You are on page 1of 44

Cluster Computing (2022) 25:1111–1154

https://doi.org/10.1007/s10586-021-03496-w (0123456789().,-volV)(0123456789().,-volV)

Fog computing in enabling 5G-driven emerging technologies


for development of sustainable smart city infrastructures
Siddhant Jain1 • Shashank Gupta1 • K. K. Sreelakshmi1 • Joel J. P. C. Rodrigues2,3

Received: 17 April 2021 / Revised: 23 September 2021 / Accepted: 21 November 2021 / Published online: 7 January 2022
 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021

Abstract
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards a more automated lifestyle. A
significant amount of IoT devices is expected to join the network as IoT has allowed interconnection and transmission
among global devices which has resulted in generation of enormous diverse data. There is a requirement for a real-time,
latency-specific, and network efficient computing paradigm in 5G-enabled smart city infrastructure. Fog computing pre-
sents trustworthy solutions to tackle these issues by combining edge users. They store, control, communicate, configure,
measure, and manage big data produced by IoT devices. In this survey, the authors have performed a comprehensive study
on fog computing and have classified various such paradigms. The authors have performed an extensive evaluation of
features, along with the algorithmic and architectural packages deployed in the framework. This survey covers various 5G-
enabled Industrial IoT (I-IoT) application settings and unleashes various fog framework-based solutions for numerous real-
world application challenges in sustainable smart city infrastructures. Numerous contributions of fog computing towards
latency-sensitive applications like healthcare 4.0, smart conveyance, smart waste management, smart energy handling, etc.
has also been discussed. Fog computing framework apart from the abilities, also inherits various security flaws from cloud
computing paradigm, and these flaws needs to be rectified in the interest of the end user. This survey presents a com-
prehensive review of state-of-the-art literature schemes to preserve the integrity of data in sustainable smart city infras-
tructure. Diverse phrases employed for investigating numerous security and privacy concerns in 5G enabled technologies
are discussed in a sophisticated approach.

Keywords Fog computing  Internet of things  Latency  Architecture  Algorithms  Applications  Security 
Privacy

Abbreviations ANN Artificial neural networks


ACI Access control issues ANU Abuse and nefarious use
AH Account hijacking API Application programming interface
AHP Analytic hierarchy process APT Advance persistent threats
BCI Brain-computer interaction
& Shashank Gupta BD Big data
shashank.gupta@pilani.bits-pilani.ac.in CBSRS Cold and hot backup service replacement
Siddhant Jain strategy
f20180282@pilani.bits-pilani.ac.in CIA Confidentiality, integrity and availability
K. K. Sreelakshmi CPS Cyber-physical system
h20180130@pilani.bits-pilani.ac.in DB Data breaches
Joel J. P. C. Rodrigues DHT Distributed hash table
joeljr@ieee.org DL Data loss
1
DoS Denial of service
Department of Computer Science and Information Systems,
Birla Institute of Technology and Science Pilani, Pilani,
ERGOT Efficient routing grounded on taxonomy
Rajasthan 333031, India FC Fog computing
2
Senac Faculty of Ceará, Fortaleza, CE, Brazil
FN Fog node
3
HS-DRT High security distribution and rake technology
Instituto de Telecomunicações, Covilhã, Portugal

123
1112 Cluster Computing (2022) 25:1111–1154

IA Insecure APIs workgroups involved in developing a framework for the


IaaS Infrastructure-as-a-service Fog to allow compatibility and expandability [6]. Huawei,
IDD Insufficient due diligence Ericsson, and Cisco offer the hardware components. The
IoT Internet of things present literature indicates the enormous research prospects
IRR Incidence rate ratio in the Fog framework. Figure 1 schematically demon-
MI Malicious insider strates the historical developments in the fog computing
MiTM Man-in-the-middle paradigm.
PaaS Platform-as-a-service This survey presents a sophisticated categorization of
PCS Parity cloud service technique the correlated state-of-the-art published contributions.
RAN Radio access network Figure 2 sketches the details in the proposed scheme. This
SaaS Software-as-a-service scheme categorizes the plan into two major groups, the
SAV System and application vulnerabilities future architectures, and future algorithms in Fog Com-
SSL Secure socket layer puting (FC). These two groups are the most happening in
STI Shared technology issues recent times due to the researchers’ outlook on handling the
UI User interface issues from either viewpoint. The first group, architectures,
VANET Vehicular Ad-hoc NETworks proposes two subcategories, generalized and application-
VM Virtual machine particular architectures and the second group, algorithms,
WPA Wi-Fi protected access proposes algorithms for storage, dissemination, computing,
and energy utilization. The grouping of the state-of-the-art
literature in FC streamlines the readers’ contact with lit-
erature handling a specific constraint.
Many researchers and industrial developers have a
strong belief that Fog computing architecture will be
1 Introduction established and circulated in the upcoming years to deliver
uninterrupted and enriched services for a better user
The advancement of IoT, CPS, and Mobile Internet has led experience. A trusted infrastructure needs to be set up in
to a vast network of objects, which includes people, devi- order to tackle the increment in the amount of connected
ces, machines, into the virtual communication space [1]. devices. The disseminated fog framework exposes the data
The diversity in the configuration and hardware of the and the user devices to cyber-attacks, which is intensified
devices involved in this network leads to heterogeneous due to the developer’s preference for functions over secu-
data. The rapid increase in data generation demands rity. Researchers and academia are adopting a security-
enormous storage and processing power, which we cannot focused design attitude [7] for developing secure
meet at present [2]. Conventional computing frameworks applications.
like the Cloud and distributed computing are being used to The key contributions of this paper, in addition to other
process the data. The Cloud has enormously impacted the survey papers, on the fog computing framework are the
Internet by eradicating direct investment necessities, following:
expandability, and costs. As the devices continue to con- • It gives an extensive review of fog computing archi-
nect over the Internet, time-sensitive use cases have started tecture and compare it with other existing computing
to take a hit due to the delay in response. Portability and paradigms.
location awareness are another disadvantageous aspect of • The authors have performed a complete assessment of
conventional frameworks. To tackle these issues, a new the existing state-of-the-art literature in the architectural
computing framework, known as Fog computing, was and algorithmic aspects of fog computing. It also
introduced in 2012 [3, 4]. discusses various unacknowledged issue and have
The fog is a virtual framework that assists networking, provided deployable solutions to tackle them.
computing, and storage services among the Cloud layer and • It discusses various Industrial IoT use cases along with
the edge devices. The Fog is different from the Cloud due the real-world challenges that arise from them. Some
to its decentralized processing, storage, and support for implementable solutions have been put forward to
heterogeneity [5], closeness to the users, compressed enhance the functionality of the framework. The
topological dissemination, and portability assistance. Var- authors also highlight the role of fog computing towards
ious firms, including Intel, Cisco, ARM, Microsoft Corp., latency-specific applications.
Dell, have set up research teams to develop fog framework. • This paper also covers various security and privacy
OpenFog Consortium, founded in 2015, are interest-based concerns caused by the implementation of fog

123
Cluster Computing (2022) 25:1111–1154 1113

Fig. 1 History of the fog computing

Fig. 2 Plan of the state-of-the-art classified according to the categorization

computing architecture. Various prospective solutions Figure 3 schematically illustrates the composition of
are discussed to eliminate the threats and make fog this survey. Section 2 presents FC and other additional
reliable. concepts. It also presents a comprehensive comparison of

123
1114 Cluster Computing (2022) 25:1111–1154

network frameworks and enlists various use cases of FC.


Similarly, Perera et al. [11] highlights device configuration
and connectivity settings in context with the FC framework
and put forward various important features of the platforms
built over fog architecture necessary to create novel
infrastructure for industrial IoT applications and provi-
sioning sustainable smart cities. The authors also review
current state-of-the-art literature that are put forward in
order to deal with challenges that arise in provisioning
smart cities. Additionally, state-of-the-art works [12–15]
have been released to provide different perspective to
VANETs, RANs, and industrial IoT. Table 1 provisions
details on the various types of publishers per each evalu-
ated paper in this survey article.
However, these literature works are unable to deliver a
comprehensive assessment of the underlying contribution
in the context of definitions and some parameters like use
cases, energy consumption, expandability, federation,
diversity, portability, QoS management, and compatibility.
For an instance, algorithmic facets are not highlighted in
Fig. 3 Outline of the survey any of these works, in spite of the fact that algorithms play
an important role in industrial use cases of FC. Moreover,
the various computing paradigms in use at present. This this survey exhaustively reviews the computing paradigm
section also concentrates on the implementation of the FC from both algorithmic and architectural facets. An
architecture. Section 3 presents an evaluation scheme for exhaustive review has been performed, in contrast with the
the fog framework. This section considers the fog archi- sketchy discussion done in the existing surveys. This paper
tecture as a combination of architectural elements and the also brings into light various unaddressed matters and put
enabling algorithms that make the fog framework function forward to pact with them. This exhaustive discussion is
properly. Then, Sect. 4 reviews various use case scenarios followed by narration of several lessons comprehended in
which are being benefitted from the fog architecture. This context with the industrial use cases of fog paradigm while
section also brings into light the constraints of using fog reviewing the existing state-of-the-art literature.
framework in real-world applications. It also suggests
deployable solutions to tackle these constraints. Section 5
consists of a complete review of various unacknowledged 2 Fog computing and related paradigms
security issues in the fog computing architecture. This
section introduces both present and future solutions to The cloud, fog, and the edge layer combine to form a
these security threats. Some open research opportunities in contemporary computing architecture popularly known as
this regard have also been highlighted. Finally, Sect. 6 the fog architecture [16]. In Fig. 4 the authors deliver a
concludes the paper. thorough study of fog architecture, with the cloud servers
located at the uppermost level, the fog stratum in the
1.1 Related works centre, and the edge device users at the lower level. IoT or
user devices are connected through a fog node [17, 18].
Numerous state-of-the-art articles have been released that
comprehensively explains the fog computing paradigm, its
use cases and the challenges associated with it. Yi et al. [8]
Table 1 Number of evaluated
describes the fog computing and various related computing ACM 16
papers per publisher
paradigms along with their applications and the challenges Elsevier 26
connected with it. Chiang et al. [9] compares fog, edge, and IEEE 109
cloud computing to bring to light the advantages of using Springer 10
fog computing. They also indicate various research chal- Wiley 3
lenges associated with the field. Mukherjee et al. [10] Others 37
comprehensively reviews recent works in the fog assisted Grand total 201

123
Cluster Computing (2022) 25:1111–1154 1115

2.1.1 Cloud computing (CC)

This computing paradigm fosters universal, instant network


request access to pooled computing assets [20]. The pres-
ence of many access-ready virtualized assets that allow
active reconfiguration facilitates the upscaling of the
amount of work done in cloud data centers. Cloud provides
services such as IaaS, PaaS, SaaS, which developers can
utilize according to the requirements of the employed
application. Cloud computing can be deployed in four
ways: private, public, community, and hybrid cloud [20].
The growing requirement for large bandwidth, topological
dissemination, reduced latency, and confidential data pro-
cessing has become apparent. To focus on these require-
ments, the FC paradigm is put forward by various academic
institutes [21].
Fig. 4 Comprehensive fog architecture
2.1.2 Fog computing (FC)
The Cloud Layer The cloud layer involves various ser-
vers and storing equipment with huge computation capa- This framework facilitates computing, storing, connecting,
bilities. These devices are responsible for broadcasting, big and data handling on FNs present in the surrounding of
data analysis [19], etc. High-speed wired and wireless user devices. Computing also takes place while the data
solutions are used to exchange data in the cloud layer. transmits from the user devices to the uppermost server
The Fog Layer This layer comprises of a mesh network facility. OpenFog Consortium [21] describes FC as ‘‘a
of fog nodes [19]. It is responsible for geological assis- horizontal system-level architecture that distributes com-
tance, heavily reduced latency, and instant computation puting, storage, control, and networking functions closer to
along with location awareness. Fog nodes act as a resource the users along a cloud-to-thing continuum.’’ Disseminated
hub for temporary storage. The fog layer’s roles include computing is facilitated by the ‘‘horizontal’’ platform and is
network transformation, collection of data, networks, data distributed over various platforms and industries [22]. FC
upload, storage, calculation, and management. In case, the aims to provide huge assistance for IoT devices and fulfil
fog layer requires computation, which is beyond the the data-propelled requirements of users. The size of
capabilities of fog nodes, the task is sent to the cloud layer hardware components involved with CC and FC attributes
through FNs with the help of various high-speed the major distinction. CC also provides a huge scope for
telecommunication channels available. larger computing resources usage, while FC facilitates
The Edge layer This layer includes various IoT-enabled medium utilization of resources at low power usage.
devices, edge devices facilitated with global recognition
and communication abilities [19]. These devices have a 2.1.3 Mobile computing (MC)
huge number of diverse sensors that produce different types
of data. Each device is linked to at least one fog node. This computing paradigm comes into play when computing
takes place from portable devices such as cell phones,
2.1 Classification of various computing laptops, etc. This paradigm enables us to create reminders
paradigms based on geological location. MC aims to solve computa-
tional issues associated with lesser processing capabilities,
This subsection briefly reviews various existing computing weak network connectivity. MC facilitates computation
paradigms. The authors have explained major features of through vigorous caching, compression algorithms, and
the paradigms along with the features that differentiates transmission hardware and protocols [23].
them from other paradigms. While Tables 2 and 3 arrange
common attributes of FC and related paradigms, while the 2.1.4 Mobile cloud computing (MCC)
same have been figuratively demonstrated in Fig. 5 that
represents overlapping features to enhance reader’s This computing paradigm involves both storage and pro-
experience. cessing and implements both of these out of the
portable device, which assists computing applications to be
available for a wide variety of mobile endorsers [24]. Some

123
1116 Cluster Computing (2022) 25:1111–1154

Table 2 Aspects of fc and


Aspects CC MC FC EC MCC MACC MEC DC mist
associated paradigms
Portability No Yes Yes Yes Yes Yes Yes Yes Yes
Industrial use provision Yes No Yes Yes No No Yes Yes Yes
Real-time use provision No No Yes Yes No No Yes Yes Yes
Systematized Yes Yes Yes Yes No No Yes Yes No
Diversity provision Yes No Yes Yes Yes No No Yes Yes
Location assistance No Yes Yes Yes No Yes Yes Yes Yes
Numerous IoT use cases Yes No Yes No No No No Yes Yes
Framework needs Yes No Yes Yes Yes No Yes Yes Yes
Virtualization support Yes No Yes No No No Yes No No
Delay Yes Yes No No Yes Yes No Yes No
Topographically distributed No No Yes Yes No No Yes Yes Yes

use cases of this paradigm are in the field of wellness and 2.1.7 Cloudlet computing
health, sensor data processing, crowdsourcing, and task
offloading [25]. Enormous computation is done in the Nearby portable devices use this group of reliable resource-
cloud layer that makes MCC paradigm rich in terms of wealthy computer systems having a good source of high-
computational resources, unlike resource-deficient MC. speed Internet as mini-data centers also known as
‘‘miniature clouds’’. Figure 7 comprehensively demon-
2.1.5 Mobile ad-hoc cloud computing (MACC) strates cloudlet computing architecture. These are at a one-
step distance from portable devices. Cloudlets aims to
This paradigm involves nodes that create a short-term, reduce computation from portable devices and shift it
ever-changing network via transmitting protocols, and towards VM-based cloudlets at the edge of the network
hence this is recognised as largely disseminated network [29].
paradigm [26]. The portable devices involved in this
paradigm generates as well as process data. They are self- 2.1.8 Mist computing
sufficient as they are liable for routing data among them-
selves. MACC is suitable for large, disseminated networks In this paradigm, computing occurs at the endpoints of
as compared to FC. linked devices [30]. It assists distributed computing at the
extreme edge i.e., IoT devices. It can be considered the first
2.1.6 Edge computing (EC) location in IoT-fog-cloud architecture where computation
occurs. Nearby portable devices can be used to create CC
EC is defined as ‘‘computation done at the edge of the atmosphere for performing various functions [31]. Mist
network through small data centers that are close to users’’ computing aims to safeguard users’ privacy [32, 33].
by OpenEdge Computing [27]. EC connects edge devices
with the cloud layer by sorting, managing, and accumu- 2.1.9 Dew Computing (DC)
lating data quickly through cloud services implemented in
the vicinity of IoT devices [28]. EC can handle privacy, Dew computing is foreseen to depend on the microservices
delay, and network connectivity. According to OpenEdge in largely disseminated, vertical style. It utilizes central-
Computing, EC is often misinterpreted as FC; and it ized-virtualization-free computational resources, which
mentions the difference as FC is hierarchical and can ultimately aims to achieve distribution of data to user
facilitate computation anywhere between cloud and devi- devices. Ray et al. [34] and Pan et al. [35] states this
ces unlike EC which is restricted to edge computation [21]. computing paradigm to evolve in a prospective computing
Figure 6 schematically shows the location of various paradigm which can be a revolution towards data avail-
paradigms and their distance from the cloud layer. In recent ability without the internet accessibility. This paradigm is
times, the term ‘‘edge’’ used in the IoT domain indicates obliged to cover all the current network protocols and
the network mesh to which different sensors and edge computing paradigms in order to possess a wide range of
devices are linked locally [28]. characteristics ranging from mobile data collection to
collaborative use cases.

