2017
DOI: 10.1109/jsac.2017.2760478
|View full text |Cite
|
Sign up to set email alerts
|

The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective

Abstract: Mobile Edge Computing (MEC) and Fog are emerging computing models that extend the cloud and its services to the edge of the network. The emergence of both MEC and fog introduce new requirements, which mean their supported deployment models must be investigated. In this paper, we point out the influence and strong impact of the extended cloud (i.e., the MEC and fog) on existing communication and networking service models of the cloud. Although the relation between them is fairly evident, there are important pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
79
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 225 publications
(79 citation statements)
references
References 33 publications
0
79
0
Order By: Relevance
“…According to the MD's energy consumption analysis as mentioned in 4.4, the total execution energy ( ) of the workflow can be computed by Eq. (25).…”
Section: Problem Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to the MD's energy consumption analysis as mentioned in 4.4, the total execution energy ( ) of the workflow can be computed by Eq. (25).…”
Section: Problem Definitionmentioning
confidence: 99%
“…The architecture of computation offloading in mobile edge computing In addition to the MD's energy consumption, security is another critical concern for mobile applications on cloud computing [11][12][13][14][15][16][17], mobile cloud computing [18][19][20] and mobile edge computing [21][22][23][24][25]. A recent survey reveals that one of the top concerns is security in mobile edge computing [21][22][23][24][25][26]. In particular, these tasks offloaded to the edge servers are vulnerable to hostile attacks from outside.…”
mentioning
confidence: 99%
“…Consequently, it has been necessary to foresee alternative solutions and, in particular, to move computation toward network edges, nearby end users. Along this direction, two paradigms have been proposed, namely, edge computing (EC) and fog computing (FC) . Both the approaches have in common the extension of CC benefits to network edges.…”
Section: Introductionmentioning
confidence: 99%
“…Along this direction, two paradigms have been proposed, namely, edge computing (EC) and fog computing (FC). 8 Both the approaches have in common the extension of CC benefits to network edges. In particular, fog systems push computation capabilities down to the outer area level of a network architecture, usually processing data on one or more powerful computation nodes, named fog nodes (FNs), and deployed conveniently close to the end users to perform intensive computation tasks with low latency.…”
Section: Introductionmentioning
confidence: 99%
“…Due to this type of architecture it will automatically improve the quality of service as it will result in reduction of delay while transmitting of data from source to destination. With the lack of control over data and deficiency of transparency give rise to many security concerns, which cause insecurity for organizations that want to "cloudify" their IT infrastructure [1].…”
Section: Introductionmentioning
confidence: 99%