as a Service(SaaS) ,Platform as a Service(PaaS) , Infrastructure as a Service(IaaS)
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
Over the past decade cloud computing has interrupted nearly every part of IT. Sales, marketing, finance and support all of these applications are being reengineered to take advantage of cloud's instant access no download and pay as we go attributes. The term cloud computing is sometimes used to refer to a new paradigm some even speak of a new technology.
Fog computing has emerged as a new paradigm for architecting IoT applications that require greater scalability, performance and security. This talk will motivate the need to Fog Computing and explain what it is and how it differs from other initiatives in Telco such as Mobile/Multiple-Access Edge Computing.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods
go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a
developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
All the details of Fog Computing is discussed in this PPT, its better to get knowledge about this ppt,All the details of applications and examples are covered..
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them. Cloud computing is a hot topic all over the world nowadays, through which customers can access information and computer power via a web browser. As the adoption and deployment of cloud computing increase, it is critical to evaluate the performance of cloud environments. Currently, modeling and simulation technology has become a useful and powerful tool in cloud computing research community to deal with these issues. Cloud simulators are required for cloud system testing to decrease the complexity and separate quality concerns. Cloud computing means saving and accessing the data over the internet instead of local storage. In this paper, we have provided a short review on the types, models and architecture of the cloud environment.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
A survey of fog computing concepts applications and issues
1. A Survey of Fog Computing: Concepts, Applications and
Issues
Shanhe Yi, Cheng Li, Qun Li
Department of Computer Science
College of William and Mary
Williamsburg, VA, USA
{syi,cli04,liqun}@cs.wm.edu
ABSTRACT
Despite the increasing usage of cloud computing, there are
still issues unsolved due to the inherent problem of cloud
computing such as unreliable latency, lack of mobility sup-
port and location-awareness. Fog computing, also termed
edge computing, can address those problems by providing
elastic resources and services to end users at the edge of
network, while cloud computing are more about providing
resources distributed in the core network. This survey dis-
cusses the definition of fog computing and similar concepts,
introduces representative application scenarios, and identi-
fies various aspects of issues we may encounter when de-
signing and implementing fog computing systems. It also
highlights some opportunities and challenges, as direction
of potential future work, in related techniques that need to
be considered in the context of fog computing.
Categories and Subject Descriptors
A.1 [General Literature]: Introduction and Survey; C.2.4
[Computer-Communication Networks]: Distributed Sys-
tems—Cloud Computing
General Terms
Definition, Application, Performance, Design, Management
Keywords
fog computing; edge computing; mobile cloud computing;
mobile edge computing; cloud computing; review
1. INTRODUCTION
We are embracing the prevalence of ubiquitously connected
smart devices, which are now becoming the main factor of
computing. Along with the development of wearable com-
puting, smart metering, smart home/city, connected vehi-
cles and large-scale wireless sensor network, the Internet of
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from permissions@acm.org.
Mobidata’15, June 21, 2015, Hangzhou, China.
Copyright c 2015 ACM 978-1-4503-3524-9/15/06 ...$15.00.
DOI: http://dx.doi.org/10.1145/2757384.2757397.
Figure 1: IOx architecture [7]
Things (IoT) has received attentions for years and is consid-
ered as the future of Internet. IDC (International Data Cor-
poration) has predicted that in the year of 2015, “The IoT
will continue to rapidly expand the traditional IT industry”
up 14% from 2014 [14]. However, due to the limited compu-
tation/storage on smart devices, cloud computing is consid-
ered as a promising computing paradigm, which can provide
elastic resources to applications on those devices. In spite
of attempts of augmenting IoT applications with the power
of cloud, there are still problems unsolved in that IoT ap-
plications usually require mobility support, geo-distribution,
location-awareness and low latency.
Fog computing is proposed to enable computing directly at
the edge of the network, which can deliver new applications
and services especially for the future of Internet [3]. For
example, commercial edge routers are advertising processor
speed, number of cores and built-in network storage. Those
routers have the potential to become new servers. In fog
computing, facilities or infrastructures that can provide re-
sources for services at the edge of the network are called fog
nodes. They can be resource-poor devices such as set-top-
boxes, access points, routers [52], switches, base stations,
and end devices, or resource-rich machines such as Cloudlet
and IOx. Cloudlet is a resource-rich computer like “cloud in
a box”, which is available for use by nearby mobile devices.
Satyanarayanan et al. [41] build Cloudlet, which is ahead of
fog computing but coincides the concept of fog computing.