123
Table 3 Characteristics of FC and associated paradigms
Features CC MC FC EC MCC MACC MEC

Assistance Worldwide Regional Less worldwide Regional Regional Regional Less worldwide
Framework Concentrated/ Disseminated Decentralized/ tiered Regional/ Disseminated Central cloud with Disseminated Regional/tiered
tiered Disseminated
mobile
devices
Applications Big data Traffic control, IoT, Smart cities, smart Remote sensor systems, Social networking, Unmanned Content dissemination,
analytics, file credit card grids, agriculture Local video surveillance, Remote storage, vehicular portable BD analytics, video
storage, verification, technology, surveillance, augmented reality, eCommerce, surveillance, caching, cooperative
Cluster Computing (2022) 25:1111–1154

backup, infotainment, connected vehicles, heat circulated information eLearning, online battlefields, computing, associated cars,
virtualised emergency cases control stockpiling gaming disaster smart spots
apps, recovery
Hardware Massive data Portable gadgets Servers, routers, access Edge gadgets with Portable gadgets or Portable gadgets Small data servers with
requirements centres points computation ability massive data centres gadgets with virtualization
with virtualization
Key Academic Academic World Academic World/Industry Academic World/Industry Academic World Academic World Academic World/Industry
contributors World/
Industry
Computation High Limited Average Average High Relatively less Average
Availability limited
Users Usual Portable Usual Usual Portable Portable Portable
Remoteness Far Away Located in the Relatively adjacent Adjacent Far Away Located in the Located in the vicinity
from users vicinity vicinity
Latency Relatively Average Less Less Relatively High Average Less
High
Server site Mounted in – At the edge or in dedicated Near devices Mounted in huge – Near devices
huge locations structures
structures
Operators Cloud service Personal Consumers, cloud service Network providers or Consumers, cloud Personal Network
providers providers regional service providers
shops providers
Internet Compulsory Needs low Needs no or low Needs no or low Discrete Self-reliant or Self-reliant or sometimes
connectivity connectivity connectivity connectivity requirement of may need no or connect to Internet
Internet for irregular
performing tasks Internet
Power High – Less Less Less for Less High
expenditure portable gadgets
Security Along cloud to At At participant nodes At edge devices Along cloud-to- At At network edge
provision edge portable gadgets edge and portable gadgets
portable gadgets
1117

123
1118 Cluster Computing (2022) 25:1111–1154

2.1.10 Cloud of things (CoT)

This computing paradigm aims to create a cloud by pooling


resources of edge devices. This paradigm utilizes this cloud
for computation and storage in the vicinity of edge devices.
Abdelwahab et al. [36] proposes CoT for SaaS, which takes
assistance from edge nodes placed near IoT nodes. It
facilitates remote sensing, and in-network disseminated
Fig. 5 A categorization of extent of FC and its associated paradigms handling of data. CoT structure is expandable to provide
assistance to IoT devices and it also takes into account
diversity of edge devices and gives power to the base of
SaaS service using FC.

2.2 Architecture implementation

A fog system consists of IoT/edge devices, orchestration


layer and distributed message bus [37, 38] and these three
layers are demonstrated in Fig. 8.
• IoT/edge devices IoT/edge devices are used by edge
users to perform various types of computation in order
to achieve a certain result [39].
• Orchestration layer The assignment and operation of
virtualized assets is defined by FC framework using
orchestration layer. This layer keeps a check on the fog
architecture’s real-time state, and it instantaneously
responds to any modifications in the settings [40]. The
main concerns, limitations, and scope of research in
orchestration layer are summarised in [41].
• Abstraction layer It is responsible for standardization of
Fig. 6 Evaluation of FC and other paradigms based on their location diverse attributes present in the fog architecture through
and distance from the cloud layer

Fig. 7 Architecture of cloudlet-based computing Fig. 8 Fog architecture implementation

123
Cluster Computing (2022) 25:1111–1154 1119

tailored APIs and UIs. Basic APIs raises security and It is important to filter unwanted data and users in fog
privacy issues to many users. architecture. Hence, the requirement of fog gateway is vital
for massive and diverse IoT domain, which assists various
In Fig. 8, a few security and privacy concerns can be
crucial applications [46]. Therefore, a IoT-fog gateway is
raised by monitoring fog nodes in orchestration layer
needed to carry out many functions as shown in Fig. 10
where we should identify how and what services should be
[47, 48].
ordered before the release. Reliable service providers must
Datta et al. [49] put forward a OneM2M fog gateway
be consulted in order to run the complete service. In the
which consists of an intermediary node carrying three
abstraction layer, these concerns can be associated with
activities: data assessment, resources’ detection, and device
segregation of data in multi-user mode. A fog gateway was
handling. The DHT algorithms in P2P networks detect
put forward to solve this issue in [42] and a five-layer
surrounding devices and services in [50]. Application of
framework of the FN gateway is demonstrated in Fig. 9
CC and FC to the gateway layer plays a vital role in
[43]. These five layers are located on top of any fog
managing services. BETaaS is presented in [51] and a
atmosphere: monitoring layer examines events, power,
intelligent gateway architecture is proposed which carries
reactions, and services when tasks take place; pre-pro-
out collection, management, segregation, and recreation of
cessing layer inspects, screens, recreates and reduces data;
data [52].
temporary storage layer empowers data dissemination,
An abridged pictorial representation of how gateways
duplication, and storage. The data is transferred to cloud
present in the fog layer helps nodes while taking changes in
layer via FN, where the data was already stored. Mean-
topological devices into account is shown in Fig. 11.
while, the security layer keeps a check on personal data
Device identification assists in the detection of an incoming
generated by the user devices; and the transport layer is
node into the domain. Authors have defined identification
responsible for transmitting data to the cloud. Subse-
and portability accounting mechanisms in [30] while
quently, the data stored in FN is erased upon successful
keeping compatibility in mind.
transmission of data to the cloud.
Some security and privacy concerns can be noticed from
Fig. 9:
3 Fog architecture evaluation
• Storage has its own advantage and disadvantages and parameters
associated with it. A mixed storage method for IoT
data is put forward in PaaS cloud group [44]. The authors in this paper put forward a set of parameters to
• The need to insure cost-efficiency and flexibility during examine and validate the efforts made in this field so far.
malfunctioning in important use conditions [45]. The efforts made in architectural and algorithmic dimen-
• Fake fog gateways can take over reliable fog gateways sions are considered for evaluation. In the past, comparable
acting as FNs. parameters have been put forward in [53]. An outline of the
evaluation parameters is provided in Table 4.

3.1 Evaluation parameters

The requirement for expandability is the first parameter


(P1). FC framework is meant to fulfil requirements of bil-
lions of edge devices and they should be able to incorporate
many use cases, and FNs. These use case systems can have
millions of devices. Architectural dimension must guar-
antee this expandability and algorithms such as elasticity
manager should manage it by upscaling or downscaling the
load generated by devices.
The requirement for federation is the second parameter
(P2). Due to topologically disseminated operation of fog
system over a large scale, there is a possibility that distinct
service providers can operate both fog and cloud domain.
This leads to cooperation requirements among service
providers to safeguard efficient working of fog and cloud-
based use cases. It also provides flexibility to the system.
Fig. 9 The architecture of a fog node gateway Fog Federation comes with its own challenges which needs to

123
1120 Cluster Computing (2022) 25:1111–1154

be resolved within the service providers frequently. Out- algorithm to divides workload amongst the fog and
sourcing and insourcing decisions are one of the major cloud layer. Kapsalis et al. [55] proposed an archi-
issues in federation. tecture which is accountable for allotment and han-
The requirement to assist diversity is the third parameter dling resources. They also put forward the concept of
(P3). A huge amount of heterogenous data is generated stable and portable edges. Task scheduling archi-
from large variety of user devices and FNs with different tecture was put forward by Cardellini et al. [56].
configurations. Fog computing architecture should be able (2) Architectures for Communication: Extensive
to handle this heterogeneity and must device a proper research has been performed in both intra and
mechanism to decide the most viable deployment mecha- inter-stratum transmission because both types of
nism for different applications. transmission are crucial in FC. Decision architecture
The requirement to assist portability is the fourth is put forward by Krishnan et al. [57] which permits
parameter (P4). The fog architecture and algorithms must the device to choose between execution of a program
take into account the portability of edge devices and FNs. in the fog and cloud layer. The authors focus on
Architectural and algorithmic solutions such as mobility inter-layer transmission between the fog and the
engine that runs programs by an algorithm prove promising cloud layer. Aazam and Huh [43] focus on inter-
in this regard. stratum transmission. The authors have put forward
The requirement to meet QoS is the fifth parameter (P5). an architecture which minimizes the count of packets
Due to presence of fog nodes in the vicinity of devices, fog transmitted between communication layers. Slabicki
system aims to provide quality services to users especially et al. [58] brings into light the intra-stratum trans-
in real-time use cases. These decreases delay as well. mission in the edge layer devices. The authors have
Architectural and algorithmic packages are required to considered following three types of connections
guarantee QoS maintenance. among devices, (a) direct connection, (b) through
The requirement for compatibility is the sixth parameter the fog architecture, and (c) through the cloud
(P6). Similar to issues which led to federation, operation of architecture. The authors concluded that the trans-
fog devices provided by different service provides demands mission is fastest via cloud, followed by fog, and
architectural and algorithmic packages which can assist then by direct connection.
them to operate over different interfaces while meeting the (3) Architectures for usage provisioning: Creation,
above-mentioned requirements as well. implementation, and handling and execution are the
three main phases in the lifecycle of usage provi-
3.2 Architectural packages for fog stratum sioning [77]. Giang et al. [59] put forward first
architecture that uses DDF and it represents regional
These architectures outline particular architectural aspects usage anatomy as directed graph having nodes with
while keeping in mind the large number of edge devices. each one of them linked to a component. Hong et al.
Architectural aspects like resource handling, communica- [60] put forward second architecture known as
tion problems, usage provisioning, and cloud-fog federa- mobile-fog which permits handling of components
tion have drawn attention of researchers. Researchers have disseminated over edge, fog, and cloud layer. While
mainly centered their findings on improving health care, execution takes place, the application extracts data
connected automobile technology and smart lifestyle about the FNs. This data is then used to determine
management. The authors have reviewed important ele- the instructions that should be executed. A common
ments of research works related to architecture and algo- architecture is put forward by Yangui et al. [61].
rithms involved in FC framework. Table 5 highlights use (4) Cloud-Fog Federation Architectures: As far as we
case-based generalized architectures while Table 6 high- know, the concerns aroused due to federation have
lights architectures involved in above mentioned only been addressed by Zhankieev et al. [62] as they
applications. put forward an architecture known as CVP.

3.2.1 Use case-based generalized architectures for the FC


3.2.2 Use case-specific architectures for the FC framework
framework
(1) Health care Architectures: Healthcare use cases for
(1) Resource Handling Architectures: Resource handling
delay sensitive as it demands high amount of data
becomes crucial concern when cloud layer, fog layer
processing in real-time by edge/IoT devices. Fog
and the edge devices are incorporated into a single
systems are being deployed in this sector to tackle
framework. Resource allotment architecture is put
the delay issues.
forward by Agarwal et al. [54] and it employs an

123
Cluster Computing (2022) 25:1111–1154 1121

Fig. 10 IoT gateway


functionalities

Fig. 11 Node mobility in fog


computing

(a) Healthcare at large: The fog system assists personal (b) ECG and EEG characteristic abstraction: ECG
healthcare services by providing related alerts. An (electrocardiogram) is linked with heart while EEG
architecture was put forward by Stantchev et al. [63]. (electroencephalogram) is linked with the brain.
This work has verified their proposed architecture by Biomedical sensors are positioned in the healthcare
testing an application for sensor-based framework. field to supervise the heart and the brain. An archi-
tecture for health supervision assisted by IoT has
been put forward by Gia et al. [64]. It is benefitted
from QoS maintenance, real-time urgent notification.
BCI-based game known as ‘‘EEG Tractor Beam’’ has
been developed and demonstrated in work done by
Zao et al. [65]. It is a gamified approach to monitor
state of the brain which takes help of an app running
on a smartphone.

123
1122 Cluster Computing (2022) 25:1111–1154

Table 4 Evaluation parameters’ review


Parameter Meaning Algorithmic aspect Architectural aspect

Expandability Fog systems are meant to tackle numerous Algorithms must be capable to make Architecture components should be
P1 IoT devices. They may be required to quick decisions for scaling up and deployed in a way to ensure
handle various applications as well, each down expandability like elasticity engine
application consisting of large number of Algorithms should work efficiently
end-user components. In these cases, fog even while working over large
system is needed to handle large number scale
of devices. They must scale up and down
frequently according to the requirements
Federation Geographical distribution of fog system Collaboration algorithms are There is a need for mutual understanding
P2 deployment where FNs and cloud owned responsible for outsourcing and between all the service providers to
by different providers requires federation insourcing decisions taken at the guarantee better management of
among all the providers to execute the ends of different providers communications between application
sections of the fog system sections
Diversity Fog stratum and cloud stratum consists of Algorithms must consider the There is a need to take into account the
P3 nodes which are diverse with storage and constraints of various fog nodes in diversity while deciding which
processing abilities. Fog framework must the models and operations components should be deployed and
be capable to handle this diversity where
Portability Application layer of the fog system Algorithms are required to manage Need of architecture packages such as
P4 architecture consists of mobile devices. and improve the mobility handling mobility engine to guarantee stability of
Fog system must be capable to handle service
this mobility
Quality of Fog system proves to be advantageous as QoS management algorithms are Need of architecture modules such as
service compared to other architectures in real required to ensure that QoS migration engine to ensure good QoS to
management world use cases because of closeness of benchmark is met the user
P5 FNs with devices. Though, QoS
management needs to be considered since
latency depends largely on where the
application layer is located
Compatibility As a part of federated system, different Algorithms must consider the Appropriate signalling, control devices
P6 components of applications might be requirements of a fog node on and data interfaces are needed to ensure
hosted over architecture provided by which it is deployed in their models compatibility
various providers. Thus, fog system and operations
needs to be compatible with different
architectural modules and should be
operable over different levels of
providers

(c) COPD Healthcare: The architecture put forward by (d) Speech and Parkinson’s disease ailments healthcare
Fratu et al. [66] assists people suffering from COPD. assistance: FIT architecture has been put forward by
Fog frameworks prove to be promising because these Monteiro et al. [68] which handles the speech data
diseases require assistance with minimal delay. It generated by edge sensors associated with the patient.
takes assistance from eWALL observing frame- An architecture for telehealth use cases has been put
work [78]. F2C is an architecture put forward by forward by Dubey et al. [69] in which filtering pro-
Masip-Bruin et al. [67], which also targets people cedures takes place over speech data.
suffering from COPD. This architecture covers
components ranging from cloud layer to the fog
layer. This helps is real-time observation and data (2) Connected Vehicles Architecture: Various authors
collection generated by edge sensors associated with have utilized the fog framework for connecting
the patient. vehicles in real-time. VFC architecture has been put
forward by Hou et al. [70] for use cases related to
automobile. Vehicle acts like infrastructure for
transmission and computation. Computational capa-
bilities of vehicles have been considered to record
the effect of portability on transmission and

123
Cluster Computing (2022) 25:1111–1154 1123

Table 5 Major aspects and constraints for the architecture for generalized applications of fog systems
Field State-of- Performance metrics Major contribution Parameters
the-art
P1 P2 P3 P4 P5 P6

Resource Agarwal Reaction time Put forward a framework for resource distribution which N N Y N N N
Handling et al. [54] Server request, consists of an algorithm which divides work layers
processing time
Server loading and
net expenditure
Kapsalis Regular execution Put forward a framework for resource management and N Y Y N Y N
et al. [55] time and delay workload balancing between cloud and the fog
Number of tasks
Cardellini Application delay Proposed an addition to Storm to implement a QoS-aware Y Y Y Y Y Y
et al. [56] Average delay scheduler
Traffic between
nodes
Average node usage
Communication Krishnan Delay Put forward a process to shift computation from cloud N N N N N N
Problems et al. [57] Internet stream of server to fog stratum
traffic
Aazam Uploading data and Put forward a framework for FC within a gateway N N N N N Y
et al. [43] organization delay
in the cloud
Slabicki Transmission delays Analyse the intra-layer transmission among user devices N N N N Y N
et al. [58] in: in edge layer
Direct transmission
Transmission from
fog
Transmission from
cloud
Usage Giang – Put forward a prototype for IoT use case assistance, in Y N Y Y Y Y
Provisioning et al. [59] which the geology is shown as directed graphs
comprising of nodes
Hong et al. Delay Put forward an advanced programming model for IoT use Y N Y Y N Y
[60] Workload case assistance
distribution
Network traffic
Yangui End-to-end delay Put forward a layer-based architecture covering both cloud Y Y N Y Y Y
et al. [61] variation and fog. It focuses on two principles i.e. use REST for
interactions, extend the existing PaaS
Cloud-Fog Zhankieev –– Put forward an architecture that enables federation N Y Y N N Y
Federation et al. [62] between fog and the cloud

computational ability. Similarly, FSDN has been put waste management and travel. The edge layer
forward by Truong et al. [71] for VANETs. It comprises of smart sensing devices which filters
empowers fog framework and SDN. data and guarantees live interaction. Smart observa-
(3) Smart Living Architectures: Similar to healthcare use tion architecture has been put forward by Brzoza-
cases and vehicle connectivity through fog system, Woch et al. [73] which assists telemetry systems.
various authors have utilized the fog framework to They can provision a computerized flood alert
enhance people’s lifestyle by making it more auto- system.
mated. It assists people to live in smart environment. (4) Miscellaneous Use Cases Architectures: Similar to
Li et al. [72] put forward an architecture that the use cases discussed above, many usages like
enhances the smart living use cases like energy, WSNs, industrial and large-scale IoT, big data

123
1124 Cluster Computing (2022) 25:1111–1154

Table 6 Major aspects and constraints for the architecture for specific applications of fog systems
Field State-of- Performance metrics Key methodologies Parameters
the-art
P1 P2 P3 P4 P5 P6

Heathcare
usage
Healthcare at Stantchev – Put forward a framework for aged people wellness. N N N N N N
Large et al. It consists of a methodical view of wellness use
[63] cases using BPMN
ECG and EEG Gia et al. Data rate and latency Put forward an IoT-aided health tracking N N Y Y N Y
feature [64] comparison framework to assess ECG to aid in treating
extraction diseases associated with heart
Zao et al. – Put forward a framework which consists of fog and N N N N N N
[65] cloud in physiological signal processing and data
handling
Focus on Fratu et al. – Put forward a framework for use cases that aids N N N N Y N
COPD [66] COPD patients
Masip- Oxygen levels vs portability Put forward a framework known as F2C to aid N N N Y N N
Bruin IRR for re-admittance rate and COPD patients
et al. respiratory death
[67]
Focus on Monteiro Speech signal Put forward a framework called FIT which analyses N N N N N N
speech- et al. Zero-crossing rate the medical voice data of patients
related [68]
Short-time energy
diseases
Dubey Efficiency attained in different Put forward an architecture for telehealth N N Y N N N
et al. situations by processing on applications. They study a patient’s voice samples
[69] fog in terms of time with speech disorders
Connected Hou et al. – Put forward an architecture for applications like N N N Y N N
vehicles [70] Vehicular Fog Computing. In this, automobiles
act as infrastructure for transmission
Truong – Put forward a framework that leverages fog N N Y Y N N
et al. computing and SDN
[71]
Smart living Li et al. Latency Put forward a framework for applications that aids N N N N N N
[72] smart living
Brzoza- – Put forward a framework for smart supervision to Y N N N N N
Woch assist computerized flood threat assessment
et al. system
[73]
Miscellaneous Aazam Uploading data and Put forward an architecture for emergency alert N N N Y N N
use cases et al. organization delay in the
[74] cloud
Gazis Packet number Put forward AOP in which the fog is located at N N N N Y N
et al. CPU Usage gateway
[75]
Xu et al. Overcrowding space Put forward a framework for data analysis using N N N N Y Y
[76] Data SDN

analysis, energy handling gets benefitted from the maintenance of store equipment by considering
fog system. Aazam and Huh [74] have put forward qualities and configurations of each machine, while
E-HAMC architecture. It takes assistance from a Xu et al. [76] also put forward an SDN-based
mobile application that runs on smartphone of a user architecture for big data analysis.
consenting to contact the government emergency
helplines. Gazis et al. [75] put forward an architec-
ture to assist industrial IoT that permits analytical

123
Cluster Computing (2022) 25:1111–1154 1125

3.3 Algorithms deployed in the fog stratum 3.3.3 Energy utilization algorithms in the fog framework

In this subsection, generalized as well as use case-definite The ever-increasing demand for energy has concentrated
algorithms have been put forward for the FC. These con- research works towards efficient energy utilization in
siders calculation, storage, dissemination, and energy uti- computing frameworks especially the fog framework.
lization. Table 7 highlights the state-of-the-art to propose Sarkar et al. [87, 88] have examined the energy utilization
various general as well as use case-definite algorithms. in the framework while Deng et al. [89] has addressed
design flaws and introduced some strategies which target
3.3.1 Computing algorithms in the fog framework reduction in energy utilization.

