Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey

Author(s):  
Zahra Makki Nayeri ◽  
Toktam Ghafarian ◽  
Bahman Javadi
2018 ◽  
Vol 20 (1) ◽  
pp. 416-464 ◽  
Author(s):  
Carla Mouradian ◽  
Diala Naboulsi ◽  
Sami Yangui ◽  
Roch H. Glitho ◽  
Monique J. Morrow ◽  
...  

2020 ◽  
Author(s):  
Yehia I. Alzoubi ◽  
Valmira H. Osmanaj ◽  
Ashraf Jaradat ◽  
Ahmad Al‐Ahmad

2020 ◽  
Author(s):  
Hamza Baniata ◽  
Attila Kertesz

A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one of the recently emerged paradigms that needs to be improved to serve Internet of Things (IoT) environments of the future. As hundreds of projects, ideas, and systems were proposed, one can find a great R\&D potential for integrating BC and FC technologies. Examples of organizations contributing to the R\&D of these two technologies, and their integration, include Linux, IBM, Google, Microsoft, and others. To validate an integrated Fog-Blockchain protocol or method implementation, before the deployment phase, a suitable and accurate simulation environment is needed. Such validation should save a great deal of costs and efforts on researchers and companies adopting this integration. Current available simulation environments facilitate Fog simulation, or BC simulation, but not both. In this paper, we introduce a Fog-Blockchain simulator, namely FoBSim, with the main goal is to ease the experimentation and validation of integrated Fog-Blockchain approaches. According to our proposed workflow of simulation, we implement different Consensus Algorithms (CA), different deployment options of the BC in the FC architecture, and different functionalities of the BC in the simulation. Furthermore, technical details and algorithms on the simulated integration are provided. We validate FoBSim by describing the technologies used within FoBSim, highlighting FoBSim novelty compared to the state-of-the-art, discussing the event validity in FoBSim, and providing a clear walk-through validation. Finally, we simulate two case studies, then present and analyze the obtained results.


2021 ◽  
Vol 13 (16) ◽  
pp. 9463
Author(s):  
Ritika Raj Krishna ◽  
Aanchal Priyadarshini ◽  
Amitkumar V. Jha ◽  
Bhargav Appasani ◽  
Avireni Srinivasulu ◽  
...  

The Internet of Things (IoT) plays a vital role in interconnecting physical and virtual objects that are embedded with sensors, software, and other technologies intending to connect and exchange data with devices and systems around the globe over the Internet. With a multitude of features to offer, IoT is a boon to mankind, but just as two sides of a coin, the technology, with its lack of securing information, may result in a big bane. It is estimated that by the year 2030, there will be nearly 25.44 billion IoT devices connected worldwide. Due to the unprecedented growth, IoT is endangered by numerous attacks, impairments, and misuses due to challenges such as resource limitations, heterogeneity, lack of standardization, architecture, etc. It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network. To implement such a technology in the near future, a comprehensive implementation of security, privacy, authentication, and recovery is required. Therefore, in this paper, the comprehensive taxonomy of security and threats within the IoT paradigm is discussed. We also provide insightful findings, presumptions, and outcomes of the challenges to assist IoT developers to address risks and security flaws for better protection. A five-layer and a seven-layer IoT architecture are presented in addition to the existing three-layer architecture. The communication standards and the protocols, along with the threats and attacks corresponding to these three architectures, are discussed. In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented. The state-of-the-art solutions to enhance security features in IoT devices are proposed based on Blockchain (BC) technology, Fog Computing (FC), Edge Computing (EC), and Machine Learning (ML), along with some open research problems.


2020 ◽  
pp. 1190-1201
Author(s):  
Mohammed I. Younis ◽  
Manal F. Younis ◽  
Marwa M. Abed ◽  
Abdulrahman A. Alserawi

Given the high importance of attendance for university students, upon which the possibility of keeping or losing their places in the course is based, it is essential to replace the inefficient manual method of attendance recording with a more efficient one.  To handle this problem, technology must be introduced into this process. This paper aims to propose an automatic attendance system based on passive Radio Frequency Identification (RFID), fog, and cloud computing technologies (AASCF). The system has three sides. The first one, which is the Client-side; works on collecting the attendance data then sending a copy from it. The second side, which is the Server-side, works on calculating an absence ratio of all the students during the course. The third side is the Fog-server. Data sent by the client-side reaches to the Fog-server which, in turn, sends data to the cloud at the end of the of working time at the university. This paper also reviews the state-of-the-art automatic attendance systems and shows the merits and demerits for each approach by providing a checklist comparison. Unlike the previous works, the proposed system protects data from wasting and ensures its arrival to the cloud even  in cases of connection losing or device crashing, which is the contribution of this paper.


Fog Computing ◽  
2020 ◽  
pp. 139-213 ◽  
Author(s):  
Paolo Bellavista ◽  
Javier Berrocal ◽  
Antonio Corradi ◽  
Sajal K. Das ◽  
Luca Foschini ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document