IOx is a fog device product from Cisco, whose architecture
is shown in Figure 1. “IOx works by hosting applications in
a Guest Operating System (GOS) running in a hypervisor
directly on the Connected Grid Router (CGR)” [7]. On IOx
platform, developers can run python scripts, compile their
own code, and even replace the operation system with their
own.
This paper presents a survey on fog computing focusing
on its concepts, applications and underlying issues one may
encounter in designing and implementing fog computing sys-
tem.
2. 2. OVERVIEW OF FOG COMPUTING
In this section, we will first review the definition of fog
computing and some similar concepts, and then present the
characterization of fog computing.
2.1 Definition of Fog Computing
In the perspective of Cisco, fog computing is considered as
an extension of the cloud computing paradigm from the core
of network to the edge of the network. It is a highly virtual-
ized platform that provides computation, storage, and net-
working services between end devices and traditional cloud
servers [3]. While in the flavor of work [47], fog computing
is defined as “a scenario where a huge number of heteroge-
neous (wireless and sometimes autonomous) ubiquitous and
decentralised devices communicate and potentially cooperate
among them and with the network to perform storage and
processing tasks without the intervention of third parties.
These tasks can be for supporting basic network functions or
new services and applications that run in a sandboxed en-
vironment. Users leasing part of their devices to host these
services get incentives for doing so.” Although this defi-
nition is still debatable, we strongly agree that we need a
definition to differ fog computing from related technologies
since anyone of those underlying techniques may offer us a
false view on fog computing.
Similar Concepts There are similar concepts such as
mobile cloud computing (MCC) and mobile-edge computing
(MEC) which have overlap with fog computing. MCC refers
to an infrastructure in which both the data storage and the
data processing happen outside of the mobile devices. Mo-
bile cloud applications move the computing power and data
storage from mobile phones to the cloud, providing applica-
tions and mobile computing to not only smartphone users
but also a much broader range of mobile subscriber [9]. MEC
can be seen as a cloud server running at the edge of a mobile
network and performing specific tasks that could not be ac-
complished with traditional network infrastructure[13]. Fog
computing seems like the combination of MCC and MEC,
while it distinguishes itself as a more promising and well
generalized computing paradigm in the context of Internet
of Things.
2.2 Applications Scenarios
F. Bonomi, et al. [3] highlight three scenarios in connected
vehicle, smart grid and wireless sensor and actuator net-
works (WSAN). I. Stojmenovic, et al [44, 45] elaborate pre-
vious scenarios and further expand this concept on smart
building and software-defined networking (SDN). We will
discuss three driving scenarios that will benefit from con-
cept of fog computing.
Augmented Reality (AR) and Real-time video an-
alytics Augment reality applications are popular on smart-
phone, tablet and smart glasses by overlaying an informative
view on the real world (viewed on the device display sys-
tem). Recent popular products or projects include Google
Glass, Sony SmartEyeglass and Microsoft HoloLens. AR ap-
plications usually need high computation power to process
video streaming and high bandwidth for data transmission.
For example, a normal AR application needs to process real
time video frame using computer vision algorithm and at
the same time process other inputs such as voice, sensor
and finally output timely informational content on displays.
However, human are very sensitive to delays in a series of
consecutive interactions. A processing delay of more than
tens of milliseconds will ruin the user experience and leads
to negative user feedback. AR system supported by fog
computing can maximize throughput and reduce latency in
both processing and transmission. K. Ha, et al. [16] design
and implement a wearable cognitive assistance spanning on
Google Glass and Cloudlet, which can offer the wearer hints
for social interaction via real-time scene analysis. The sys-
tem achieves tight end-to-end latency constraint by offload-
ing computation-intensive task to nearby Cloudlet. Network
failure and unavailability of distant Cloudlets are also con-
sidered and provided automatic degrade services.
Largely-deployed camera sensors in city or along the road
are important component of smart city and smart connected
vehicle to support surveillance, traffic management etc. Fog
computing can provide sufficient resource of computation
and storage to store captured video streams, transcode and
process video frame for tasks such as object recognition, ob-
ject tracking and data mining etc. After that we can just
send out notification, events, description or video summary
to end users, central servers or databases. With the help
of fog, we can achieve real-time processing and feedback of
high-volume video streaming and scalability of service on
low-bandwidth output data. Privacy-preserving techniques
can also be applied at the fog side, to ease the concern of
personal privacy leakage in public surveillance systems.