A handful of algorithms have been outlined in the survey 3.3.4 Specialized use case algorithms in the fog framework
amongst the numerous algorithms proposed for computa-
tion in the fog framework. Firstly, resource distribution, A few research attempts have been put together to provide
then task planning and after that workload balancing and the use of case-specific algorithms for fog framework.
content dissemination algorithms have been discussed. Here, the authors have discussed the algorithms which have
been proposed aiming at healthcare and some miscella-
(1) Resource Division: Resource division and collabo-
neous applications.
ration amongst the FNs are among the most impor-
tant factors involved in determining the (1) Healthcare Usage Algorithms: Gu et al. [90] and Cao
computational abilities of fog framework. Abedin et al. [91] have reviewed the part of fog framework
et al. [79] put forward an algorithm that enhances the in healthcare usage. While the former focuses on
resource division capabilities in the same domain to increasing the efficiency of resource distribution and
meet the end user’s computational demands. Nishio usage in the fog layer to reduce the transmission and
et al. [80] also addresses the same problem for a VM distribution cost, the latter put forward an
portable fog system. algorithm for fall determination and assessment for
(2) Task Planning: The ambiguity which arises while alleviating strokes. They considered the distribution
allocating a FN to execute a particular task at a given of components over the fog and cloud layer.
time has been addressed by Zeng et al. [81] and (2) Miscellaneous Usage Algorithms: Various applica-
Inthrawijitr et al. [82]. They consider fog and the tions such as UV radiation measurement and control,
edge layer comprising of the IoT devices video streaming, smart parking management, and
concurrently. gaming have been covered by Mei et al. [92], Tang
(3) Workload Balancing: Task planning involves reduc- et al. [95], Kim et al. [93], Lin et al. [94]
tion of delay, energy utilization as well as task respectively. Mei et al. [92] focus on detecting the
impeding probability. This might unbalance the UV radiation with the help of IoT-enabled cameras
workload on a particular node. This problem located in the vicinity of a radiating device. Tang
demands algorithms that work towards balancing et al. [95] review collaboration amongst IoT devices
the workload amongst FNs. To tackle this, Ningning to improve QoE during watching videos in the
et al. [83] and Li et al. [84] have put forward mobile network. Kim et al. [93] put forward an
algorithms that can provide assistance while alloca- algorithm to improve the collaboration between
tion of tasks in a balanced manner. motor cars and parking slots. Lin et al. [94] put
forward a gaming system also known as CloudFog
which utilizes FC to enhance QoE.
3.3.2 Content dissemination algorithms in the fog
framework A schematic representation of association between var-
ious schemes for handling fog resources and service pro-
Content dissemination is a crucial characteristic in the fog visioning is shown in Fig. 12.
framework and the issues related to it must be considered
to improve the end user experience. In the previous works, 3.4 Research opportunities and challenges
Do et al. [85] and Chen et al. [86] have put forward
algorithms to ensure the fog system’s proper working. This section highlights the architectural and algorithmic
challenges and research opportunities that have not been
discussed yet in the previously mentioned works in
Tables 5, 6, and 7.

123
1126 Cluster Computing (2022) 25:1111–1154

Table 7 Major aspects and parameters for algorithms for fog


Field State-of-the-art Key methodologies Parameters
P1 P2 P3 P4 P5

Computing in
the fog
system
Resource Abedin et al. Put forward an algorithm to allow resource sharing between fog nodes N – Y N N
division [79]
Nishio et al. Put forward an algorithm to optimize resource sharing along with improving N N Y N Y
[80] corresponding utility
Task planning Zeng et al. [81] Put forward image placement and task scheduling algorithm to minimize overall N N Y N Y
runtime
Intharawijitr Put forward three policies to choose fog nodes to run tasks N N N N Y
et al. [82]
Workload Ningning et al. Put forward dynamic work balancing algorithm in the fog layer that helps in N – N Y Y
balancing [83] managing entry and exit points of fog nodes
Li et al. [84] Put forward an algorithm to handle sluggishness in computation in FC N N Y N Y
Content Do et al. [85] Put forward an algorithm to improve the dissemination of content over FNs N – Y N N
dissemination Chen et al. [86] Put forward a new algorithm to effectively share resources to distribute content to Y N N N Y
users
Energy Sarkar et al. Examine the performance of FC-based gadget, considering energy utilization, Y – N N Y
utilization [87, 88] service delay and CO2 discharge
Deng et al. [89] Put forward an algorithm to balance workload between cloud and fog layer at N N Y N Y
minimum power cost
Healthcare Gu et al. [90] Put forward an algorithm to handle medical systems N – Y N Y
usage Cao et al. [91] Put forward a system to identify individual falls – – – – Y
Miscellaneous Mei et al. [92] Put forward an algorithm to measure UV radiations N – – – N
use cases Tang et al. [95] Put forward a cooperation model among users for video streaming N – Y N Y
Kim et al. [93] Put forward an algorithm to match vehicles and parking slots N – – Y N
Lin et al. [94] Put forward an algorithm to improve the gaming experience in fog computing Y – Y N Y

3.4.1 Architectural research opportunities and challenges with mixed clouds and is stretched to also take into
account the fog framework. Various suitable mecha-
This subsection reviews crucial architectural research nisms for the use cases are developed for various
opportunities and challenges that need to be brought into domains which have attracted a lot of research
light to improve the fog framework. Table 8 gives an works. ‘‘Choreography’’ and ‘‘orchestration’’ [97] are
outline of these opportunities and challenges along with the one of the most important mechanisms, where the
related literature, prospective solutions, and setup ideas. former permits cooperation in a disseminated man-
ner, and the latter permits a centralized system to
(1) Expandability: Some state-of-the-art literature has
regulate the interaction between various parts.
already reviewed the expandability parameter. The
(3) Diversity: Some state-of-the-art literature has already
edge devices along with various domains involved in
reviewed the diversity parameter and most of them
the fog system must be compatible with the resources
have expected developers to regulate the diversity in
that have been expanded to take into account the
their applications. The appropriate definition of the
issues arising while and after the expansion. Dis-
semantic set of terminology used in a domain [98]
seminated and mixed cloud resolutions can be
and representing the links between them is crucial to
implemented to solve the issue. Some of them have
span various kinds of FNs and IoT devices in the fog
been reviewed in [96].
and edge layer assisting in handling diversity. The
(2) Federation: Some state-of-the-art literature has
definition of such semantic sets has attracted various
already reviewed the federation parameter. The
researchers and some state-of-the-art literature
solution that has been put forward is compatible
related to multiple and diverse cloud service

123
Cluster Computing (2022) 25:1111–1154 1127

Fig. 12 Association of schemes for resource handling and service distribution in FC

providers [99] can act as a setup point for the [71], the VANET framework that is strengthening
definition of related sets for the FC. the fog framework, can be expanded to assist IoT and
(4) Portability: Some state-of-the-art literature has edge devices’ portable nature. Dissemination of large
already reviewed the portability parameter and one number of portable FNs to enhance the collaboration
prospective resolution of this issue could be the [70] poses a challenge in the implementation of the
expansion of the current state-of-the-art architecture framework, which ultimately helps in minimizing
to span across all the portable devices. The author in delay during movement of FNs.

123
1128 Cluster Computing (2022) 25:1111–1154

Table 8 Review of architectural and algorithmic constraints and research prospects


Evaluation Architectural aspect Algorithmic aspect
parameter
Experimentation Known Prospective Experimentation Known constraints Prospective
constraints solutions and solutions and
outsets outsets

Expandability Design systems that Does not suggest Make and Authenticate Authenticate over Use machine
support scaling of a general combine algorithms small quantities learning
resources of involved solution or only upstream over huge in unreal techniques to have
domains in fog layer tackle one part modules with quantity in environments a clear vision of
and devices in of the whole global aspect of real-world real-world
application layer system fog stratum for environment evolution of usage
along with scaling Supports healthcare and service
resources from cloud expansion of Expand present consumption at
either fog or cloud service the end of IoT
application providers for fog devices
layer resources
reporting and
recognition
Federation Make Absence of Make a Design Possibility of Consider dynamic
suitable composition architecture or disseminated algorithms for working inside strategies and
mechanisms for the prototype composition federation in federated game-theoretic
applications’ implementation engine fog system systems is not approaches to
components consisting of taken into make suitable cost
multiple intra- account and insourcing/
communication outsourcing
enabled local algorithms
engines
Adaptation of
cloud
choreography-
based solutions
Diversity To compose a fully Put the load of Expand object- Have a clear Absence of Study computing
comprehensive and managing oriented perspective of agreement on the and resource
flexible definition diversity on principles of the extent of extent of usage of current
application cloud diversity with diversity among nodes
developers architecture respect to nodes and IoT Plan the
while defining computing and devices with dimensioning and
common terms storage power respect to placement of extra
for the diverse computing and nodes in the fog
fog system storage power system
resources
Portability To design systems that Does not suggest Modify current Confirm the Absence of real Take into account
considers portability a general work on fog to continuous portability real-world
of IoT and fog nodes solution and handle all the working of models portability traces
along with cloud supports portable items in offered Did not consider Make portability
nodes mobility of a fog stratum services fog node prediction models
either fog or (e.g. the despite the portability Handle fog domains
application VANET system) movement of
with respect to fog
nodes Use MCC and fog nodes and
node portability
routing systems IoT devices
(e.g. expand
and adapt clustering models
placement and from WSN)
handling
techniques to
fog system
specifications

123
Cluster Computing (2022) 25:1111–1154 1129

Table 8 continued
Evaluation Architectural aspect Algorithmic aspect
parameter
Experimentation Known Prospective solutions and Experimentation Known Prospective solutions and
constraints outsets constraints outsets

Quality of To compose Extend a Modify pure cloud SLA to Consider Mostly Combine various QoS
service suitable SLA simple include more elements different focus on parameters in the
management management cloud- like energy-limitation, Quality of the limitations and motive of
techniques based portability-sensing, and Service latency problems and take into
schema that resource limitations of parameters account multi-objective
aims at the fog nodes improvement strategies to
explaining solve them
latency
Does not
include all
the service
providers
within the
fog
ecosystem
Compatibility Design signalling, Absence of Develop cloud depiction – – –
control, and data inter- paradigm to describe and
interface domain cover the descriptions of
between many agreement the FNs
domain parts of No working Describe management,
the fog stratum interfaces’ transmitting and edges
standards using prototype for
using such regulatory interfaces
an
agreement

(5) Quality of Service Management: Some state-of-the- is to expand and implement ODBAPI to incorporate
art literature has already reviewed the QoS regulation the assistance of the fog layer.
parameter and a prospective research opportunity is
SLA handling, while a possible resolution that can be
3.4.2 Algorithmic research opportunities and challenges
implemented is a cloud-assisted SLA. This solution
is applicable only for SLA owned by the same cloud
This subsection reviews crucial algorithmic research
service provider [100]. Modern multi-cloud sup-
opportunities and challenges that need to be brought into
ported SLA is supported by aggregation of the
light to improve the fog framework. Table 8 gives an
agreements. The literature [101] puts forward a
outline of these opportunities and challenges along with the
prospective solution to multi-cloud supported SLA
related literature, prospective solutions, and setup ideas.
handling and negotiation related to VNE and this can
act as a setup point. (1) Expandability: Some state-of-the-art literature has
(6) Compatibility: Some state-of-the-art literature has already reviewed the expandability parameter. A
already reviewed the compatibility parameter. prospective research opportunity is to execute appli-
Though, none of them satisfy the two constraints cations and assess them over a huge scale. This is
discussed below [102–104]. One of them is the inter- impracticable because of the costs incurred. We can
domain contract and the other one is the working accomplish such a description by assessing the
interfaces’ guidelines deploying such contracts. A related real-world applications, through various ML
prospective research opportunity for enhancing com- techniques [105, 106].
patibility is the development of signalling interfaces, (2) Federation: Some state-of-the-art literature has
regulatory interfaces, and data interfaces among already reviewed the federation parameter and they
various fog and cloud layers. A possible resolution have indicated that the federation amongst various
service providers is an issue that is largely

123
1130 Cluster Computing (2022) 25:1111–1154

overlooked. Therefore, a large number of opportuni- regulation parameter. Though the delay is a crucial
ties are available in this regard. Some questions aspect in enhancing QoS, other metrics such as
remain unanswered, the first being that in the same bandwidth allocation and resource allocation should
federation, how are the leasing prices decided by the also be taken into consideration. These metrics have
service provider? Second, at which point of time created new research opportunities and some works
does the service provider determine outsourcing and of literature [81, 109] have incorporated some
insourcing concerning additional service providers algorithms and put forward some possible solutions
linked with the federation? A few possible resolu- based on them.
tions that can be implemented are dynamic schemes (5) Portability: Some state-of-the-art literature has
[107], and game-theory assisted solutions as they can already reviewed the portability parameter. Most of
help to develop appropriate outsourcing/insourcing them have overlooked practical portability proto-
algorithms and resource pricing models. types. Thus, a prospective research opportunity is to
(3) Diversity: Some state-of-the-art literature has already develop practical prototypes. We need to incorporate
reviewed the diversity parameter. A few prospective VM migration [110] in models after performing the
research opportunities can be found while answering necessary assessment. Apart from this, precise fore-
the following two questions. While the first is to casting models can assist algorithms in real-time.
determine the extent of diversity due to the current
edge/IoT devices and FNs present in the fog
3.5 Present research challenges and potential
framework, the second is the determination of
opportunities
dimension, computational capabilities, and place-
ment position of the additional FNs to assist the
In this subsection, the authors have reviewed some research
existing edge devices acting as FNs. Some possible
challenges and future opportunities. Table 9 provides an
solutions are reviewed in [108].
outline of these challenges as well as prospective
(4) Quality of Service Management: Most of the state-
opportunities.
of-the-art literature has already reviewed the QoS

Table 9 Review of challenges and opportunities


Concerns Explanation Purpose Impact Experimentation

Cache or Sharing of available resources Find efficient method Steiner tree method to analyse To take into account the
resource should be done to give to share resources sharing of resources in delay caused due to
sharing permission to user with minimal FNs [113] transmission and
expenditure computation
Data centre with multi-level server Satisfy requirements Stackelberg game model is put Various factors should be
framework is taken into account for all fog nodes with forward to find best sharing studied while developing
diverse framework of among multiple fog nodes the model between advisor
the data server and follower
Energy Energy can be saved using nano- Detect type of uses Determined criteria like amount Detect energy saving use
consumption DCs (nDCs) in TN premises by which saves energy of downloads, updates and the cases while being executed
applications which generate and Develop complete loading of data for the use on disseminated nDCs
distribute data regularly energy utilization cases that can use nDCs inspite of central nDCs
prototype for content
dissemination
DC’s power Carbon emission of DC is Find a method to FC-aided architecture has been Fog resource organization
consumption noticeable as it works for a large develop a framework put forward for functional
amount of time and runs huge to decrease carbon application
data discharge
Load Edge nodes enters and exits any Cloud quantization Graph division of VMs Enhance the performance of
Balancing or FC state regularly method on FN active workload assessing
Service algorithms
Allocation Assist various latency-restrictions Decrease delay to QoS-aware service allotment The effect of time taken by
access services challenge is articulated as job allotment
optimization challenge Highest permissible latency
to access assets

123
Cluster Computing (2022) 25:1111–1154 1131

(1) Application Offloading: The offloading provision in 4 Fog computing applications


the fog framework aids the use cases that are not and challenges
efficient while executing them on EU’s devices.
Although, it is not always effective considering the This segment deals with different real-world applications
bandwidth, latency, and energy utilization [111]. of FC [11, 114]. These applications will bring into light the
Thus, prior to offloading, it is crucial to determine necessities and attributes related to FC architecture
the metrics that are impacting the performance. deployment over real-world use cases.
Forecasting of the performance after offloading will
result in better decision-making capabilities. 4.1 Industrial use case settings
(2) Real-time Assessment Position: A real-time assess-
ment is crucial for offloading [109] in FC. Maximum In this subsection, the authors have discussed some
effectiveness and minimized traffic can be achieved industrial applications and have highlighted the role and
by solving a major challenge in the determination of assistance provided by the fog computing architecture.
applicable position of real-time assessment [111]. Some of these applications are (1) smart conveyance, (2)
(3) Resource Handling: Effective resource distribution is smart farming, (3) smart energy management, and (4)
a crucial research topic due to the reduced availabil- smart waste organization.
ity of FC computing resources in contrast with CC. Every conveyance vehicle is equipped with sensors and
(4) Virtualization: Placement of minute DCs nearer to various transmitters to send signals. These sensors can
the network edge prove to be promising in offloading perform large number of functions ranging from location
the task and storage needs, along with the reduction tracking to pollution measuring through IoT devices. Fig-
in traffic over the network and cost incurred in ure 13 demonstrates the role of fog framework in smart
infrastructural setup. transportation. The IoT devices use Wi-Fi and 4G com-
(5) Standardization: Standardization assists in efficient munication technologies to connect with the FN in order to
communication for security, handling, and testing. perform task equivalent to ICOs. The FNs and gateways
OpenFog Consortium [112] is aiming to standardize are majorly fitted at the bus stops, so that, whenever a
the FC. vehicle reaches a stop, the data is transferred to FN for

Fig. 13 Smart conveyance

123
1132 Cluster Computing (2022) 25:1111–1154

Fig. 14 Smart farming

Fig. 15 Smart energy management

further analysis. Various institutes then use this data for


various research and development purposes.
Smart farming till date, majorly involves the use of the
following projects: Phenonet [115] and OpenIoT [116].
Phenomobiles, static sensors, and blimps are deployed in
the edge layer of the fog framework. Figure 14 demon-
strates the role of fog framework in smart farming, where
use of fog can prove to be revolutionary for the whole
agriculture sector. These devices generate data which is Fig. 16 Smart waste organization
then sent to FNs for further usage and analysis.

