2018
DOI: 10.1007/978-3-030-00184-1_20
|View full text |Cite
|
Sign up to set email alerts
|

A Recovery Technique for the Fog-Computing-Based Information and Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…• Subjected to uncertain failures: Fog nodes are highly prone to get affected by anomalies such as power failures and out of capacity faults that obstruct the execution of applications assigned to them [Melnik et al 2019]. Due to latency issues, the recovery of applications also becomes difficult.…”
Section: Challenges Of Application Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…• Subjected to uncertain failures: Fog nodes are highly prone to get affected by anomalies such as power failures and out of capacity faults that obstruct the execution of applications assigned to them [Melnik et al 2019]. Due to latency issues, the recovery of applications also becomes difficult.…”
Section: Challenges Of Application Managementmentioning
confidence: 99%
“…However, to deal with the scarcity of resources, they have not provided any concrete model that can dynamically tune the frequency of check points within an application and change the number of replications in Fog environments. Replication [Fiandrino et al 2019] Encryption [Filiposka et al 2019] Migration [Fizza et al 2018] Threshold Reservation [Giang et al 2019] Threshold Migration [He et al 2018] Incentives Replication [Huang and Xu 2016] Reservation [JoÅąilo and DÃąn 2019] Incentives [Kayal and Liebeherr 2019] Threshold Threshold [Kim and Chung 2018] Compensation Threshold [Li et al 2019b] Incentives [Li et al 2018b] Threshold ] Implication [Luo et al 2019] Authentication Threshold [Mahmud et al 2018c] Migration Compensation [Melnik et al 2019] Backup-Restore [Mohamed et al 2019] Backup-Restore [Mouradian et al 2019] Threshold [Nair and Somasundaram 2019] Implication Migration [Noura et al 2019] Encryption Backup-Restore [Oma et al 2019] Backup-Restore, Replication [Ozeer et al 2018] Threshold Backup-Restore [Prabavathy et al 2019] Implication, Threshold [Puliafito et al 2018] Migration Integrity, Authentication [Saurez et al 2016] Integrity Migration [Su et al 2018] Encryption Replication [Tuli et al 2019] Integrity [Tychalas and Karatza 2020] Threshold [Verba et al 2019] Migration [Vinueza Naranjo et al 2018] Authentication [Wang et al 2019a] Implication Migration Threshold Replication Authentication [Wazid et al 2019] Authentication Authentication Migration [Yu et al 2017] Compensation Replication Incentives [Battula et al 2019] Compensation [Zhao et al 2019] Migration Incentives Migration…”
Section: Research Gaps In Application Maintenancementioning
confidence: 99%