Content Delivery and Caching Traditional web con-
tent delivery technologies can not adapt to the requests from
user after the web performance is optimized at server side.
However some knowledge can only be known at the client
side or near the client’s network such as local network condi-
tions or traffic statistics, which can be leveraged to optimize
the web performance. J. Zhu, et al. consider web optimiza-
tion from this new perspective in the context of fog comput-
ing [58]. The fog server can provide dynamic customizable
optimization based on client devices and local network con-
ditions. And since fog server is in client’s vicinity, it can
gather client side knowledge and user experience, to opti-
mize the rendering of web page. Similarly, caching technique
can be better implemented within the fog nodes to further
save the bandwidth and reduce latency for content delivery.
Mobile Big Data Analytics Big data processing is a
hot topic for big data architecture in the cloud and mobile
cloud [55, 38]. Fog computing can provide elastic resources
to large scale data process system without suffering from
the drawback of cloud, high latency. In cloud computing
paradigm, event or data will be transmitted to the data
center inside core network and result will be sent back to
end user after a series of processing. A federation of fog and
cloud can handle the big data acquisition, aggregation and
preprocessing, reducing the data transportation and storage,
balancing computation power on data processing. For exam-
ple, in a large scale environment monitoring system, local
and regional data can be aggregated and mined at fog nodes
providing timely feedback especially for emergency case such
as toxic pollution alert. While detailed and thorough analy-
sis as computational-intensive tasks can be scheduled in the
cloud side. We believe data processing in the fog will be
the key technique to tackle analytics on large scale of data
generated by applications of IoT.
3. ISSUES
3. In this section, we will identify and discuss potential issues
in the context of fog computing. Some of them would be the
direction of future work.
3.1 Fog networking
Due to located at the edge of Internet, fog network is
heterogeneous. The duty of fog network is to connect ev-
ery component of the fog. However, managing such a net-
work, maintaining connectivity and providing services upon
that, especially in the scenarios of the Internet of Things
(IoT) at large scale, is not easy. Emerging techniques, such
as software-defined networking (SDN) and network function
virtualization (NFV), are proposed to create flexible and
easy maintaining network environment. The employment
of SDN and NFV can ease the implementation and manage-
ment, increase network scalability and reduce costs, in many
aspects of fog computing, such as resource allocation, VM
migration, traffic monitoring, application-aware control and
programmable interfaces.
SDN “When SDN concept is implemented with physically
(not just logically) centralized control, it resembles the fog
computing concepts, with fog device acting as the centralized
controller.” [44]. In the fog, each node should be able to
act as a router for nearby nodes and resilient to node mo-
bility and churn, which means controller can also be put
on the end nodes in fog network. The challenges of inte-
grating SDN into fog network is to accommodate dynamic
conditions as mobility and unreliable wireless link. The clos-
est work [27] proposes several designs for SDN-based mo-
bile cloud architectures for mobile/vehicular ad hoc network
(MANET/VANET), and shows the feasibility by achieving
high packet delivery ratio with acceptable overhead. The
proposed SDN-based frequency selection architecture adapts
the changes from wired ports to heterogeneous wireless inter-
faces, to support applications such as wireless network vir-
tualization, privilege traffic reservation, and frequency hop-
ping communication. There are other interesting questions
like how to deal with node churn, updating, predicting and
maintaining the connectivity graph of network in different
granularity; how to cooperate different controllers such as
constantly connected controller (at the edge infrastructures)
or intermittently connected controller (at the end devices)
and where to place controllers in fog network [21]; how to
design distributed SDN system that meet the harsh require-
ment of fog computing such as latency, scalability and mo-
bility.
NFV NFV replaces the network functions with virtual
machine instances. Since the key enabler of fog computing
is virtualization and those VMs can be dynamically created,
destroyed and offloaded, NFV will benefit fog computing in
many aspects by virtualizing gateways, switches, load bal-
ancers, firewalls and intrusion detection devices and placing
those instances on fog nodes. NFV, however, is not studied
in the context of fog computing yet. In cellular core network,
work [2] proposes function placement problem of virtual-
ized gateway and SDN-decomposed gateway, minimizing the
network overhead against constraints in data-plane latency,
data center utilization and control-plane overhead. Several
NFV researches are about how to design high-performance,
virtualized software middlebox platform [24, 32]. For NFV
in fog computing, the performance of virtualized network ap-
pliances is still the first concern [17]. This problem has two
aspects: one is the throughput or latency of virtualized net-
work appliances (middlebox) in fog network, and the other
is how to achieve efficient instantiation, placement and mi-
gration of virtual appliances in a dynamic network , together
to meet low latency and high throughput requirements.