123
Cluster Computing (2022) 25:1111–1154 1133

Smart energy grids are crucial to guarantee depend- 4.2.2 Smart conveyance system
ability, readiness, and productivity in the large-scale pro-
cess of electricity supply. Figure 15 shows the use of fog FC could be very crucial while implementing ITS [121].
architecture in energy management. This will help to make This uses cloud computing to execute the application [122]
the production, transmission, and utilization efficient. and the data is gathered systematically through network of
Additionally, this will assist in reduction of carbon foot- interconnected vehicles. However, the delay caused due to
print by increase in focus on renewable energy alternatives. the use of cloud computing is a major setback for this kind
Smart waste organization [117] involves the collection of application. FC is more efficient in VANET [12] due to
of garbage along with the data related to it through various the topological assistance, live workload handling, and
sensors equipped at the IoT-bases garbage bins and net- localized decisive methods. Vehicles and other roadside
work points. These IoT-aided sensor devices then transmit infrastructure are vital for the efficient functioning of fog-
the recorded data to FNs located in the vicinity. Figure 16 based architecture. These act as FNs and thus bring the
shows the assistance provided by fog architecture in computational capabilities near the end user, resulting in
organization of waste. The data is then processed and sent the reduction of delay and increase in privacy. Some state-
to various institutes for research and development of-the-art literature [123, 124] reviews various features and
purposes. prerequisites of the FC based transportation systems.
FC architecture is potentially seen as a game changer in
the context of energy consumption and latency as com- 4.2.3 Smart energy management
pared to higher energy consumption and latency in cloud
computing architecture. The authors in [88, 118] have Compatibility, interactivity, and efficient performance
performed a comprehensive analysis of latency and energy metric measurement among the different devices in the
consumption. They have taken into account the operational edge layer; implementation cost; provision to provide
cost incurred due to CO2 discharge in the environment and customizable services are the major challenges in efficient
have considered fog computing facet of the same. Jalali handling of energy-based application systems. These
et al. [111] put forward a system that considers things like challenges were discovered by Al Faruque et al. [125].
kind of access medium, fraction of working to non-working Cloud computing assists energy management through
time of connected edge and fog devices, number of provisions such as IaaS, PaaS, and SaaS. However, fog
updates, hops, downloads, and pre-loaded data. Ultimately, computing proves to be promising by giving crucial reli-
the motive is to deploy nDCs for use cases that produce and able services [126] for the power handling platforms. It
disseminate enormous data at end user level. also provides pre-processing feature while fulfilling the low
delay demand.
4.2 Challenges in real-world applications
4.2.4 Large-scale wireless sensor networks
Fog computing aids numerous use cases in the real-world,
as the FNs gives storage capabilities to host applications. Industries generally deploys various types of robotic fix-
Additionally, features like configuration, quality of service, tures, machines, chemical reactions, etc. to perform a
privacy, and security help fog architecture manage massive plethora of large-scale activities like production, assem-
applications at the network edge. Thus, FC can provide bling, etc. With the emergence of Industry 4.0 [127],
solutions to various limitation posed using computing machines and robots have become an inseparable part of
frameworks far away from the edge. These solutions and the smart factories. They have a key role in making the
challenges have been reviewed in Table 10. The detailed industries more automated and aids human in production
discussion is as follows. and safety. The use of many machines leads to the gener-
ation of enormous data transmitted to large cloud servers
4.2.1 Remote gaming for processing, analysis, and storage. In fog-based indus-
tries [128], the data servers are in the vicinity of the end
In distant gaming environments [119], the end users have users or the factories which makes the process faster. Fog
an option not install game on local device, and they can gateway nodes are used to communicate directly with the
fetch the game in real-time from a server accessible FNs.
through the Internet. One way to reduce the load is by
using portable-clients and managing all the computational 4.2.5 Smart cities
requirements at the server. GamingAnywhere [120] is a
gaming platform constructed for high mobility, and it can The different use case scenarios reviewed in Sect. 4.1
also be reconfigured. highlights various features of fog computing in required in

123
1134 Cluster Computing (2022) 25:1111–1154

Table 10 Classic use cases of fog computing


Use cases Attributes and challenges Contribution of FC to solve the challenges

Distant gaming Offload the data requests quickly A gaming platform with mobility support,
rearrangement and high expandability should come
into place
Smart Confidentiality, trust issues Vehicular FNs provide regional service by improving
conveyance numerous vehicular networks criteria
model Numerous confidentiality issues have been addressed
and solutions have been suggested
Trust challenges in crowdsensing applications are put
forward
Application development and maintenance is tough due to Requirements of use case model and programming is
disseminated behaviour of fog computing discussed but a concrete model is still not into place
To handle high communication and computation for vehicular use Vehicular FC is put forward which uses automobiles to
cases expand transmission. Connectivity, transmission, and
portability of automobiles is taken into account and
the issue is addressed
Access control in facilities to defend the confidentiality is Characteristic-based management is tackled
important because there is large amount of penetration between
human-vehicle interface
Smart energy Energy management platforms must be capable to customize, Power managing-as-a facility is proposed, FC gives
management adapt, scale for different types of uses and infrastructure freedom, compatibility, data confidentiality and real-
Compatibility among diverse gadgets in power handling platforms world aspects needed for power handling
Large-scale Large data pool and handling ability, less energy usage, real-world Power effective and latency-aware web coverage
wireless sensor usage service is put forward
networks Handles different protocols and data layout from extremely Adaptive operations platform is proposed to maximise
different records operational efficiency
Decision making A model targeting to lessen traffic by using computing
services near the network edge
Large-scale systems consist of cloud and edge that pose different Constant computing framework permits endless
software environment computing across multiple domain use cases
Smart cities Location tracking and low latency use cases, where most of the Stack4Things is put forward to execute SassS method
code is run on edge layer
Smart waste management which consists of various steps like FC helps to minimise data transmission by smartly
waste compilation, shipping, segregation, treating and observing sending information to cloud
waste generation
Monitor plant growth, tree cover and climate keeping in mind the Intelligent arrangements to conserve energy by
time and location removing unimportant sensing and communication
Due to relation between edge gadgets, target search requests can Cyber peers’ social virtual objects (SVO) can be setup
be executed in an optimized way in the fog framework
Health and To reduce latency in response time A FC-aided BCI is put forward, data is pre-processed in
wellness mobile devices acting as fog nodes

the smart city model. A framework based on fog archi- 4.2.6 Health and wellness
tecture to deploy and implement many short-range, loca-
tion-based, and low-delay devices is proposed in [129]. A FC-aided BCI application was put forward by Zao et al.
Another approach assisted by sensing and Stack4Things [65] which processes the EEG data to minimize the delay.
[130] has been put forward. A system to track live status of Some delay-sensitive features like emergency notifications
many vehicles at a time using a specific algorithm is pro- are hosted on this application [132]. Cloud computing
posed in [131]. proves to be promising to store and analyse enormous
amount of data. Aazam and Huh [74] put forward a
smartphone-aided application service, known as E-HAMC

123
Cluster Computing (2022) 25:1111–1154 1135

Table 11 Review of FC in healthcare-IoT


State-of-the- Applications and Suggestions Result Aim
art

Vora et al. A fog-based platform for application Enhanced response, power utilization Decrement in latency, energy and
[134] adaptation layer and lessen traffic bandwidth consumption
Wu et al. Multiple modal fusion schemes for wellness Decreased latency and platform for Decreasing latency; multi-radio
[135] and nursing monitoring data coexistence
Ullah et al. De-duplicated information supply in H-IoT Decrease in network traffic and Data protection; decrement in delay,
[136] response time, improved security power and bandwidth use
Rahmani et al. Fog-architecture based H-IoT system for a Reducing the delay by 48.5% Decrement in delay; power utilization;
[137] initial phase caution device bandwidth consumption
Siddique et al. CS based data compression algorithm 59% savings in energy for 40% Improved energy efficiency
[138] estimate
Rias et al. Cloud and fog based Ipv6 assisted Decreased traffic flow and increased QoS development; Enhanced power
[139] architecture bandwidth consumption productivity
Ramalho et al. MeCA scheme by means of a related Decrement in traffic production, Enhanced resource productivity
[152] approach battery, and CPU consumption
Jangra et al. Multiple layer architecture for Healthcare Energy saving by employing a fused Improved power efficiency
[140] and wellness IoT compression model
Muhammed UbeHealth is a Healthcare and wellness IoT Decreased delay and power Improved QoS
et al. [141] architecture consumption
George et al. Information sorting at fog node Enhanced bandwidth consumption Improved QoS
[142]
Azimi et al. Mixed tiered model for H-IoT Enhanced precision using Improved QoS
[143] convolutional neural network

evaluates various state-of-the-art literature present in the


healthcare and wellness paradigm of FC [133].

4.3.1 Categorization of FC in healthcare 4.0

This subsection discusses categories of FC in the field of


health and wellness. Figure 17 demonstrates various cate-
gories for FC in health and wellness.

4.3.1.1 Health data This category comes into play when


data is generated by various end user devices by sensing,
observing, analysis, and simulation of illness. This stage
has two major steps namely, data collection and data
analysis.
Fig. 17 Categorization of FC in healthcare 4.0 • Data collection: The sensors deployed in the edge layer
generate huge amount of data by utilizing minimal
where FC assists in offloading and makes the use of power and cost. These are responsible for taking data as
location and context-awareness to increase the efficiency. input from the user owing to their edge deployment.
Vora et al. [134] reviews the features of FC in health
4.3 Job of fc in healthcare 4.0 and wellness.
• Data analysis: At this substage, data is analysed and
In this section, the authors briefly review the categories and according to the configuration and capabilities of the
working of fog-based healthcare architecture. This section framework, it is distributed to various cloud servers for
also covers the role of fog layer in the implementation of further processing, and simulation [144, 145].
latency-sensitive healthcare architectures. Table 11

123
1136 Cluster Computing (2022) 25:1111–1154

4.3.1.2 Fog node configuration This layer includes ser- a hub made of various revolutionary services. There are
vers and various networking protocols along with cloud- various innovative solutions that still need to be
lets. To manage all these protocols and devices, Peralta addressed in FC and its role in healthcare.
et al. [146] put forward a MQTT which is an IoT protocol
for communication. He used a less complex computational
4.3.2 Healthcare system framework
layer.
In this section of the survey, the authors review a three-
4.3.1.3 Security and privacy
layer fog-aided health framework. Figure 18 simulates this
• Security aspect A running prototype which gathers framework and clearly shows that the major three layers
ECG data from a device using FNs was evaluated by are MDL, FL, and CL. This covers everything from data
Akrivopoulos et al. [147] for steadily transferring them collection to processing, and analysis to cloud layer.
to some organizations. He et al. [148] put forward a
framework for safe transmission [149]. 4.3.2.1 Medical device layer (MDL) Different IoT-aided
• Privacy aspect To safeguard privacy of a patient, biomedical devices strengthen the patients’ data collection
Elmisery et al. [150] put forward a cloud-aided service in healthcare 4.0. This data assists doctors to monitor the
to create accurate conclusions. patients through remote sensing [153].

4.3.2.2 Fog layer (FL) The collected data then reaches FL,
4.3.1.4 eHealth services
where it is processed and transmitted for more analysis.
• Biomedical devices: A health and wellness betterment This layer consists of various FNs and they are further
fog-aided framework was put forward by Tasic et al. connected to various edge layer located biomedical devi-
[151] which consists of wearable device sensors, ces. Time sensitivity increases with FNs’ use and helps to
tailored biomedical devices, and transmitters to com- generate accurate and quick alerts in case of emergencies.
municate to the cloud which then feeds the analysed Figure 19 shows various challenges resolved by the pres-
data to various institutes. ence of the fog layer.
• Applications: Ramalho et al. [152] put forward a
comprehensive framework known as MeCa, which is

Fig. 18 Three-layer FC-aided health framework

123
Cluster Computing (2022) 25:1111–1154 1137

Fig. 19 Assistance provided by


FC in healthcare 4.0

4.3.2.3 Cloud layer The cloud layer consists of resource- instruction to control the framework. FC primarily pushes
rich computing data centers, which help control and data, switch network, and completes main tasks. It sys-
observe patients throughout the city. The presence of tematically collects and filters the gathered data.
resources in this layer allows complex computation to
occur, resulting in better monitoring of patients. It has 4.3.3.1 Pushing service It is the process of receiving and
different internal layers, which are mentioned below: uploading the data to/from the cloud. The fog layer acts as
a moderator among the MD and CL.
• Connectivity layer: This layer assists in creating
connections among devices, fog nodes, and the cloud
4.3.3.2 Switching network The data is available in vari-
layer.
ous formats, which incentivizes the use of different transfer
• Data management layer: This layer assists in linking the
protocols. An essential task for FC is to switch networks
cloud data from various sources, primarily fog nodes.
among cloud and edge layers.
• Application layer: This layer provides different services
like alert systems and big-data analytics.
4.3.3.3 Core service The two general works help FC
perform minute storing tasks and computation related
4.3.3 Communication between layers tasks. The most important task is to process the data on a
local machine.
Figure 19 demonstrates that the data received from various
biomedical sensors and other edge devices is transferred to 4.3.3.4 Aggregation and filtering Once edge layer is
FNs, which then processes it and then transfer it to the linked with IoT to generate data, sometimes there is no
cloud for further complex computation. FNs gives need to upload data to the cloud after some time. To

123
1138 Cluster Computing (2022) 25:1111–1154

Fig. 20 Roles and fog-assisted


IoT applications

manage this challenge, fog layer should have a feature to collection and distribution significantly. Some use case
perform collection and filtering. To do this fog layer needs applications of data dissemination are energy utilization
temporary storage and the availability of storage results in monitoring [154], local content dissemination [159], and
provision of aggregation and filtering in the fog layer. fog-aided computer security [160].

