scholarly journals Load Balancing of Fog Computing Centers: Minimizing Response Time of High Priority Requests

Fog computing is one of the enabling computing technology which primarily aims to fulfill the requirements of the Internet of Things (IoT). IoT is fast-growing networking and computing sector. The scalability of users, devices, and application is crucial for the success of IoT systems. The load balancing is an approach to distribute the load among computing nodes so that the computing nodes are not overloaded. In this paper, we propose the priority-based request servicing at fog computing centers. We particularly address the situation when the fog node in fog computing center (FCC) receives more workload than their capacity to handle it. The increased workload is shifted to nearby fog nodes rather than to the remote cloud. The proposed approach is able to minimize the offloading the high priority request to other nodes by 11% which proves the novelty of our proposed.

2020 ◽  
Vol 16 (5) ◽  
pp. 155014772091662
Author(s):  
Jun-Feng Tian ◽  
Hao-Ning Wang

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.


2017 ◽  
Vol 4 (5) ◽  
pp. 1113-1116 ◽  
Author(s):  
Rong N. Chang ◽  
Xiuzhen Cheng ◽  
Wei Cheng ◽  
Wonjun Lee ◽  
Yingshu Li ◽  
...  

Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2019 ◽  
Vol 19 (2) ◽  
pp. 1-41 ◽  
Author(s):  
Carlo Puliafito ◽  
Enzo Mingozzi ◽  
Francesco Longo ◽  
Antonio Puliafito ◽  
Omer Rana

Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5729 ◽  
Author(s):  
Ismail Butun ◽  
Alparslan Sari ◽  
Patrik Österberg

The proliferation of the Internet of Things (IoT) caused new application needs to emerge as rapid response ability is missing in the current IoT end-devices. Therefore, Fog Computing has been proposed to be an edge component for the IoT networks as a remedy to this problem. In recent times, cyber-attacks are on the rise, especially towards infrastructure-less networks, such as IoT. Many botnet attack variants (Mirai, Torii, etc.) have shown that the tiny microdevices at the lower spectrum of the network are becoming a valued participant of a botnet, for further executing more sophisticated attacks against infrastructural networks. As such, the fog devices also need to be secured against cyber-attacks, not only software-wise, but also from hardware alterations and manipulations. Hence, this article first highlights the importance and benefits of fog computing for IoT networks, then investigates the means of providing hardware security to these devices with an enriched literature review, including but not limited to Hardware Security Module, Physically Unclonable Function, System on a Chip, and Tamper Resistant Memory.


Sign in / Sign up

Export Citation Format

Share Document