3.2 Quality of Service (QoS)
QoS is an important metric for fog service and can be
divided into four aspects, 1) connectivity, 2) reliability, 3)
capacity, and 4) delay.
Connectivity In a heterogeneous fog network, network
relaying, partitioning and clustering provide new opportu-
nities for reducing cost, trimming data and expanding con-
nectivity. For example, an ad-hoc wireless sensor network
can be partitioned into several clusters due to the coverage of
rich-resource fog nodes (cloudlet, sink node, powerful smart-
phone, etc.). Work [53] proposes an online AP association
strategy that not only achieves a minimal throughput, but
efficiency in computational overhead. Similarly, the selec-
tion of fog node from end user will heavily impact the per-
formance. We can dynamically select a subset of fog nodes
as relay nodes for optimization goals of maximal availability
of fog services for a certain area or a single user, with con-
straints such as delay, throughput, connectivity, and energy
consumption.
Reliability Madsen et al. review the reliability require-
ment of clustering computing, grid computing, cloud and
sensor network towards a discussion of reliability of fog com-
puting [30]. Normally, reliability can be improved through
periodical check-pointing to resume after failure, reschedul-
ing of failed tasks or replication to exploit executing in par-
allel. But checkpointing and rescheduling may not suit the
highly dynamic fog computing environment since there will
be latency, and cannot adapt to changes. Replication seems
more promising but it relies on multiple fog nodes to work
together.
Capacity Capacity has two folds: 1) network bandwidth,
2) storage capacity. In order to achieve high bandwidth and
efficient storage utilization, it is important to investigate
how data are placed in fog network since data locality for
computation is very important. There are similar works in
the context of cloud [1], and sensor network [42]. However,
this problem faces new challenges in fog computing. For ex-
ample, a fog node may need to compute on data that is dis-
tributed in several nearby nodes. The computation cannot
start before the finish of data aggregation, which definitely
adds delay to services. To solve this, we may leverage user
mobility pattern and service request pattern to place data on
suitable fog nodes to either minimize the cost of operation,
the latency or to maximize the throughput. Data placement
in federation of fog and cloud also needs critical thinking.
The challenges come from how to design interplay between
fog and cloud to accommodate different workloads. Due to
the dynamic data placement and large overall capacity vol-
ume in fog computing, we may also need to redesign search
engine which can process search query of content scattered
in fog nodes [49, 50]. It is also very interesting to redesign
cache on fog node to exploit temporal locality and broader
coverage to save network bandwidth and reduce delay, while
there is existing work of cache on end device [57] and cache
on edge router [51].
Delay Latency-sensitive applications, such as streaming
mining or complex event processing, are typical applica-
tions which need fog computing to provide real-time stream-
4. ing processing rather than batch processing. K. Hong, et
al. [23] propose a fog-based opportunistic spatio-temporal
event processing system to meet the latency requirement.
Their system predicts future query region for moving con-
sumers and starts the event processing early to make timely
information available when consumers reaches the future lo-
cations. Work [36] proposes RECEP, which exploits over-
lapping interests in data and acceptable inaccurate results
to reuse computation and reduce resource requirement. RE-
CEP increases the scalability and amortizes the delay of mo-
bile CEP systems.
3.3 Interfacing and programming model
In order to ease the effort for developers to port their
applications to fog computing platform, we need unified
interfacing and programming model. The reasons are 1)
application-centric computing will be an important fog com-
putation model, in which components in the environment
will be application-aware and allow suitable optimizations
for different kinds of applications; 2) it is hard for developer
to orchestrate dynamic, hierarchical, and heterogeneous re-
sources to build compatible applications on diverse plat-
forms. Hong et al. [22] propose a high-level programming
model for future Internet applications with on-demand scal-
ing, which are large-scale geospatially distributed and la-
tency sensitive. However, their scheme is dedicated on a
tree-based network hierarchy in which fog nodes have fixed
locations. Therefore, we may need more general schemes for
diverse networks where fog nodes are nodes with dynamic
mobility.
3.4 Computation Offloading
Computation offloading can overcome the resource con-
straints on mobile devices since some computation-intensive
tasks can benefit from offloading in performance of applica-
tions, saving storage and battery lifetime. Existing work of
computation offloading for mobile cloud computing can be
classified into six metrics: objectives, granularity, scheme,
adaptation, distributed execution and communication [12].