4.4 FOG-aided IoT use cases 4.4.4 Decentralized computation

This subsection introduces FNs’ crucial role, which helps The availability of storage and various other resources has
the framework support live services, persistent storage, and enabled multiple FNs to jointly execute data calculation.
data distribution. This survey article also provides some Computation offloading [157, 161–163] and big data ana-
classic use case examples to showcase FC’s role in IoT, as lytics are some general use cases of decentralized
demonstrated in Fig. 20. computation.
Apart from the major fog based IoT applications men-
4.4.1 Live services tioned above, some important use cases have also been
mentioned figuratively in Fig. 21.
With various kinds of storage and computational abilities,
FNs act as a group of mini private clouds in the vicinity of
IoT devices. Thus, many time-sensitive use cases can be 5 Security and privacy concerns in fog
created to achieve quick, decisive characteristics based on computing
gathered data. Some of the examples of live services are
smart traffic lights [17], healthcare and wellness [154], FC inherits its characteristics from cloud computing, and
vehicular navigation [155], home power handling [126], this results in the inheritance of the security and privacy
and network handling [156]. concerns as well. In this section, the authors have raised
various concerns in fog computing related to security and
4.4.2 Temporary storage privacy. With the quick increment in user base, there is an
increase in the number of attacks as well as the ways of
FNs are provided with some storage amount responsible for attacking the fog framework. The improvement in fog
the temporary maintenance of data gathered by end devi- framework will lead to addition of more advanced security
ces. This storage permits users to keep frequently used data features.
near to the edge. It helps to fetch data in an improvised
manner quickly. Some classic use cases of temporary 5.1 Fog framework security: problems
storage are caching [13], shopping cart handling [157], and and solutions
credential management [158].
In this subsection, the authors have reviewed various
4.4.3 Data dissemination problems related to fog framework security and how to
tackle these problems. Table 12 shows various security-
FNs transfer data gathered from edge to cloud servers and related problems in FC and their solutions in FC-aided use
disseminate it from cloud to edge devices, which creates cases.
network connectivity among the cloud and edge layer. The
presence of fog nodes has enhanced the process of

123
Cluster Computing (2022) 25:1111–1154 1139

Fig. 21 Fog-aided IoT


applications in smart city

Table 12 Security concerns and their solutions in FC


Task Threats Solutions

Real-world services Resistance to Sybil Attacks Mobile and cryptographic Sybil Defence
Interference Recognition Network and host-aided entry discovery techniques, Distributed entry discovery
techniques
User validation Character, anonymous, and collaborative validation
Lightweight Protocols Plan Trivial cryptologic schemes
Confidence Managing Monitoring and evidence-aided confidence prototype, Reputation management
Entry Supervision Position, feature, and gadget key handling policy
Decentralized Reliable Assisted Computation Server-assisted encryption, validation, key exchange, and function evaluation
Computation Reliable Data Assessment Encryption, Discrepant confidentiality
Certifiable Computation Confidentially and Openly certifiable computation
Data Distribution Safe Search Symmetric and Asymmetric Searchable Encoding
Privacy-protecting Packet Privacy-protecting Packet Transmission
Transmission
Privacy-protecting Data One-way trapdoor permutation, Homomorphic encryption, Homomorphic signature,
Accumulation Key distribution and Key agreement
Safe Content Dissemination Broadcast encryption, Anonymous encoding, Key handling model
Temporary Storage Safe Data Sharing Attribute, key, and proxy encoding
Confidential Data Recognition Symmetric encryption, asymmetric encryption
and Security
Data integrity security Provable data possession

5.1.1 Real-time services methods against the Sybil attacks. The unavailability of
storage results in insufficient data to detect a Sybil
FC has enabled various low delay IoT use cases. However, attack. Cryptographic and homomorphic encryption of
the presence of security issues affects the smooth func- data to prevent privacy leakage requires considerable
tioning of the fog framework. The users hold themselves computational supplies to analyse data in a Sybil attack.
back from full-fledged usage of the architecture. In this • Interference Recognition: The discovery of suspicious
work, the authors review these problems and propose some users in the fog framework can uncover malicious Fn
methods to tackle these issues. events. However, this is not always possible because of
the various features of IoT devices. The issues in
• Resistance to Sybil attacks: FC’s decentralized frame-
creating interference recognition and inhibition
work makes it challenging for the existing defence

123
1140 Cluster Computing (2022) 25:1111–1154

methods are still large in number [164]. A localized computation. In FC, the FNs cooperate and perform
security protocol is crucial in safeguarding the fog assigned distributive tasks. The fault in a node might
framework against possible attacks. propagate in results calculated by other FNs. The results
• User validation: Decentralized and low-delay services must be certified to ensure accuracy and detect any fault
of FC has imposed a massive hurdle on user validation. in a node or a group of nodes.
The portability and attacks focusing on user identity
revelation constitute a significant threat to the frame-
5.1.3 Data distribution
work’s functioning. Cooperative validation and other
such tactics can support users’ portability and latency
While transmitting data amidst the two-way communica-
constraints and validate users effectively.
tion through fog node, it is unavoidable to reveal confi-
• Lightweight protocols plan: Due to the constrained
dential data considering FC’s security and privacy
availability of computational resources, planning light-
problems. Secret point-to-point communication can assist
weight protocols is crucial for the framework to deliver
in the inhibition of attacks.
low-delay secure services and cryptographic keys can
be game-changing in reducing usage of computational • Safe Data Search: Various encryption methods [166]
resources, however, this might result in a minor can help in protecting privacy. However, leakages still
increase in delay due to extra computation. prevail in FC while searching encrypted data. The
• Trust management: The decentralization of fog archi- matching flag value of users’ data can reveal private
tecture makes it challenging to assess the reliability of data to outsiders. Therefore, protecting the privacy of a
the collected data and create a trust assessment plan. user is crucial.
Designing of low delay, decentralized, and scalable • Privacy-Protecting Packet Transmission: The FNs have
trust assessment model still requires many research access to packets being transmitted worldwide, and they
efforts. can observe the flow of packets in their areas. The
• Entry management: The decentralization feature leads attacker can establish a relationship among the senders
to many users using the same FN simultaneously, which and the receivers using their locations, henceforth
results in dynamic in and out users’ movement. The FN revealing the user’s privacy.
should allow multiple devices of a single user to access • Privacy-Protecting Data Accumulation: FNs are
data without delay. Simultaneously, it is also respon- allowed to accumulate data to minimize communication
sible for revoking services to idle devices with proper overload without revealing data on the communication
handling of users’ data. packet in FC. Data accumulation methods are crucial to
describe and create data accumulation features (e.g.,
linear and polynomial accumulation, multiplication,
5.1.2 Decentralized Computation
and addition).
• Safe Content Dissemination: Dynamic infrastructure of
FNs are at risk of being controlled by the attackers. The
FC makes the management of keys in safe service
attack can result in users’ data exposure, and the compu-
detection and transmission encryption complex to a
tation results might be manipulated. Here, the authors
great extent. The assessment of the methods in dynamic
review these problems and propose some methods to tackle
surroundings is crucial for bettering the localized
these issues.
dissemination mechanism in FC.
• Reliable Assisted Computation: FNs’ cooperation can
help execute much more complex tasks, even more
5.1.4 Temporary storage
complicated than encryption and exponentiation. Ni
et al. [165] used FNs to deduplicate collected data and
The temporary storage of data collected from IoT devices
accumulate the homomorphic keys by the IoT devices.
in FNs helps minimize data handling complexity. How-
• Reliable Big Data Assessment: The decentralized
ever, various security problems arise due to the availability
architecture of FC results in a large amount of
of confidential data in the FN. The leakage of private data
heterogeneity in the collected data, making it challeng-
is one of the significant problems. To attain the CIA in
ing for FNs to analyse, especially when there is an
temporary storage, authors in [167] put forward various
extensive data set. The computation overload due to the
problems and their prospective solutions incorporated in
encryption keys also makes it more difficult for the FNs
fog framework.
to analyse it.
• Certifiable Computation: Many theoretical solutions • Safe Data Sharing: The majority of the methods are
have been put forward to accomplish certifiable designed by time-consuming bilinear combination. Key

123
Cluster Computing (2022) 25:1111–1154 1141

management is useful to share data safely, which results 5.2.1 Location privacy leakage
in the problem of handling decryption keys. This
indicates that sharing data, along with the maintenance Real-time services are assisted by the FC framework’s
of confidentiality is a complicated task. location awareness feature. Huo et al. [168] put forward a
• Confidential Data Recognition and Security: The classic location-aided proximity discovery protocol to permit users
method to protect data is by encrypting whole data. to detect user’s friends in the exposure area. Yang et al.
However, this imposes a heavy computational load on [169] put forward an FN location authentication algorithm
the fog framework along with the IoT devices. Hence, to inhibit a security attack from suspiciously attaining a
we need only to encrypt confidential data. Besides all license to access data. Due to the FC framework’s local-
the efforts, data leakages are bound to happen. ization feature, the user’s location is obviously revealed in
• Data Integrity Security: Some protocols are designed to FC. A user’s identity can be revealed with an accuracy of
test the possession of data with a user, which can, in 90% with four spatial–temporal points [170]. Therefore, it
turn, help us to identify suspicious users. However, is crucial to preserve users’ locations, as the attacker can
these methods are not directly deployable due to two quickly identify users if the location is revealed.
reasons. First, data is stored temporarily in the FN,
which is then uploaded to cloud data storage facilities 5.2.2 Discovery of rogue FNs and edge devices
or permanently deleted. Second, owing to the users’
portability, multiple FNs have confidential data of a The compromised FNs and edge devices can act like a
user. Therefore, this process is unproductive to assess normal one and attract users to utilize them. Roman et al.
the reliability of data on each FN. Due to these reasons, [164] illustrated that FNs are exposed to various DoS
the authors put forward creating safe and effective data attacks. Stojmenovic et al. [171] illustrated the practicality
possession protocols to ensure integrity. of MiTM security attacks in FC when the fog gateway had
been hijacked. The key to a user can be obtained from the
Table 13 explains our observations about why the pre-
digital license. Even if the FNs are not hacked, they might
sent solution mechanisms are not directly deployable to
become a rogue node due to personal motivations. There-
rule out the security threats which prevail in the FC.
fore, building safe and robust interference discovery
algorithms is crucial for each FN and edge device.
5.2 Issues and prospective research paths
5.2.3 Privacy disclosure in data pattern
This section discusses various unsolved issues in FC, as
illustrated in Table 13. The authors believe that this will
In IoT use cases, edge devices generate and process data
initiate and describe some research paths on these
confidential to a user. The data can be combined in various
problems.
forms, which can spark various security issues. This issue
is worsened by the use of IoT, as one of FC’s aims is to

Table 13 Relationship between characteristics and security concerns in FC


Characteristics Challenges
A B C D E F G H I J K L M N O P Q R S T

Industrial Applications 8 8 4 4 4 8 8 4 4 8 4 8 4 8 4 4 8 8 4 4
Decentralization 4 8 4 4 4 4 8 4 4 4 8 8 4 4 4 4 4 8 8 4
Topographic distribution 8 8 8 8 8 8 4 8 8 8 8 8 8 8 4 8 8 4 8 8
Low latency 4 4 8 8 4 8 8 8 8 8 8 4 8 4 4 8 4 8 4 4
Incompetency of devices 8 4 4 8 4 8 8 8 8 4 8 4 8 8 8 8 4 8 8 8
Device Portability 8 8 8 4 4 4 8 4 8 8 4 8 8 4 4 8 8 4 4 8
Location awareness 8 8 8 8 8 8 4 8 8 8 8 8 8 8 4 8 8 4 8 8
TM
Here, (a) Entry Management, (b) Certifiable Computation, (c) Reliable Big Data Assessment, (d) Resistance to Sybil Attacks, Safe Data
Search, (f) Data Integrity Security, (g) Location Privacy Leakage, (h) Trust Management, (i) Discovery of rogue FNs and edge/IoT devices,
(j) Reliable Assisted Computation, (k) Safe Content Dissemination, (l) Lightweight Protocols Plan, (m) Confidential Data Recognition and
Security, (n) Privacy-protecting Data Accumulation, (o) Decentralized and scalable, secure infrastructure, (p) Privacy exposure in Data com-
bination, (q) Safe Data Sharing, TM Privacy-protecting Packet Transmission, (s) User Validation, (t) Interference Recognition

123
1142 Cluster Computing (2022) 25:1111–1154

allow the cooperation amongst the FNs and process com- • Jamming: In this attack, the malicious user creates
plex data near the network edge. This has given rise to numerous spurious messages to block the transmission
various techniques that needs to be deployed to eliminate channels and over-utilize the resources. This inhibits
security threats in combining data. These methods are in legitimate users from routine functioning.
the development phase, and research attempts are needed • Eavesdropping: This type of attack generally occurs if
to create privacy-protecting models. the data is unprotected or can be easily decrypted. The
attacker can snoop on the transmitted data and obtain
5.2.4 Scalable and decentralized safe infrastructure some packets from the channel to read data.
• Denial-of-Service: DoS attack takes place when a FN is
FNs can be easily corrupted due to the unavailability of a flagged as busy by the hacker who overloads the FN by
party to standardize network functions, stability, and malicious requests. The most vulnerable component of
dependability. Apart from this, classic attack prevention the fog framework amidst a DoS attack is an FN.
methods are ineffective as they need to work in FC’s • Collusion: Collusion is the grouping of malicious users
decentralized and volatile framework. The dissemination of to cheat other users. The collusion of resources
computation over FNs is easy, but data integration becomes increases the attack potential of the attackers.
challenging to monitor. One prospective solution to • Man-in-the-Middle: This attack involves an attacker in
building reliable infrastructure in FC is blockchain [172], a the transmission channel of two legitimate users who
disseminated database keeping a record of dynamic lists. can access and edit the data. However, routine users are
Implementing a blockchain layer will increase users’ trust unaware of the presence of the middleman.
in the fog framework. • Impersonation: A suspicious user imitates a routine user
to use the services presented by the fog framework.
5.3 Types of security attacks
The privacy of a legitimate user is at stake as various
security threats loom over the fog computing framework.
The FC framework inherits massive amount of security and
The below-mentioned features are four characteristics of a
privacy concerns from the cloud architecture. The service
user’s privacy. Figure 22 demonstrates the security and
providers install fog and cloud frameworks to provide
privacy concerns in play related to the FC framework.
services while maintaining confidentiality to the maximum
These always demand efficient and scalable security fea-
extent. However, the service providers’ members have
tures that should be incorporated in the fog architecture.
access to personal data, which they can easily extract from
the system. This results in privacy leakage. Apart from this, • Identity Privacy: The personal details of a user consti-
hackers can target FNs, and they might manipulate the FN tute the identity of a user. These characteristics can
for their benefit. A hacker can attack FNs in the following uniquely determine and expose a user to the attacker.
ways [164] to destroy the fog framework.
• Forgery: Mischievous attackers can forge characteris-
tics and create bogus profiles in order to deceive other
users or FNs. This results in unnecessary utilization of
resources, which increases the workload on the fog
framework.
• Tampering: In a tampering type of attack, a hacker
might delete, create latency, or edit the channel’s data.
• Spam: Spam is the presence of undesirable data (e.g.,
duplicate data, garbage data) created and injected into
the framework by malicious users. This also results in
unnecessary consumption of resources.
• Sybil: In a Sybil attack, an attacker always tries to gain
control over the network to compromise the functioning
and decrease efficiency. They also inject malicious data
into the network by creating false crowdsensing details,
which decreases the reports’ authenticity. The Sybil
attacker could extract the user’s confidential data as
well. Fig. 22 Types of security and privacy attacks

123
Cluster Computing (2022) 25:1111–1154 1143

• Data Privacy: A malicious user can extract the data of a • Provisioning 5G mobile networks: The heterogeneous
user while it is being transmitted over the fog frame- and geographically distributed mesh network amongst
work. Data assessment can reveal confidential infor- mobile networks, FNs, and cloud servers make FC
mation about the user’s preferences, addresses, health advantageous for 5G network technology, SDN, and
conditions. NLV [3]. The fog framework’s workload balancing
• Usage Privacy: The pattern of usage of fog resources feature gives it an edge over other computing
and services can reveal the usage privacy of a user. paradigms [109]. The deployment of the Oauth2
• Location Privacy: Location privacy leakage can result protocol can eliminate various threats on the 5G
in the detection of the path, position, and identity. network [178].
Unfortunately, location privacy is the most challenging • Saving energy in Cloud computing: Researchers
type of privacy due to the widespread network of deployed call graphs to reduce computation workload
location-aware FNs. by efficiently handling and assigning resources [179].
This assisted in decreasing energy utilization in
portable phones. In this use case, FC can prove
promising by localizing data processing in the FNs,
6 Security threats in use cases
which minimizes lag and expense. However, security
threats arise due to the existence of data in the FN.
In this section, the authors have reviewed numerous types
These threats can be eliminated using various encryp-
of security threats persistent among various use cases.
tion techniques, validation, categorization, and data
Various solutions to overcome these threats have also been
masking [180].
discussed.
• Managing resources in micro data-centers: FC can
• Software-defined and virtualized radio access networks: handle, estimate, and reserve computational resources
FC allows users to gain complete control of the network in multi-level systems. A prospective security issue is
by giving NLV. They can also enjoy real-time services. the violation of access control on specific levels.
The deployment of cloudlets enhances the performance Resource misuse, account hacking, and DoS attacks
of SDN and VMs. A project called Elijah carried out by are other threats to the fog framework. NIST [181]
Carnegie Mellon University [173] deployed various recommended the deployment of character-based con-
features. Multi-level verification, interference discovery trol protocols and profile-based encryption systems
protocols, personal networks, and data isolation can [182] to enhance security.
eradicate virtualization-aided attacks.
• Web optimization: Various websites’ performance can
be enhanced by the use of FC [174]. FNs are being used • Enhancing healthcare facilities and their performance:
to retrieve, group, and run programs in a single cycle. Healthcare and wellness programs are significant use
MAC address helps FNs identify users uniquely, cases of the fog computing framework. Confidential
perform caching, detect network status, and check user patient records are stored in the system, and it can be
requests. In a similar state-of-the-art [57], the fog hacked at various points in the fog framework.
framework decreased the reaction time substantially. Biomedical sensor devices record data and simultane-
Unsafe and malicious web APIs are one of the most ously transmit it to the nearest FN. Due to the simplified
common security threats to an architecture that allows availability of patients’ confidential data, attackers
hackers to damage cookies and send fake data to the target FNs by various security attacks such as DoS,
servers. Drive-by-attacks [175] and unsafe pointers to distraction, and partial transmittance [183]. Proper
objects assists hackers in manipulating the fog archi- encryption and multi-level validation protocols should
tecture that results in leakage of confidential data. be implemented to eliminate these security threats.
• Collection and pre-processing of speech data: Most • Smart food tracking: FC is deployed as a potential
security attacks are propelled because a smartphone solution for tracking food and proper handling, remov-
user has granted permission to access personal data ing low-quality food from the manufacturing chain
[176]. The majority of the hearing aid mobile applica- [184]. This chain could be compromised by hackers,
tions are installed on a smartphone. Malware attacks which will result in the safe passage of low-quality
manipulate the user’s data and affect the CIA of food. This will decrease the quality of manufactured
communication channels and the data. Some possible goods. Resonance attack is a primary security threat
solutions to cover up the threats include anti-virus looming over the food grain supply chain. Several
software, firewall, interference detection algorithms, integrity assessments can prevent resonance attacks.
backups, patching, and creation of restore points [177].

