2019
DOI: 10.3390/fi11070141
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Application-Partitioning Algorithm with Improved Offloading Mechanism for Fog Cloud Networks

Abstract: This paper aims to propose a new fog cloud architecture that performs a joint energy-efficient task assignment (JEETA). The proposed JEETA architecture utilizes the dynamic application-partitioning algorithm (DAPTS), a novel algorithm that efficiently decides and switches the task to be offloaded or not in heterogeneous environments with minimal energy consumption. The proposed scheme outperforms baseline approaches such as MAUI, Think Air and Clone Cloud in many performance aspects. Results show that for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 29 publications
(33 reference statements)
0
3
0
Order By: Relevance
“…Network security: The fog computing network is susceptible to a range of network security threats, including man‐in‐the‐middle attacks, denial‐of‐service attacks, and unauthorized access. To mitigate these risks, network security measures, such as firewalls, intrusion detection systems, and virtual private networks, should be employed 69 Data security: Data that is processed and stored in the fog computing network is vulnerable to theft, alteration, or loss 70 .…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…Network security: The fog computing network is susceptible to a range of network security threats, including man‐in‐the‐middle attacks, denial‐of‐service attacks, and unauthorized access. To mitigate these risks, network security measures, such as firewalls, intrusion detection systems, and virtual private networks, should be employed 69 Data security: Data that is processed and stored in the fog computing network is vulnerable to theft, alteration, or loss 70 .…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…"Fog computing is a dispersed computing structure or technique in which computer resources are distributed across a source of data in addition to cloud or supplementary files centre [34,35]," according to the definition given above. The technology that is most suited to handle IoT is fog computing [36].…”
Section: Fog Iotmentioning
confidence: 99%
“…A cloud centred disaster recovery answer permits the consumer to measure the whole cloud DRP solution as of more or less-to-various. [56].…”
Section: A Storage Featuresmentioning
confidence: 99%