While there are plenty of search in computation offloading in
the context of cloud computing and mobile computing [41, 8,
6, 26], we review a few of them in this paper. MAUI [8] pro-
pose code offloading and profile offloaded method to make
decisions on future invocations adapting to the change of
network connectivity, bandwidth and latency. It requires
the developers to manually annotate methods that can be
offloaded. CloudCloud [6] use static code analyzer to au-
tomatically mark possible migrate/merge point in program
bytecode. ThinkAir [26] moves on to elasticity and scalabil-
ity of the cloud and enhances the power of mobile cloud com-
puting by parallelizing method execution using multiple vir-
tual machine (VM) images. COMET [15] leverages the dis-
tributed shared memory and VM synchronization primitives
to augment smartphones or tablets with machines available
in the network.
The main challenges in offloading in fog computing are
how to deal with dynamic. The dynamic has three fold 1)
radio/wireless network access is highly dynamic 2) nodes in
the fog network are highly dynamic 3) resources in the fog
are highly dynamic. The federation of fog and cloud ac-
tually present us a three-layering construction: device-fog-
cloud. Computation offloading in such infrastructure faces
new challenges and opportunities. There are questions such
as which granularity to choose for offloading at different hi-
erarchy of fog and cloud; how to dynamically partition ap-
plication to offload on fog and cloud; and how to make of-
floading decisions to adapt dynamic changes in network, fog
devices, and resources etc.
3.5 Accounting, billing and monitoring
Fog computing cannot be prosperous without a sustain-
able business model. According to current researches and
proposals, the fog computing providers can consist of the
following parties: 1) Internet service providers or wireless
carriers, who can construct fog at their infrastructures. 2)
Cloud service providers, who want to expand their cloud ser-
vice to the edge of the network. 3) End users, who want to
trade their spare computation, storage of their local private
cloud to reduce the cost of ownership. Therefore, in order
to do “Pay-as-you-go”, we need to resolve many issues. For
example in terms of billing, we need to figure out how to set
the price for different resources and how to set the fraction
of the payment goes to different parties of fog. To enforce
those pricing policies, we need accounting and monitoring
the fog in different granularity. It is also interesting that
how we dynamically do pricing in fog computing services to
maximize revenue and utilization, just like what traditional
industrialise do in airline ticketing, car rental and hotels [25,
54].
User Incentives An interesting business model to accel-
erate the deployment of fog computing is “Join Fog com-
puting with private local cloud at the edge”. Local private
clouds are also deployed at the edge of Internet, with compu-
tation and storage capacity. Though private cloud is aiming
at provide cloud service to private party only. From the tech-
nique perspective of cloud computing and virtualization, it
is possible to lease spare computation and storage to fog ser-
vice provider and they will pay the owner of private cloud
to reduce cost.
3.6 Provisioning and resource management
Cloud provisioning and resource management are still in-
teresting topics in fog computing environment.
Application-aware provisioning The challenges lie in
the mobility of end node since metrics such as bandwidth,
storage, computation and latency will be changed dynami-
cally. For example, in a connected vehicle scenario, we can
track an in-duty ambulance and tune smart traffic light to
ensure green traffic wave and give warning to all the nearby
vehicles to clear the road. In order to meet the QoS re-
quirement such as delay, we need to do provisioning in or-
der to prepare resources to provide service mobility. Work
[37] proposes MigCEP, a placement and migration method
for both fog and cloud resources. By planning operator
migration ahead, it ensures end-to-end latency restrictions
and reduce network utilization. We feel like with Inter-
net of Things, fog computing will play an important role
in mobile crowd-sourcing/sensing applications by providing
application-aware provisioning.
Resource discovery and sharing Resource discovery
and sharing is critical for application performance in fog.
Work [28] propose method dynamically select centralized
and flooding strategies to save energy in heterogeneous net-
works, while there are more constraints to take into consider-
ation in fog computing, such as latency, density and mobility.
N. Takayuki, et al. propose a framework for heterogeneous
5. resource sharing in fog computing [34] by mapping heteroge-
neous resources such as CPUs, communication bandwidth,
and storage all to“time”resources. The resource sharing op-
timization problems can be formulated for maximizing the
sum or product of service-oriented utility functions. How-
ever, the utility function is only about service latency which
can be further expanded to include metrics such as service
availability, energy consumption or even revenue.