123
1144 Cluster Computing (2022) 25:1111–1154

• Vehicular networking: Shared technology in 5G net- • DL takes place when potentially important data is
works and fog framework has resulted in similar suspiciously removed from the system. DL can occur
security threats to the architecture. The presence of even without the involvement of an attacker.
multiple and portable FNs makes it next to impossible • Ias can result in a security attack instantaneously.
to handle them through a centralized approach [185]. Service providers introduce APIs as a product for
DoS attacks and data leak threats are prominent in clients.
vehicular networking. A practical solution to prevent • SAV are vulnerable bugs in a software package caused
these attacks is to enable validation, encryption due to a configuration error. An attacker might trespass
strongly. Regular health assessments should take place. the security perimeter using these bugs.
• Surveillance video stream processing: The computation • MI is a validated user who is determined to execute
of each video generated by CCTV cameras is a tedious applications suspiciously.
task. This computation needs to be performed in a • IDD occurs when a company has deployed a system
disseminated way, and only the final output needs to be without proper design and security checks.
stored in the cloud server to produce a much quicker • ANU occurs when some users use freely available
output. Industrial video streaming can also take place resources to conduct a mischievous event.
by implementing multicriteria AHP techniques [186] • The root cause of STI threats is sharing resources,
among FNs. The confidential video feed needs to be interfaces, or applications.
protected from frequent APTs, which can view,
manipulate, and even disrupt the framework. To
guarantee security against threats, FNs must ensure
7 Prospective security solutions in fog
safe transmission between all the devices involved in
computing
this process. Complex encryption, management of
access, new link generation, and an upper cap on the
In this section, the authors have reviewed various secure
connections could help prevent threats.
and deployable procedures to improve security in the FC
• Augmented brain-computer interaction: In the modern
framework. Table 15 provides an outline of the threats and
world, telehealth systems [69] are widely used in
their prospective solutions associated with fog computing.
healthcare and wellness programs. This involves an
assessment of various human body parameters collected • Network monitoring: The fog framework needs to
through biomedical sensors. The collected data is of the deploy effective network observing algorithms. The
utmost confidentiality and needs to be protected at all primary goal of the algorithms should be to flag
costs. TLS protocol [187] is a prospective solution to suspicious events in the architecture according to the
protect the CIA of data. policies. Some packages like CLOUDWATCHER
[190] can be implemented. The categorization of
CSA [188], along with some researchers [171, 189],
firewalls, interference detection systems, and anti-virus
have detected twelve vital security threats. These threats
packages [191] is necessary. ANNs [192] can be
immediately affect disseminated and on-demand charac-
utilized for the detection of security issues.
teristics of the cloud and fog framework. The authors have
• Wireless security: The encryption of data generated by
reviewed these twelve threats to put together an organized
wireless sensors, especially the confidential ones, is
study. Table 14 also talks about these potential security
crucial for the data’s CIA. WiFi security solutions like
threats keeping in mind various use cases implemented
WPA, WPA2 [193] can be deployed for encryption of
using fog computing architecture.
data. Wireless communication protocols such as
• APTs are strikes to conduct confidential data theft by 802.11, 802.11a, and 802.11 g or are used to eliminate
manipulating the company’s foundation. MiTM type of attacks.
• ACI occurs when a malicious user can access data and • Backup and recovery: Tremendous amount of capital,
deploy software packages and edit configurations. time, and efforts are required for data recovery. The fog
• AH is another form of phishing. The attackers are architecture is prone to attacks and natural disasters,
motivated to hijack user profiles for carrying out and it might result in permanent or temporary data loss.
suspicious events. Hence, keeping a backup is crucial for data recovery.
• In a DoS attack, genuine users are inhibited from Fibre channel, HS-DRT, PCS, ERGOT, CBSRS, SBBR
utilizing a system’s services by overloading the avail- [194] enhances the process of recovering data.
able computational resources. • Malware protection: Implementing software packages
• DB takes place when personal and secure data is like FindEvasion [195], which assists in the automatic
circulated or robbed by the attacker. discovery of suspicious events, can improve the defense

123
Table 14 Use case based evaluation of present security solutions
Cluster Computing (2022) 25:1111–1154

Use Cases DoS DL Evil Shared Uncertain Advance Data Inadequate Account Mistreatment System and Access
Insider Technology APIs Persistent Breaches Due Diligence Usurping and Evil Use Use Liabilities Control
Concerns Threats Issues

Virtualized radio N N Y Y N Y Y N Y Y Y Y
access
Web optimization N Y N N Y N N N Y N N N
Speech data N Y Y N N N N N N N N N
5G mobile networks N Y Y Y N N Y N N Y N N
Energy reduction N Y N N N N Y N N N N N
Managing resources Y Y N Y N N N Y Y Y N Y
Healthcare facilities Y N Y N Y N Y N Y N Y Y
Food tracking N Y N N N N N N Y N Y N
Vehicular networking Y N N Y N N Y N N Y N N
and Road safety
Surveillance video N N N N N Y Y Y N N N N
processing
Augmented Brain- N N N N N Y Y Y N N N Y
Computer Interaction
1145

123
1146 Cluster Computing (2022) 25:1111–1154

Table 15 Outline of proposed security procedures


Solution Issues solved Advantages
category

Network APT, ACI, DoS attack, MI, IDD, This can instantaneously inform about any current attack, store malicious incidents’
monitoring ANU, DB statistics for investigation and prohibit doubtful network traffic and show overall
performance of system
Wireless APT, ACI, DB, Spying attacks, FNs can expand their movement in safer way, which allows numerous edge users to
security Illegitimate bandwidth use connect from anyplace and enable the FC framework to become cost efficient
Backup and DL, IDD, malware infection, Data If natural tragedy, malware contamination or DoS attack occurs, the data will still be
recovery Integrity accessible to legitimate users and system laterally with its reliability
Malware AH, IA, SAV, STI, DL, data Elimination of known malicious use cases, guards against attacks by smart observation
protection corruption and guarantees continuous working of the framework
Data encryption MI, DB, DL, IDD, malicious events If data is penetrated at any point of time and state, data encoding will keep the original
data buried from prohibited receivers
Avoiding cache IA, SAV, data leaks, sniffing threats If a FN is pretending to be a cache server, the sensitively received data will remain
outbreaks private

against malware attacks. Apart from this, some ML instructions. In order to tackle the higher consumption
algorithms [196] can be deployed to assess security of resources due to encryption, only the confidential
attacks with better efficiency instantaneously. data needs to be encrypted. The static data can be
• Data encryption: The steps taken to safeguard data secured using the AES algorithm, which obfuscates
result in a tremendous drop in the computational data to guarantee privacy. A reliable communication
resource availability for standard fog-based

Fig. 23 FC platform and implementation of security protocols at various locations in the framework

123
Cluster Computing (2022) 25:1111–1154 1147

channel can be formed using the SSL protocol The fog computing framework provisions the develop-
[197, 198]. ment of industrial IoT use cases. These industrial use cases
• Preventing cache attacks: Cache interruption attacks are range from precision agriculture, conveyance, smart city
widely used by attackers to manipulate fog framework. management to smart waste and energy management. The
Some packages like Newcache [199], partition locked reduced latency assists in the real-time functioning of all
cache, randomized permutation cache [200], and the industrial application verticals especially, healthcare
STEALTHMEM [201] can be deployed to inhibit and wellness use cases. Aazam and Huh [74] demonstrated
cache interference-based attacks. the use of fog computing to create emergency alerts
through E-HAMC. Similarly, Phenomobile technology
The deployment of all the security frameworks and [115] assists precision agriculture by leveraging big data
methods associated with different fog computing infras- analytics to analyse the large amount of data generated
tructure parts is demonstrated in Fig. 23. through various wireless sensors located in the agriculture
fields. Wireless sensors communicate with each other over
a large network of fog nodes through various secure pro-
8 Lessons learned tocols which then assists in garbage level’s monitoring and
timely collection and processing, energy level’s monitor-
Our survey article permits us to develop concrete lessons in ing, and vehicular communication. However, the devel-
contrast with the fog architecture. The classification of oper’s perspective to prioritize feature rich application over
various computing paradigms over various parameters the user’s safety has led to various unfortunate cases of
validates the fact that edge network-based computing security and privacy attacks.
paradigms are beneficial for the inter-communication Fog computing inherits most of the security and privacy
between IoT devices. Fog computing also facilitates issues along with other attributes from cloud computing.
uninterrupted communication between the cloud and the The decentralized architecture, and larger exposure of fog
edge layer. The fog computing framework assists in the nodes results in increment in privacy risk. Many malicious
portable computing at the user’s end while provisioning users target the fog nodes to enter the framework and
minimal latency, disseminated workload, and virtualiza- conduct suspicious activities. As shown in [164], the
tion. This also helps in ensuring expandability, smooth hackers get involved in various types of security and pri-
real-time usage, diversity, excellent quality of service, and vacy attacks. Most of the times, malicious users pretend to
compatibility. The computation takes place irrespective of be a normal user and leverage fog computing to delay or
the topological distribution of the framework. abandon services which were meant for genuine users. This
The implementation of fog architecture reveals the results in the decrement of quality of service and exposes
reason behind the reliability of IoT devices on fog com- user’s data to the attacker. This survey article highlights
puting or other edge computing paradigms. For example, various problems caused due to these attacks and suggest
Gia et al. [64] and Li et al. [72] demonstrated a latency some prospective solutions for these issues.
reduction by 48% and 73% respectively when deploying
the fog architecture. As exhibited in [61], the reduction in
latency is subjected to experimentation and is calculated by 9 Conclusion
placing the fog components over the cloud-fog system, and
in some application verticals, placing all the components in IoT has revolutionized the digital era as it assists both the
the cloud layer is advantageous than distributing them over industry and academia. Nowadays, manufacturing, con-
cloud and fog framework. Several references have been veyance, smart cities, government, wellness, healthcare,
added to highlight various algorithms provisioning task and retail are advancing primarily due to the involvement
scheduling, resource sharing, and job offloading. The of IoT. This has led to a significant rise in the emergence of
localized data processing over a decentralized network new IoT and edge gadgets in the network mesh. Billions of
mesh of several fog nodes helps in bandwidth conservation IoT devices have connected to the network, and fog com-
and minimizes the workload on the cloud servers. Krishnan puting is reliable for tackling the big data produced by
et al. [57] and Gia et al. [64] concludes that there is a these IoT and user devices. The decentralized framework
significant reduction in data while deploying fog frame- of fog computing expands cloud computing features to the
work. For example, Gia et al. displayed a 93% data size network edge for assisting industrial IoT use cases. In this
decrement when fog architecture was deployed. The fog survey, the authors have reviewed fog computing charac-
systems are also validated to preserve energy, which teristics and have compared different existing computing
implies low monetary requirements. models. Then, the classification of various state-of-the-art
literature has been provided. A set of evaluation parameters

123
1148 Cluster Computing (2022) 25:1111–1154

is utilized to decisively review the prospective algorithms Comput. Adv. Syst. Appl. (2017). https://doi.org/10.1186/
and architectures in the field of fog paradigm. This article s13677-017-0090-3
6. Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M.A.,
also examines the task of fog gateways located in the edge Choudhury, N., Kumar, V.: Security and privacy in fog com-
device’s vicinity in fog-assisted use cases. Fog computing puting: challenges. IEEE Access (2017). https://doi.org/10.1109/
plays a vital role in assisting both the industries as well as ACCESS.2017.2749422
the academic institutions by provisioning Industrial IoT 7. Fu, J.-S., Liu, Y., Chao, H.-C., Bhargava, B.K., Zhang, Z.-J.:
Secure data storage and searching for industrial IoT by inte-
applications such as smart conveyance, precision agricul- grating fog computing and cloud computing. IEEE Trans. Ind.
ture, waste control, energy management, etc. This paper Inf. 14(10), 4519–4528 (2018)
also discusses various real-time implementation issues in 8. Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts,
the framework. This literature quickly suggests some applications and issues. In: Proc. Workshop Mobile Big Data,
Hangzhou, China, pp. 37–42. (2015)
solutions to protect data confidentiality, resource manage- 9. Chiang, M., Ha, S., Risso, F., Zhang, T., Chih-Lin, I.: Clarifying
ment policy, validation, and encryption standards from fog computing and networking: 10 questions and answers. IEEE
various types of attacks. Some basic but large-scale secu- Commun. Mag. 55(4), 18–20 (2017)
rity protocols for fog architecture can be created using 10. Mukherjee, M., Shu, L., Wang, D.: Survey of fog computing:
fundamental, network applications, and research challenges.
existing protocols with slight modifications since they have IEEE Commun. Surv. Tutor. 20(3), 1826–1857 (2018)
been rigorously tested. Lastly, this review paper establishes 11. Perera, C., Qin, Y., Estrella, J.C., Reiff-Marganiec, S., Vasi-
potential research objectives for individuals engaged in lakos, A.V.: Fog computing for sustainable smart cities: a sur-
devising, expanding, and maintaining the fog framework. vey. ACM Comput. Surv. (CSUR) 50(3), 1–43 (2017)
12. Kai, K., Cong, W., Tao, L.: Fog computing for vehicular ad-hoc
networks: Paradigms, scenarios, and issues. J. China Univ. Posts
Acknowledgements This work is partially funded by FCT/MCTES
Telecommun. 23(2), 56–96 (2016)
through national funds and when applicable co-funded EU funds
13. Peng, M., Yan, S., Zhang, K., Wang, C.: Fog-computing-based
under the Project UIDB/50008/2020; and by Brazilian National
radio access networks: issues and challenges. IEEE Netw. 30(4),
Council for Scientific and Technological Development – CNPq, via
46–53 (2016)
Grant No. 313036/2020-9.
14. Ku, Y.-J., et al.: 5G radio access network design with the fog
paradigm: confluence of communications and computing. IEEE
Author contributions Not Applicable.
Commun. Mag. 55(4), 46–52 (2017)
15. Chiang, M., Zhang, T.: Fog and IoT: an overview of research
Funding This work is partially funded by FCT/MCTES through
opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)
national funds and when applicable co-funded EU funds under the
16. Li, Z., Zhou, X., Liu, Y., Xu, H., Miao, L.: A non-cooperative
Project UIDB/50008/2020; and by Brazilian National Council for
differential game-based security model in fog computing. China
Scientific and Technological Development—CNPq, via Grant No.
Commun. 14(1), 180–189 (2017)
313036/2020-9.
17. Mahmud, R., Buyya, R.: Fog computing: a taxonomy, survey
and future directions. (2016). arXiv:1611.05539
Data availability The authors confirm that the data supporting the
18. Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F.,
findings of this study are available within the article.
Niakanlahiji, A., Kong, J., Jue, J.P.: All one needs to know about
fog computing and related edge computing paradigms: a com-
Code availability Not Applicable.
plete survey. J. Syst. Architect. 98, 289–330 (2019)
19. Moosavia, S.R., Gia, T.N., Nigussie, E., Rahmania, A.M., Vir-
Declarations tanen, S., Tenhunena, H., Isoaho, J.: End-to-end security
scheme for mobility enabled healthcare Internet of things.
Conflict of interest The authors do not have any conflict of interest. Future Gener. Comput. Syst. 64, 108–124 (2016)
20. Odun-Ayo, I., Ananya, M., Agono, F., Goddy-Worlu, R.: Cloud
computing architecture: a critical analysis. In: 2018 18th Inter-
national Conference on Computational Science And Applica-
References tions (ICCSA), pp. 1–7. IEEE, Piscataway (2018)
21. OpenFogConsortium: Openfog reference architecture for fog
1. Ning, H., Liu, H., Ma, J., Yang, L.T., Huang, R.: Cybermatics: computing, 2017. https://www.openfogconsortium.org/ra/.
cyber-physical-social-thinking hyperspace-based science and Accessed Feb 2017
technology. Future Gener. Comput. Syst. 56, 504–522 (2016) 22. Zhang, T.: Fog computing brings new business opportunities
2. He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient and disruptions. Blog, TechTarget. http://inter
strategies for restraining rumor spreading in mobile social net- netofthingsagenda.techtarget.com/blog/IoT-Agenda/Fog-com
works. IEEE Trans. Veh. Technol. 66(3), 2789–2800 (2017) puting-brings-new-business-opportunities-and-disruptions.
3. Luan, T.H., et al.: Fog computing: focusing on mobile users at Accessed Oct 2020
the edge. ArXiv Preprint, Tech. Rep. (2016). https://arxiv.org/ 23. Forman, G.H., Zahorjan, J.: The challenges of mobile comput-
pdf/1502.01815.pdf ing. Computer (Long Beach Calif) 27(4), 38–47 (1994)
4. Luo, G., Pan, Y.: ZTE communications special issue on cloud 24. NIST: Mobile cloud computing. Technical Report, National
computing, fog computing, and dew computing. ZTE Commun. Institute of Standards and Technology. https://www.nist.gov/
15(1), 2 (2017) programs-projects/mobile-cloud-computing. Accessed Oct 2020
5. Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a 25. Arun, C., Prabu, K.: Applications of mobile cloud computing: a
review of current applications and security solutions. J. Cloud survey. In: 2017 International Conference on Intelligent

