“…Description Relevance Design measures to improve the system on the characteristic Latency (55) Average required time from a request to its response including time spent on communication and processing for the entire fog system within and across its layers [48] Modern applications such as VR require near realtime processing and communication due to the speed of changes in their environment [3,17,35] Deploy more fog nodes closer to edge devices [35], Target low utilization of fog nodes to manage peak loads [57], Introduce more capable connections with larger bandwidths [58], Improve distribution of loads across fog nodes [59] Data load (27) Amount of data that needs to be transferred or stored within the fog system [60] Modern applications and an increased number of devices and sensors produce massive amounts of data to be managed in the fog system [60,61] Cache content near to end-users [19,62], Filter and aggregate data in lower levels of the system [63], Forward only prioritized/critical data, Compress data [63], More peer-to-peer communication [64] Security (26) The ability of fog systems to maintain availability, integrity, and confidentiality by defending against unauthorized interception, interruption, modification, and fabrication [65] Fog systems usually encompass a multitude of nodes, sensors, and actors in potentially critical domains such as mobility and healthcare in which any security breach can have a severe impact [48,61] Introduce peer trust models [66], Limit access to the fog system [49], Introduce authentication mechanisms for every layer [44], Introduce trust mechanisms for edge devices and fog nodes [56,67], Allow only validated edge devices or for nodes or registered persons to access the system [68], Constant monitoring of activities to check for abnormal behavior [49], Introduce blockchain-based strategies [61] Interoperability…”