2017
DOI: 10.1007/978-981-10-5861-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing: A Taxonomy, Survey and Future Directions

Abstract: In recent years, the number of Internet of Things (IoT) devices/sensors has increased to a great extent. To support the computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices/sensors, a new computing paradigm named "Fog computing" has been introduced. Generally, Fog computing resides closer to the IoT devices/sensors and extends the Cloud-based computing, storage and networking facilities. In this chapter, we comprehensively analyse the challenges in Fogs acting… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
396
0
7

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 690 publications
(427 citation statements)
references
References 46 publications
0
396
0
7
Order By: Relevance
“…There are many other good surveys for MEC and edge computing from various points of view, such as Refs. [80], [81] and [82], among others. The security implication of MEC, which we did not mentioned, are surveyed in Ref.…”
Section: Resultsmentioning
confidence: 99%
“…There are many other good surveys for MEC and edge computing from various points of view, such as Refs. [80], [81] and [82], among others. The security implication of MEC, which we did not mentioned, are surveyed in Ref.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore we now have the emerging hybrid paradigm of Fog computing [4], [70]. In order for this paradigm to successfully achieve integration of these systems the reliability of every aspect must be managed and guaranteed with a level of Quality of Service (QoS).…”
Section: Challenge: Computational Systemsmentioning
confidence: 99%
“…The Fog paradigm of providing a virtual layer between the data centre and the IoT devices must be extended to provide a virtual cloud that hides the identity or location of all data centers, but also encapsulates other compute resources such HPC facilities, as shown in Figure 2. Such an approach could be used to mitigate the issues of scalability, fault-tolerance, elasticity [2] as well as facilitating management services to detect failures [70].…”
Section: Challenge: Computational Systemsmentioning
confidence: 99%
“…At the same time, with the wide adoption of IoT services, a variety of household appliances and sensors will be connected to the Internet and produce a large amount of data [3][4][5]. It has been estimated that the number of devices connected by IoT will reach 50 billion to 100 billion by 2020, which means there will be more and more data without the control of existing techniques on data processing and analysis, privacy leaks may be caused, and the quality of service will be decreased [6,7].…”
Section: Introductionmentioning
confidence: 99%