123
Cluster Computing (2022) 25:1111–1154 1149

Computing and Control Systems (ICICCS), pp. 1037–1041. computing and cloud computing. IEEE Trans. Ind. Inf. (2018).
IEEE, Piscataway (2017) https://doi.org/10.1109/TII.2018.2793350
26. Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Gui- 45. Okafor, K.C., Achumba, I.E., Chukwudebe, G.A., Ononiwu,
zani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mob. G.C.: Leveraging fog computing for scalable IoT datacenter
Comput. 16(16), 2572–2589 (2016) using spine-leaf network topology. J. Electr. Comput. Eng.
27. OpenEdgeConsortium: About—the who, what, and how. Tech- (2017). https://doi.org/10.1155/2017/2363240
nical report, OpenEdge computing. http://openedgecomputing. 46. Kang, B., Choo, H.: An experimental study of a reliable IoT
org/about.html. Accessed Oct 2020 gateway. ICT Express (2017). https://doi.org/10.1016/j.icte.
28. Reale, A.: A guide to edge iot analytics. Blog, International 2017.04.002
Business Machines. https://www.ibm.com/blogs/internet-of- 47. Gazis, V., Görtz, M., Huber, M., Leonardi, A., Mathioudakis,
things/edge-iot-analytics. Accessed Nov 2020 K., Wiesmaier, A., Zeiger, F., Vasilomanolakis, E.: A survey of
29. Hao, P., Bai, Y., Zhang, X., Zhang, Y.: Edgecourier: an edge- technologies for the Internet of things. In: 2015 International
hosted personal service for low-bandwidth document synchro- Wireless Communications and Mobile Computing Conference
nization in mobile cloud storage services. In: Proceedings of the (IWCMC), Dubrovnik, Croatia, pp. 1090–1095
Second ACM/IEEE Symposium on Edge Computing, p. 7. 48. Salman, O., Elhajj, I., Chehab, A., Kayssi, A.: IoT survey: an
ACM, New York (2017) SDN and fog computing perspective. Comput. Netw. 143,
30. Negash, B., Rahmani, A.M., Westerlund, T., Liljeberg, P., 221–246 (2018)
Tenhunen, H.: LISA: Lightweight internet of things service bus 49. Datta, S.K., Bonnet C., Haerri, J.: Fog computing architecture to
architecture. Procedia Comput. Sci. 52, 436–443 (2015) enable consumer centric internet of things services. In: 2015
31. Silva, P.M.P., Rodrigues, J., Silva, J., Martins, R., Lopes, L., International Symposium on Consumer Electronics (ISCE),
Silva, F.: Using edge-clouds to reduce load on traditional wifi Madrid, Spain, p. 1
infrastructures and improve quality of experience. In: 2017 50. Hassanzadeh-Nazarabadi, Y., Küpçü, A., Ozkasap, O.: Decen-
IEEE 1st International Conference on Fog and Edge Computing tralized utility-and locality-aware replication for heterogeneous
(ICFEC), pp. 61–67. IEEE, Piscataway (2017) DHT-based P2P cloud storage systems. IEEE Trans. Parallel
32. Salem, A., Nadeem, T.: Lamen: leveraging resources on Distrib. Syst. 31(5), 1183–1193 (2019)
anonymous mobile edge nodes. In: Proceedings of the Eighth 51. Vallati, C., Mingozzi, E., Tanganelli, G., Buonaccorsi, N.,
Wireless of the Students, by the Students, and for the Students Valdambrini, N., Zonidis, N., Martı́nez, B., et al.: Betaas: a
Workshop, pp. 15–17. ACM, New York (2016) platform for development and execution of machine-to-machine
33. Morabito, R.: Virtualization on internet of things edge devices applications in the internet of things. Wirel. Personal Commun.
with container technologies: a performance evaluation. IEEE 87(3), 1071–1091 (2016)
Access 5, 8835–8850 (2017) 52. Stergiou, C., Psannis, K.E., Kim, B.-G., Gupta, B.: Secure
34. Ray, P.P.: An introduction to dew computing: definition, con- integration of IoT and cloud computing. Future Gener. Comput.
cept and implications. IEEE Access 6, 723–737 (2017) Syst. 78, 964–975 (2018)
35. Pan, Y., Thulasiraman, P., Wang, Y.: Overview of cloudlet, fog 53. Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow,
computing, edge computing, and dew computing. In: Proc. 3rd M.J., Polakos, P.A.: A comprehensive survey on fog computing:
Int. Workshop Dew Comput., pp. 20–23. (2018) State-of-the-art and research challenges. IEEE Commun. Surv.
36. Abdelwahab, S., Hamdaoui, B., Guizani, M., Znati, T.: Cloud of Tutor. 20(1), 416–464 (2017)
things for sensing-as-a-service: architecture, algorithms, and use 54. Agarwal, S., Yadav, S., Yadav, A.K.: An efficient architecture
case. IEEE Internet Things J. 3(6), 1099–1112 (2016) and algorithm for resource provisioning in fog computing. Int.
37. Fu, T., Malik, S.A., Joshi, G., Nagaraj, A.: Apparatus, systems, J. Inf. Eng. Electron. Bus. 8(1), 48–61 (2016)
and methods for distributed application orchestration and 55. Kapsalis, A., Kasnesis, P., Venieris, I.S., Kaklamani, D.I.,
deployment.’’ U.S. Patent 9,684,502, issued June 20, 2017 Patrikakis, C.Z.: A cooperative fog approach for effective
38. Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog workload balancing. IEEE Cloud Comput. 4(2), 36–45 (2017)
computing: a survey. Future Gener. Comput. Syst. 88, 16–27 56. Cardellini, V., Grassi, V., Presti, F.L., Nardelli, M.: On QoS-
(2018) aware scheduling of data stream applications over fog comput-
39. Fortino, G., Russo, W., Savaglio, C., Viroli, M., Zhou, M.: ing infrastructures. In: Proceedings of the IEEE Symposium on
Modeling opportunistic IoT services in open IoT ecosystems, In: Computers and Communication (ISCC), Larnaca, Cyprus,
17th Workshop from Objects to Agents, WOA 2017, pp. 90–95, pp. 271–276. IEEE, Piscataway (2015)
Scilla, Italy (2017) 57. Krishnan, Y.N., Bhagwat, C.N., Utpat, A.P.: Fog computing—
40. Byers, C.C.: Architectural imperatives for fog computing: use network based cloud computing. In: Proc. 2nd Int. Conf. Elec-
cases, requirements, and architectural techniques for fog-en- tron. Commun. Syst. (ICECS), Coimbatore, India, pp. 250–251.
abled IoT networks. IEEE Commun. Mag. 55(8), 14–20 (2017) (2015)
41. Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: 58. Slabicki M., Grochla, K.: Performance evaluation of CoAP,
Fog orchestration for internet of things services. IEEE Internet SNMP and NETCONF protocols in fog computing architecture.
Comput. 21(2), 16–24 (2017) In: Proc. IEEE/IFIP Netw. Oper. Manag. Symp. (NOMS),
42. Aloi, G., Caliciuri, G., Fortino, G., Gravina, R., Pace, P., Russo, Istanbul, Turkey, pp. 1315–1319. (2016)
W., Savaglio, C.: Enabling IoT interoperability through oppor- 59. Giang, N.K., Blackstock, M., Lea, R., Leung, V.C.M., Devel-
tunistic smartphone-based mobile gateways. J. Netw. Comput. oping IoT applications in the fog: a distributed dataflow
Appl. 81, 74–84 (2017) approach. In: Proc. 5th Int. Conf. Internet Things (IOT), Seoul,
43. Sarma, B., Kumar, G., Kumar, R. and Tuithung, T.: Fog com- South Korea, pp. 155–162. (2015)
puting: an enhanced performance analysis emulation framework 60. Hong, K., Lillethun, D., Ramachandran, U., Ottenwälder, B.,
for IoT with load balancing smart gateway architecture. In: 2019 Koldehofe, B.: Mobile fog: a programming model for large-
International Conference on Communication and Electronics scale applications on the Internet of Things. In: Proc. 2nd ACM
Systems (ICCES), pp. 1–5. IEEE (2019) SIGCOMM Workshop Mobile Cloud Comput., Hong Kong,
44. Fu, J., Liu, Y., Chao, H.C., Bhargava, B., Zhang, Z.: Secure data pp. 15–20. (2013)
storage and searching for industrial IoT by integrating fog

123
1150 Cluster Computing (2022) 25:1111–1154

61. Yangui, S. et al.: A platform as-a-service for hybrid cloud/fog 78. Kyriazakos, S., et al.: eWALL: An intelligent caring home
environments. In: Proc. IEEE int. Symp. Local Metropolitan environment offering personalized context-aware applications
Area Netw. (LANMAN), Rome, Italy, pp. 1–7. (2016) based on advanced sensing. Wirel. Pers. Commun. 87(3),
62. Zhanikeev, M.: A cloud visitation platform to facilitate cloud 1093–1111 (2016)
federation and fog computing. Computer 48(5), 80–83 (2015) 79. Abedin, S.F., Alam, M.G.R., Tran, N.H., Hong, C.S.: A fog
63. Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., Tamm, G.: based system model for cooperative IoT node pairing using
Smart items, fog and cloud computing as enablers of servitiza- matching theory. In: Proc. 17th Asia–Pac. Netw. Oper. Manag.
tion in healthcare. Sens. Transducers 185(2), 121–128 (2015) Symp. (APNOMS), Busan, South Korea, pp. 309–314. (2015)
64. Gia, T.N., et al.: Fog computing in healthcare internet of things: 80. Nishio, T., Shinkuma, R., Takahashi, T., Mandayam, N.B.,
a case study on ECG feature extraction. In: Proc. IEEE int. Conf. Service-oriented heterogeneous resource sharing for optimizing
Comput. Inf. Technol. Ubiquitous comput. Commun. Depend. service latency in mobile cloud. In: Proc. 1st Int. Workshop
Auton. Secure Comput. Pervasive Intell. Comput. (CIT/IUCC/ Mobile Cloud Comput. Netw., Bengaluru, India, pp. 19–26.
DASC/PICOM), pp. 356–363. (2015) (2013)
65. Zao, J.K. et al.: Augmented brain computer interaction based on 81. Zeng, D., Gu, L., Guo, S., Cheng, Z., Yu, S.: Joint optimization
fog computing and linked data. In: Proc. int. Conf. Intell. Env- of task scheduling and image placement in fog computing
iron. (IE), Shanghai, China, pp. 374–377. (2014) supported software-defined embedded system. IEEE Trans.
66. Fratu, O., Pena, C., Craciunescu, R., Halunga, S.: Fog com- Comput. 65(12), 3702–3712 (2016)
puting system for monitoring mild dementia and COPD 82. Intharawijitr, K., Iida, K., Koga, H.: Analysis of fog model
patients—Romanian case study. In: Proc. 12th INT. CONF. considering computing and communication latency in 5G cel-
TELECOMMUN. Modern Satellite Cable Broadcast. Services lular networks. In: Proc. IEEE Int. Conf. Pervasive Comput.
(SIKS), Niš, Serbia, pp. 123–128. (2015) Commun. Workshops (PerCom Workshops), Sydney, NSW,
67. Masip-Bruin, X., Marı́n-Tordera, E., Alonso, A., Garcia, J.: Fog- Australia, pp. 1–4.
to-cloud computing (F2C): the key technology enabler for 83. Ningning, S., Chao, G., Xingshuo, A., Qiang, Z.: Fog computing
dependable e-health services deployment. In: Proc. Mediter- dynamic load balancing mechanism based on graph reparti-
ranean ad hoc netw. Workshop (Med Hoc Net), pp. 1–5. (2016) tioning. China Commun. 13(3), 156–164 (2016)
68. Monteiro, A., Dubey, H., Mahler, L., Yang, Q., Mankodiya, K.: 84. Li, S., Maddah-Ali, M.A., Avestimehr, A.S.: Coding for dis-
Fit: a fog computing device for speech tele-treatments. In: Proc. tributed fog computing. IEEE Commun. Mag. 55(4), 34–40
IEEE Int. Conf. Smart Comput. (SMARTCOMP), St. Louis, (2017)
MO, USA, pp. 1–3. (2016) 85. Do, C.T. et al.: A proximal algorithm for joint resource allo-
69. Dubey, H. et al.: Fog data: enhancing telehealth big data through cation and minimizing carbon footprint in geo-distributed fog
fog computing, In: Proc. ASE BigData Soc. Informat., New computing. In: Proc. Int. Conf. Inf. Netw. (ICOIN),
York, NY, USA, pp. 1–6. (2015) pp. 324–329.
70. Hou, X., et al.: Vehicular fog computing: a viewpoint of vehi- 86. Chen, D., Schedler, S., Kuehn, V.: Backhaul traffic balancing
cles as the infrastructures. IEEE Trans. Veh. Technol. 65(6), and dynamic content-centric clustering for the downlink of fog
3860–3873 (2016) radio access network. In: Proc. IEEE 17th Int. Workshop Signal
71. Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software Process. Adv. Wireless Commun. (SPAWC), Edinburgh, U.K.,
defined networking-based vehicular adhoc network with fog pp. 1–5. (2016)
computing. In: Proc. IFIP/IEEE Int. Symp. Integr. Netw. Manag. 87. Sarkar, S., Misra, S.: Theoretical modelling of fog computing: a
(IM), Ottawa, ON, Canada, pp. 1202–1207. (2015) green computing paradigm to support IoT applications. IET
72. Li, J., Jin, J., Yuan, D., Palaniswami, M., Moessner, K.: Netw. 5(2), 23–29 (2016)
EHOPES: data-centered fog platform for smart living. In: Proc. 88. Sarkar, S., Chatterjee, S., Misra, S.: Assessment of the suitability
Int. Telecommun. Netw. Appl. Conf. (ITNAC), Sydney, NSW, of fog computing in the context of Internet of Things. IEEE
Australia, pp. 308–313. (2015) Trans. Cloud Comput. 6, 46–59 (2015)
73. Brzoza-Woch, R., Konieczny, M., Nawrocki, P., Szydlo, T., 89. Deng, R., Lu, R., Lai, C., Luan, T.H.: Towards power con-
Zielinski, K.: Embedded systems in the application of fog sumption delay tradeoff by workload allocation in cloud-fog
computing—levee monitoring use case. In: Proc. 11th IEEE computing. In: Proc. IEEE Int. Conf. Commun. (ICC), London,
Symp. Ind. Embedded Syst. (SIES), Kraków, Poland, pp. 1–6. U.K., pp. 3909–3914. (2015)
(2016) 90. Gu, L., Zeng, D., Guo, S., Barnawi, A., Xiang, Y.: Cost efficient
74. Aazam, M., Huh, E.-N., E-HAMC: leveraging fog computing resource management in fog computing supported medical
for emergency alert service. In: Proc. IEEE Int. Conf. Pervasive cyber-physical system. IEEE Trans. Emerg. Top. Comput. 5(1),
Comput. Commun. Workshops (PerCom Workshops), St. Louis, 108–119 (2017)
MO, USA, pp. 518–523. (2015) 91. Cao, Y., Chen, S., Hou, P., Brown, D.: FAST: a fog computing
75. Gazis, V. et al.: Components of fog computing in an industrial assisted distributed analytics system to monitor fall for stroke
internet of things context. In: Proc. 12th Annu. IEEE Int. Conf. mitigation. In: Proc. IEEE Int. Conf. Netw. Archit. Storage
Sens. Commun. Netw. Workshops (SECON Workshops), Seat- (NAS), Boston, MA, USA, pp. 2–11. (2015)
tle, WA, USA, pp. 1–6. (2015) 92. Mei, B., Cheng, W., Cheng, X.: Fog computing based ultraviolet
76. Xu, Y., Mahendran, V., Radhakrishnan, S.: Towards SDN-based radiation measurement via smartphones. In: Proc. 3rd IEEE
fog computing: MQTT broker virtualization for effective and Workshop Hot Topics Web Syst. Technol. (HotWeb), Wash-
reliable delivery. In: Proc. 8th Int. Conf. Commun. Syst. Netw. ington, DC, USA, pp. 79–84. (2015)
(COMSNETS), Bengaluru, India, pp. 1–6. (2016) 93. Kim, O.T.T., Tri, N.D., Nguyen, V.D., Tran, N.H., Hong, C.S.:
77. Berndt, H., Graubmann, P., Wakano, M.: Service specification A shared parking model in vehicular network using fog and
concepts in TINA-C. In: Kugler, H.-J., Mullery, A., Niebert, N. cloud environment. In: Proc. 17th Asia–Pac. Netw. Oper.
(eds.) Towards a Pan-European Telecommunication Service Manag. Symp. (APNOMS), Busan, South Korea, pp. 321–326.
Infrastructure—IS&N ’94, pp. 355–366. Springer, Heidelberg (2015)
(1994)