3.7 Security and Privacy
Currently, there are few works focusing on security or pri-
vacy issues in fog computing. However, some topics have
been studied extensively in the context of virtual machine
and hypervisor [20], and cloud computing [46].
Authentication As the emergence of biometric authen-
tication, such as fingerprint authentication, face authentica-
tion, touch-based or keystroke-based authentication etc, in
mobile computing and cloud computing, applying biometric-
based authentication in fog computing will be beneficial. I.
Stojmenovic, et al [45] consider the main security issue of
fog computing as the authentication at different levels of fog
nodes. While public key infrastructure (PKI) based tech-
nique could solve this problem, we think trusted execution
environment (TEE) technique may have its potential in fog
computing [5, 31]. We may also leverage measurement-based
method to filter fake or unqualified fog node that is not in
end users’ vicinity to reduce the authentication cost [18, 19].
Access control Access control has been a reliable tool on
smart devices [43], and cloud [56], ensuring the security of
the system. To expand access control of data owner into the
cloud, S. Yu, et al. [56] achieve this by exploiting techniques
of several encryption schemes together to build an efficient
fine-grained data access control in the context of Cloud Com-
puting. Work [10] proposes a policy-based resource access
control in fog computing, to support secure collaboration
and interoperability between heterogeneous resources. In
fog computing, we can also raise questions like how to de-
sign access control spanning client-fog-cloud, to meet the
goals and resource constraints at different levels.
Intrusion detection Intrusion detection techniques have
been applied to cloud infrastructures to mitigate attacks
such as insider attack, flooding attack, port scanning, at-
tacks on VM or hypervisor [33]. Those intrusion detection
systems can be deployed on either host machine, VM and
hypervisor to detect intrusive behavior by monitoring and
analyzing log file, access control policies and user login in-
formation. They can also be deployed at network side to
detect malicious activities such as denial-of-service (DoS),
port scanning etc. In fog computing, it provides new op-
portunities to investigate how fog computing can help with
intrusion detection on both client side and the centralized
cloud side. There are challenges such as implementing intru-
sion detection in geo-distributed, large-scale, high mobility
fog computing environment.
Privacy Users are concerned about the risk of privacy
leakage (data, location or usage) on the Internet nowadays.
Privacy-preserving techniques have been proposed in many
scenarios including cloud [48, 4], smart grid [40], wireless
network [39] , and online social network [35]. In the fog
network, privacy-preserving algorithms can be run in be-
tween the fog and cloud since computation and storage are
sufficient for both sides while those algorithms are usually
resource-prohibited at the end devices. Fog node at the edge
usually collects data generated by sensor and end devices.
Techniques such as homomorphic encryption can be utilized
to allow privacy-preserving aggregation at the local gate-
ways without decryption [29]. For aggregation and statisti-
cal queries, differential privacy [11] can be applied to ensure
non-disclosure of privacy of an arbitrary single entry in the
data set.
4. CONCLUSION
This survey discusses definitions of fog computing with
similar concepts, gives representative applications which will
promote fog computing, and mentions various aspects of is-
sues we may encounter when design and implement fog com-
puting systems. Besides, new opportunities and challenges
in fog computing for related techniques are discussed and is-
sues related to QoS, interfacing, resource management, secu-
rity and privacy are highlighted. Fog computing will evolve
with the rapid development in underlying IoT, edge devices,
radio access techniques, SDN, NFV, VM and Mobile cloud.
We think fog computing is promising but currently need
joint efforts from underlying techniques to converged at “fog
computing”.
5. ACKNOWLEDGMENTS
This work was supported in part by US National Science
Foundation grants CNS-1320453 and CNS-1117412.
6. REFERENCES
[1] S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman,
and H. Bhogan. Volley: Automated data placement for
geo-distributed cloud services. In NSDI, 2010.
[2] A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and
K. Hoffmann. Applying nfv and sdn to lte mobile core
gateways, the functions placement problem. In workshop on
All things cellular. ACM, 2014.
[3] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog
computing and its role in the internet of things. In
workshop on Mobile cloud computing. ACM, 2012.
[4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou.
Privacy-preserving multi-keyword ranked search over
encrypted cloud data. TPDS, 2014.
[5] C. Chen, H. Raj, S. Saroiu, and A. Wolman. ctpm: a cloud
tpm for cross-device trusted applications. In NSDI, 2014.
[6] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti.
Clonecloud: elastic execution between mobile device and
cloud. In Eurosys. ACM, 2011.
[7] Cisco. Iox overview. http://goo.gl/n2mfiw, 2014.
