Proceedings of the 2020 4th International Conference on Management Engineering, Software Engineering and Service Sciences 2020
DOI: 10.1145/3380625.3380644
|View full text |Cite
|
Sign up to set email alerts
|

Quality of Experience and Quality of Service of Gaming Services in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…In this research, measurements were made of resource usage, quality of service (QoS) [21] and frame usage which showed how well the test game ran on the virtual machine (VM), and what impact the VM had on the user's laptop if the game load was handled by the cloud server. For QoS parameters taken from 3 different categories, namely network delay, jitter, and throughput [22]. Measurement is carried out in each game with a duration of 1,800 seconds with data sampling every 180 seconds for resource and QoS parameter.…”
Section: Methodsmentioning
confidence: 99%
“…In this research, measurements were made of resource usage, quality of service (QoS) [21] and frame usage which showed how well the test game ran on the virtual machine (VM), and what impact the VM had on the user's laptop if the game load was handled by the cloud server. For QoS parameters taken from 3 different categories, namely network delay, jitter, and throughput [22]. Measurement is carried out in each game with a duration of 1,800 seconds with data sampling every 180 seconds for resource and QoS parameter.…”
Section: Methodsmentioning
confidence: 99%
“…To mitigate these risks, device security should be a top priority, with measures such as secure boot, device management, and encryption implemented. 67,68 • Network security: The fog computing network is susceptible to a range of network security threats, including man-in-the-middle attacks, denial-of-service attacks, and unauthorized access. To mitigate these risks, network security measures, such as firewalls, intrusion detection systems, and virtual private networks, should be employed.…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…Some of the most significant security threats in fog computing include: Device security: The devices that make up the fog computing network are vulnerable to various forms of attack, including malware, hacking, and unauthorized access. To mitigate these risks, device security should be a top priority, with measures such as secure boot, device management, and encryption implemented 67,68 Network security: The fog computing network is susceptible to a range of network security threats, including man‐in‐the‐middle attacks, denial‐of‐service attacks, and unauthorized access.…”
Section: Security Threats In Fog Computingmentioning
confidence: 99%
“…By structure, Fog computing is potentially viable to inject QoS/QoE guarantees by providing local accesses to the users rather than communicating every time to the Cloud. In literature, various issues like energy-efficient design, latency, and minimizing congestion as a whole are explored in a reactive (as and when demand comes) or a proactive (in hindsight) manner in general [21,28,29] or considering particular application in mind [30,31].…”
Section: Related Workmentioning
confidence: 99%