[8] E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman,
S. Saroiu, R. Chandra, and P. Bahl. Maui: making
smartphones last longer with code offload. In Mobisys.
ACM, 2010.
[9] H. T. Dinh, C. Lee, D. Niyato, and P. Wang. A survey of
mobile cloud computing: architecture, applications, and
approaches. WCMC, 2013.
[10] C. Dsouza, G.-J. Ahn, and M. Taguinod. Policy-driven
security management for fog computing: Preliminary
framework and a case study. In IRI. IEEE, 2014.
[11] C. Dwork. Differential privacy. In Encyclopedia of
Cryptography and Security. 2011.
[12] N. I. M. Enzai and M. Tang. A taxonomy of computation
offloading in mobile cloud computing. In MobileCloud.
IEEE, 2014.
[13] ETSI. Mobile-edge computing. http://goo.gl/7NwTLE,
2014.
[14] Gil Press. Idc: Top 10 technology predictions for 2015.
http://goo.gl/zFujnE, 2014.
6. [15] M. S. Gordon, D. A. Jamshidi, S. A. Mahlke, Z. M. Mao,
and X. Chen. Comet: Code offload by migrating execution
transparently. In OSDI, 2012.
[16] K. Ha, Z. Chen, W. Hu, W. Richter, P. Pillai, and
M. Satyanarayanan. Towards wearable cognitive assistance.
In Mobisys. ACM, 2014.
[17] B. Han, V. Gopalakrishnan, L. Ji, and S. Lee. Network
function virtualization: Challenges and opportunities for
innovations. Communications Magazine, IEEE, 2015.
[18] H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A
measurement based rogue ap detection scheme. In
INFOCOM. IEEE, 2009.
[19] H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu. A
timing-based scheme for rogue ap detection. TPDS, 2011.
[20] Z. Hao, Y. Tang, Y. Zhang, E. Novak, N. Carter, and
Q. Li. SMOC: a secure mobile cloud computing platform.
In INFOCOM, 2015.
[21] B. Heller, R. Sherwood, and N. McKeown. The controller
placement problem. In HotSDN. ACM, 2012.
[22] K. Hong, D. Lillethun, U. Ramachandran, B. Ottenw¨alder,
and B. Koldehofe. Mobile fog: A programming model for
large-scale applications on the internet of things. In ACM
SIGCOMM workshop on Mobile cloud computing, 2013.
[23] K. Hong, D. Lillethun, U. Ramachandran, B. Ottenw¨alder,
and B. Koldehofe. Opportunistic spatio-temporal event
processing for mobile situation awareness. In DEBS. ACM,
2013.
[24] J. Hwang, K. Ramakrishnan, and T. Wood. Netvm: high
performance and flexible networking using virtualization on
commodity platforms. In NSDI. ACM, 2014.
[25] V. Kantere, D. Dash, G. Francois, S. Kyriakopoulou, and
A. Ailamaki. Optimal service pricing for a cloud cache.
TKDE, 2011.
[26] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and X. Zhang.
Thinkair: Dynamic resource allocation and parallel
execution in the cloud for mobile code offloading. In
INFOCOM. IEEE, 2012.
[27] I. Ku, Y. Lu, and M. Gerla. Software-defined mobile cloud:
Architecture, services and use cases. In IWCMC. IEEE,
2014.
[28] W. Liu, T. Nishio, R. Shinkuma, and T. Takahashi.
Adaptive resource discovery in mobile cloud computing.
Computer Communications, 2014.
[29] R. Lu, X. Liang, X. Li, X. Lin, and X. Shen. Eppa: An
efficient and privacy-preserving aggregation scheme for
secure smart grid communications. TPDS, 2012.
[30] H. Madsen, G. Albeanu, B. Burtschy, and
F. Popentiu-Vladicescu. Reliability in the utility computing
era: Towards reliable fog computing. In IWSSIP. IEEE.
[31] C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and
S. C¨E ˘Gapkun. Smartphones as practical and secure
location verification tokens for payments. In NDSS, 2014.
[32] J. Martins, M. Ahmed, C. Raiciu, V. Olteanu, M. Honda,
R. Bifulco, and F. Huici. Clickos and the art of network
function virtualization. In NSDI. ACM, 2014.
[33] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and
M. Rajarajan. A survey of intrusion detection techniques in
cloud. JNCA, 2013.
[34] T. Nishio, R. Shinkuma, T. Takahashi, and N. B.
Mandayam. Service-oriented heterogeneous resource sharing
for optimizing service latency in mobile cloud. In workshop
on Mobile cloud computing & networking. ACM, 2013.
[35] E. Novak and Q. Li. Near-pri: Private, proximity based
location sharing. In INFOCOM. IEEE, 2014.
[36] B. Ottenw¨alder, B. Koldehofe, K. Rothermel, K. Hong, and
U. Ramachandran. Recep: selection-based reuse for
distributed complex event processing. In DEBS. ACM,
2014.
[37] B. Ottenw¨alder, B. Koldehofe, K. Rothermel, and
U. Ramachandran. Migcep: operator migration for mobility
driven distributed complex event processing. In DEBS.
ACM, 2013.
[38] Z. Qian, Y. He, C. Su, Z. Wu, H. Zhu, T. Zhang, L. Zhou,
Y. Yu, and Z. Zhang. Timestream: Reliable stream
computation in the cloud. In Eurosys. ACM, 2013.
[39] Z. Qin, S. Yi, Q. Li, and D. Zamkov. Preserving secondary
users’ privacy in cognitive radio networks. In INFOCOM,
2014 Proceedings IEEE, pages 772–780. IEEE, 2014.
[40] A. Rial and G. Danezis. Privacy-preserving smart metering.
In Proceedings of the 10th annual ACM workshop on
Privacy in the electronic society, 2011.
[41] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies.
The case for vm-based cloudlets in mobile computing.
Pervasive Computing, 2009.
[42] B. Sheng, Q. Li, and W. Mao. Data storage placement in
sensor networks. In Mobihoc. ACM, 2006.
[43] S. Smalley and R. Craig. Security enhanced (se) android:
Bringing flexible mac to android. In NDSS, 2013.
[44] I. Stojmenovic. Fog computing: A cloud to the ground
support for smart things and machine-to-machine networks.
In ATNAC. IEEE, 2014.
[45] I. Stojmenovic and S. Wen. The fog computing paradigm:
Scenarios and security issues. In Computer Science and
Information Systems (FedCSIS), 2014 Federated
Conference on, 2014.
[46] H. Takabi, J. B. Joshi, and G.-J. Ahn. Security and privacy
challenges in cloud computing environments. IEEE Security
and Privacy, 2010.
[47] L. M. Vaquero and L. Rodero-Merino. Finding your way in
the fog: Towards a comprehensive definition of fog
computing. ACM SIGCOMM Computer Communication
Review, 2014.
[48] C. Wang, Q. Wang, K. Ren, and W. Lou.
Privacy-preserving public auditing for data storage security
in cloud computing. In INFOCOM, 2010 Proceedings
IEEE, pages 1–9. Ieee, 2010.
[49] H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine
for the physical world. In INFOCOM. IEEE, 2008.
[50] H. Wang, C. C. Tan, and Q. Li. Snoogle: A search engine
for pervasive environments. TPDS, 2010.
[51] X. Wang, M. Chen, T. Taleb, A. Ksentini, and V. Leung.
Cache in the air: exploiting content caching and delivery
techniques for 5g systems. Communications Magazine,
IEEE, 2014.
[52] D. F. Willis, A. Dasgupta, and S. Banerjee. Paradrop: a
multi-tenant platform for dynamically installed third party
services on home gateways. In SIGCOMM workshop on
Distributed cloud computing. ACM, 2014.
[53] F. Xu, C. C. Tan, Q. Li, G. Yan, and J. Wu. Designing a
practical access point association protocol. In INFOCOM.
IEEE, 2010.
[54] H. Xu and B. Li. Dynamic cloud pricing for revenue
maximization. Cloud Computing, IEEE Transactions on,
2013.
[55] L. Yang, J. Cao, Y. Yuan, T. Li, A. Han, and A. Chan. A
framework for partitioning and execution of data stream
applications in mobile cloud computing. ACM
SIGMETRICS Performance Evaluation Review, 2013.
[56] S. Yu, C. Wang, K. Ren, and W. Lou. Achieving secure,
scalable, and fine-grained data access control in cloud
computing. In INFOCOM, 2010.
[57] Y. Zhang, C. Tan, and Q. Li. Cachekeeper: a system-wide
web caching service for smartphones. In Ubicomp. ACM,
2013.
[58] J. Zhu, D. S. Chan, M. S. Prabhu, P. Natarajan, H. Hu,
and F. Bonomi. Improving web sites performance using
edge servers in fog computing architecture. In SOSE, 2013.