123
Cluster Computing (2022) 25:1111–1154 1151

94. Lin Y., Shen, H.: Cloud fog: towards high quality of experience 114. Bouachir, O., et al.: Blockchain and fog computing for cyber-
in cloud gaming. In: Proc. 44th Int. Conf. Parallel Process., physical systems: the case of smart industry. Computer 53(9),
Beijing, China, pp. 500–509. (2015) 36–45 (2020). https://doi.org/10.1109/MC.2020.2996212
95. Tang, M., Gao, L., Pang, H., Huang, J., Sun, L.: Optimizations 115. Lakhwani, K., Gianey, H., Agarwal, N., Gupta, S.: Development
and economics of crowdsourced mobile streaming. IEEE of IoT for smart agriculture a review. In: Emerging Trends in
Commun. Mag. 55(4), 21–27 (2017) Expert Applications and Security, pp. 425–432. Springer, Sin-
96. Fuerst, A., Ali-Eldin, A., Shenoy, P., Sharma, P.: Cloud-scale gapore (2019)
VM deflation for running interactive applications on transient 116. Qiu, Q., Sun, Na., Bai, He., Wang, N., Fan, Z., Wang, Y., Meng,
servers. (2020). arXiv preprint arXiv:2006.00508 Z., Li, B., Cong, Y.: Field-based high-throughput phenotyping
97. Terpák, J., Horovčák, P., Lukáč, M.: Mathematical models for Maize plant using 3D LiDAR point cloud generated with a
creation using orchestration and choreography of web services. ‘‘Phenomobile.’’ Front. Plant Sci. 10, 554 (2019)
In: 2016 17th International Carpathian Control Conference 117. Soh, Z.H., Husa, M.A., Abdullah, S.A., Shafie, M.A.: Smart
(ICCC), pp. 739–742. IEEE (2016) waste collection monitoring and alert system via IoT. In: 2019
98. Gruber, T.R.: A translation approach to portable ontology IEEE 9th Symposium on Computer Applications & Industrial
specifications. Knowl. Acquis. 5(2), 199–220 (1993) Electronics (ISCAIE), pp. 50–54. IEEE, Piscataway (2019)
99. Yongsiriwit, K., Sellami, M., Gaaloul, W.: A semantic frame- 118. Deng, R., Lu, R., Lai, C., Luan, T.H., Liang, H.: Optimal
work supporting cloud resource descriptions interoperability. In: workload allocation in fog-cloud computing toward balanced
Proc. IEEE 9th Int. Conf. Cloud Comput. (CLOUD), San delay and power consumption. IEEE Internet Things J. 3(6),
Francisco, CA, USA, pp. 585–592. (2016) 1171–1181 (2016)
100. Raza, M.R., Varol, A.: QoS parameters for viable SLA in cloud. 119. Zhang, X., Chen, H., Zhao, Y., Ma, Z., Xu, Y., Huang, H., Yin,
In: 2020 8th International Symposium on Digital Forensics and H., Wu, D.O.: Improving cloud gaming experience through
Security (ISDFS), pp. 1–5. IEEE (2020) mobile edge computing. IEEE Wirel. Commun. 26(4), 178–183
101. Zaheer, F.-E., Xiao, J., Boutaba, R.: Multi-provider service (2019)
negotiation and contracting in network virtualization. In: Proc. 120. GamingAnywhere. http://gaminganywhere.org/. Accessed 20
IEEE Netw. Oper. Manag. Symp. (NOMS), Osaka, Japan, Mar 2017
pp. 471–478. (2010) 121. ETSI–Intelligent Transport. http://www.etsi.org/technologies-
102. Delta Cloud. Delta Cloud-Many Clouds. One Api. No Prob- clusters/technologies/intelligent-transport. Accessed 20 Mar
lem.[Online]. Available: https://deltacloud.apache.org/. Acces- 2017
sed 28 Feb 2017 122. Kumar, V., Ahmad, M., Mishra, D., Kumari, S., Khan, M.K.:
103. Yangui, S., Tata, S.: An OCCI compliant model for PaaS RSEAP: RFID based secure and efficient authentication protocol
resources description and provisioning. Comput. J. 59, 308–324 for vehicular cloud computing. Veh. Commun. 22, 100213
(2014) (2020)
104. Sellami, R., Vedrine, M., Bhiri, S., Defude, B.: Automating 123. Shojafar, M., Cordeschi, N., Baccarelli, E.: Energy-efficient
resources discovery for multiple data stores cloud applications. adaptive resource management for real-time vehicular cloud
In: Proc. 5th Int. Conf. Cloud Comput. Services Sci. (CLOSER), services. IEEE Trans. Cloud Comput. 7, 196–209 (2016)
Lisbon, Portugal, pp. 397–405. (2015) 124. Giang, N.K., Leung, V.C., Lea, R.: On developing smart
105. Naboulsi, D., Fiore, M., Ribot, S., Stanica, R.: Large-scale transportation applications in fog computing paradigm. In: Proc.
mobile traffic analysis: a survey. IEEE Commun. Surv. Tutor. 6th ACM Symp. Develop. Anal. Intell. Veh. Netw. Appl.
18(1), 124–161 (2016) (DIVANet), pp. 91–98. (2016)
106. Dhole, A., Thomas, M.V., Chandrasekaran, K.: An efficient 125. Al Faruque, M.A., Vatanparvar, K.: Energy management-as-a-
trust-based game-theoretic approach for cloud federation for- service over fog computing platform. IEEE Internet Things J.
mation. In: Proc. 3rd Int. Conf. Adv. Comput. Commun. Syst. 3(2), 161–169 (2016)
(ICACCS), vol. 1. Coimbatore, India, pp. 1–6. (2016) 126. Gill, S.S., Garraghan, P., Buyya, R.: ROUTER: fog enabled
107. Pan, J.-S., Dao, T.-K.: A compact bat algorithm for unequal cloud based intelligent resource management approach for smart
clustering in wireless sensor networks. Appl. Sci. 9(10), 1973 home IoT devices. J. Syst. Softw. 154, 125–138 (2019)
(2019) 127. Mahmud, R., Toosi, A.N., Ramamohanarao, K., Buyya, R.:
108. Mondal, S., Das, G., Wong, E.: Cost-optimal cloudlet placement Context-aware placement of industry 4.0 applications in fog
frameworks over fiber-wireless access networks for low-latency computing environments. IEEE Trans. Ind. Inform. 16,
applications. J. Netw. Comput. Appl. 138, 27–38 (2019) 7004–7013 (2019)
109. Ghobaei-Arani, M., Souri, A., Rahmanian, A.A.: Resource 128. Mukherjee, M., Shu, L., Wang, D., Li, K., Chen, Y.: Poster
management approaches in fog computing: a comprehensive abstract: a fog computing-based framework to reduce traffic
review. J. Grid Comput. (2019). https://doi.org/10.1007/s10723- overhead in large-scale industrial applications. In: Proc. IEEE
019-09491-1 INFOCOM, Atlanta, GA, USA, pp. 1–2. (2017)
110. Secci, S., Raad, P., Gallard, P.: Linking virtual machine mobility 129. Bruneo, D. et al.: Stack4Things as a fog computing platform for
to user mobility. IEEE Trans. Netw. Serv. Manage. 13(4), smart city applications. In: Proc. IEEE Conf. Comput. Commun.
927–940 (2016) Workshops (INFOCOM WKSHPS), San Francisco, CA, USA,
111. Jalali, F., Hinton, K., Ayre, R., Alpcan, T., Tucker, R.S.: Fog pp. 848–853. (2016)
computing may help to save energy in cloud computing. IEEE J. 130. De Vita, F., Bruneo, D.: Leveraging Stack4Things for federated
Sel. Areas Commun. 34(5), 1728–1739 (2016) learning in intelligent cyber physical systems. J. Sens. Actuator
112. OpenFog Consortium. https://www.openfogconsortium.org. Netw. 9(4), 59 (2020)
Accessed Oct 2020 131. Chen, N., Chen, Y., Song, S., Huang, C.-T., Ye, X.: Poster
113. Su, J., Lin, F., Zhou, X., Lu, X.: Steiner tree based optimal abstract: Smart urban surveillance using fog computing. In:
resource caching scheme in fog computing. China Commun. Proc. IEEE/ACM Symp. Edge Comput. (SEC), pp. 95–96.
12(8), 161–168 (2015) (2016)

123
1152 Cluster Computing (2022) 25:1111–1154

132. El Fawal, A.H., Mansour, A., Najem, M.: V2V Influence on 148. He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R., Vinel,
M2M and H2H Traffics During Emergency Scenarios. IGI A.: A provably-secure cross-domain handshake scheme with
Global, Hershey (2019) symptoms-matching for mobile healthcare social network. In:
133. Kumari, A., Tanwar, S., Tyagi, S., Kumar, N.: Fog computing Proceedings of the IEEE Transactions on Dependable and
for healthcare 4.0 environment: opportunities and challenges. Secure Computing, pp. 1–2. (2016)
Comput. Electr. Eng. 72, 1–13 (2018) 149. Al-Khafajiy, M., Otoum, S., Baker, T., Asim, M., Maamar, Z.,
134. Vora, J., Tanwar, S., Tyagi, S., Kumar, N., Rodrigues, J.J.P.C.: Aloqaily, M., Taylor, M., Randles, M.: Intelligent control and
FAAL: fog computing-based patient monitoring system for security of fog resources in healthcare systems via a cognitive
ambient assisted living. In: Proceedings of the IEEE 19th fog model. ACM Trans. Internet Technol. 21(3), 23 (2021).
International Conference on E-health Networking, Applications https://doi.org/10.1145/3382770
and Services (Healthcom), pp. 1–6. (2017) 150. Elmisery, A.M., Rho, S., Botvich, D.: A fog based middleware
135. Wu, F., Wu, T., Yuce, M.: An internet-of-things (IoT) network for automated compliance with OECD privacy principles in
system for connected safety and health monitoring applications. internet of healthcare things. IEEE Access 4, 8418–8441 (2016)
Sensors 19, 21 (2018) 151. Tasic, J., Gusev, M., Ristov, S.: A medical cloud. In: Proceed-
136. Ullah, U., Sehr, I., Akbar, M., Ning, H.: FoG assisted secure de- ings of the 9th international convention on information and
duplicated data dissemination in smart healthcare IoT. In: Proc. communication technology, electronics and microelectronics
IEEE Int. Conf. Smart Internet Things (SmartIoT), Xi’an, China, (MIPRO), p. 400–405. (2016)
pp. 166–171. (2018) 152. Ramalho, F., Neto, A., Santos, K., Filho, J.B., Agoulmine, N.:
137. Rahmani, A.M., et al.: Exploiting smart e-health gateways at the Enhancing e-health smart applications: a fog-enable. In: Proc.
edge of healthcare internet-of-things: a fog computing approach. 17th HealthCom, Boston, MA, USA, pp. 323–328. (2015)
Future Gener. Comput. Syst. 78, 641–658 (2018) 153. Anya, O., Tawfik, H.: Designing for practice-based context-
138. Siddique, A., Hasan, O., Khalid, F., Shafique, M.: ApproxCS: awareness in ubiquitous e-health environments. Comput. Electr.
near-sensor approximate compressed sensing for IoT-healthcare Eng. 61, 312–326 (2017)
systems. (2018). arXiv: 1811.07330v1. 154. Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet
139. Rias, R.N.B., Akbar, M.S., Aazam, M.: Fog-supported internet of things realize its potential. Computers 49(8), 112–116 (2016)
of things (IoTs) architecture for remote patient monitoring 155. Ni, J., Lin, X., Zhang, K., Shen, X.: Privacy-preserving real-time
systems using wireless body area sensor networks. In: Proc. navigation system using vehicular crowdsourcing. In: Proc.
IEEE DASC/PiCom/DataCom/CyberSciTech, Athens, Greece, IEEE VTC Fall, Montreal, QC, Canada, pp. 1–5. (2016)
pp. 462–466. (2018) 156. Gupta, H., Nath, S.B., Chakraborty, S., Ghosh, S.K.: SDFog: a
140. Jangra, P., Gupta, M.: A design of real-time ulti-layered smart software defined computing architecture for QoS aware service
healthcare monitoring framework using IoT. In: Proc. Int. Conf. orchestration over edge devices. ArXiv Preprint, Tech. Rep.
Intell. Adv. Syst. (ICIAS), Kuala Lumpur, Malaysia, pp. 1–5. (2017). https://arxiv.org/pdf/1609.01190.pdf
(2018) 157. Shi, W., Dustdar, S.: The promise of edge computing. Com-
141. Muhammed, T., Mehmood, R., Albeshri, A., Katib, I.: Ube- puters 49(5), 78–81 (2016)
Health: a personalized ubiquitous cloud and edge-enabled net- 158. Zhang, T.: Fog boosts capabilities to add more things securely to
worked healthcare system for smart cities. IEEE Access 6, the internet, Cisco Blogs, San Jose, CA, USA (2016)
32258–32285 (2018) 159. Ahmed, E., Rehmani, M.H.: Mobile edge computing: opportu-
142. George, A., Dhanasekaran, H., Chittiappa, J.P., Challagundla, nities, solutions, and challenges. Future Gener. Comput. Syst.
L.A., Nikkam, S.S., Abuzaghleh, O., Internet of things in health 70, 59–63 (2017)
care using fog computing. In: Proc. IEEE Long Island Syst. 160. Zhang, T.: Malware defense is a team sport, best played by
Appl. Technol. Conf. (LISAT), Farmingdale, NY, USA, pp. 1–6. collaborative fog nodes, Cisco Blogs, San Jose, CA, USA (2016)
(2018) 161. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing:
143. Azimi, I., Takalo-Mattila, J., Azanpour, A., Rahmani, A.M., vision and challenges. IEEE Internet Things J. 3(5), 637–646
Soininen, J., Liljeberg, P.: Empowering healthcare IoT systems (2016)
with hierarchical edge-based deep learning. In: Proc. IEEE/ 162. Wang, C., Liang, C., Yu, F.R., Chen, Q., Tang, L.: Computation
ACM Int. Conf. Connected Health Appl. Syst. Eng. Technol. offloading and resource allocation in wireless cellular networks
(CHASE), Washington DC, USA, pp. 63–68. (2018) with mobile edge computing. IEEE Trans. Wirel. Commun.
144. Elayan, H., Aloqaily, M., Guizani, M.: Sustainability of 16(8), 4924–4938 (2017)
healthcare data analysis IoT-based systems using deep federated 163. Wang, Y., Sheng, M., Wang, X., Wang, L., Li, J.: Mobile-edge
learning. IEEE Internet of Things J. (2021). https://doi.org/10. computing: Partial computation offloading using dynamic volt-
1109/JIOT.2021.3103635 age scaling. IEEE Trans. Commun. 64(10), 4268–4282 (2016)
145. Hayyolalam, V., Aloqaily, M., Özkasap, Ö., Guizani, M.: Edge 164. Roman, R., Lopez, J., Manbo, M.: Mobile edge computing, fog
intelligence for empowering IoT-based healthcare systems. et al.: a survey and analysis of security threats and challenges.
IEEE Wirel. Commun. 28(3), 6–14 (2021). https://doi.org/10. Future Gener. Comput. Syst. 78, 680–698 (2018)
1109/MWC.001.2000345 165. Ni, J., Lin, X., Zhang, K., Yu, Y.: Secure and deduplicated
146. Peralta, G., Iglesias-Urkia, M., Barcelo, M., Gomez, R., Moran, spatial crowdsourcing: A fog-based approach. In: Proc. Globe-
A., Bilbao, J.: Fog computing based efficient iot scheme for the com, Washington, DC, USA, pp. 1–6. (2016)
industry 4.0. In: Proceedings of the IEEE International Work- 166. Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward
shop of Electronics, Control, Measurement, Signals and Their private searchable encryption from constrained cryptographic
Application to Mechatronics (ECMSM), pp. 1–6. (2017) primitives. In: Proceedings of the 2017 ACM SIGSAC Con-
147. Akrivopoulos, O., Chatzigiannakis, I., Tselios, C., Antoniou, A.: ference on Computer and Communications Security,
On the deployment of healthcare applications over fog com- pp. 1465–1482. (2017)
puting infrastructure. In: Proceedings of the IEEE 41st Annual 167. Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for
Computer Software and Applications Conference (COMPSAC), internet of things applications: challenges and solutions. IEEE
pp. 288–93. (2017) Commun. Surv. Tutor. 20(1), 601–628 (2017)

123
Cluster Computing (2022) 25:1111–1154 1153

168. Huo, Y., Hu, C., Qi, X., Jing, T.: LoDPD: a location difference- Proceedings of the Seventh Symposium on Information and
based proximity detection protocol for fog computing. IEEE Communication Technology. ACM. pp 173–180. (2016)
Internet Things J. 4(5), 1117–1124 (2017) 188. Alliance, C.S.: The Treacherous 12 Cloud Computing Top
169. Yang, R., et al.: Position based cryptography with location Threats in 2016 (2016). https://downloads.cloudsecurityalliance.
privacy: a step for fog computing. Future Gener. Comput. Syst. org/assets/research/top-threats/Treacherous-12_Cloud-Comput
78, 799–806 (2018) ing_Top-Threats.Pdf. Accessed 03 Oct 2020
170. Yu, S.: Big privacy: challenges and opportunities of privacy 189. Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan,
study in the age of big data. IEEE Access 4, 2751–2763 (2016) R.: Fog computing security challenges and future directions
171. Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of [energy and security]. IEEE Consum. Electron. Mag. 8(3),
fog computing and its security issues. Concurr. Comput. Pract. 92–96 (2019)
Exp. 28(10), 2991–3005 (2016) 190. Shin, S., Gu, G. (2012) Cloudwatcher: network security moni-
172. Tuli, S., Mahmud, R., Tuli, S., Buyya, R.: Fogbus: a blockchain- toring using openflow in dynamic cloud networks (or: How to
based lightweight framework for edge and fog computing. provide security monitoring as a service in clouds?). In: Net-
J. Syst. Softw. 154, 22–36 (2019) work Protocols (ICNP), 2012 20th IEEE international confer-
173. University, C.M. Elijah: cloudlet infrastructure for mobile ence on. pp 1–6. IEEE
computing. GitHub (2017) 191. Ab Rahman, N.H., Choo, K.-K.R.: A survey of information
174. Pereira, P., Araujo, J., Torquato, M., Dantas, J., Melo, C., security incident handling in the cloud. Comput. Secur. 49,
Maciel, P.: Stochastic performance model for web server 45–69 (2015)
capacity planning in fog computing. J. Supercomput. (2020). 192. Ma, X., Fu, X., Luo, B., Du, X., Guizani, M.: A design of
https://doi.org/10.1007/s11227-020-03218-w firewall based on feedback of intrusion detection system in
175. Aldwairi, M., Hasan, M., Balbahaith, Z.: Detection of drive-by cloud environment. In: 2019 IEEE Global Communications
download attacks using machine learning approach. In: Cogni- Conference (GLOBECOM), pp. 1–6. IEEE (2019)
tive Analytics: Concepts, Methodologies, Tools, and Applica- 193. Hathaliya, J.J., Tanwar, S.: An exhaustive survey on security
tions, pp. 1598–1611. IGI Global (2020) and privacy issues in Healthcare 4.0. Comput. Commun. 153,
176. Heuser, S., Negro, M., Pendyala, P.K., Sadeghi, A.R.: Technical 311–335 (2020)
Report: DroidAuditor: Forensic Analysis of Application-Layer 194. Tamimi, A.A., Dawood, R., Sadaqa, L.: Disaster recovery
Privilege Escalation Attacks on Android (2016) techniques in cloud computing. In: 2019 IEEE Jordan Interna-
177. Singh, P., Tiwari, P., Singh, S.: Analysis of malicious behavior tional Joint Conference on Electrical Engineering and Infor-
of android apps. Proced. Comput Sci 79, 215–221 (2016) mation Technology (JEEIT), pp. 845–850. IEEE (2019)
178. Sucasas, V., Mantas, G., Radwan, A., Rodriguez, J.: An Oauth2- 195. Zhang, W., Tian, D.: FindEvasion: an effective environment-
based protocol with strong user privacy preservation for smart sensitive malware detection system for the cloud. In: Digital
city mobile e-health apps. In: 2016 IEEE International Confer- Forensics and Cyber Crime: 9th International Conference,
ence on Communications (ICC), pp. 1–6. IEEE (2016) ICDF2C 2017, Prague, Czech Republic, October 9–11, 2017,
179. Ge, X., Pan, Y., Fan, Y., Fang, C.: AMDroid: android malware Proceedings, vol. 216, p. 3. Springer (2018)
detection using function call graphs. In: 2019 IEEE 19th Inter- 196. Berlin, K., Saxe, J.: Improving zero-day malware testing
national Conference on Software Quality, Reliability and methodology using statistically significant time-lagged test
Security Companion (QRS-C), pp. 71–77. IEEE (2019) samples. (2016). arXiv preprint arXiv:1608.00670
180. Chang, V., Ramachandran, M.: Towards achieving data security 197. Varriale, A., Prinetto, P., Carelli, A., Trotta, P.: Secube TM: data
with the cloud computing adoption framework. IEEE Trans. at rest and data in motion protection. In: Proceedings of the
Serv. Comput. 9(1), 138–152 (2016) International Conference on Security and Management (SAM).
181. Huang, Y., Debnath, J., Iorga, M., Kumar, A., Xie, B.: CSAT: a The Steering Committee of The World Congress in Computer
user-interactive cyber security architecture tool based on NIST- Science, Computer Engineering and Applied Computing
compliance security controls for risk management. In: 2019 (WorldComp), Athens. pp 138–145. (2016)
IEEE 10th Annual Ubiquitous Computing, Electronics & 198. Hussein, N.H., Khalid, A., Khanfar, K.: A survey of cryptog-
Mobile Communication Conference (UEMCON), raphy cloud storage techniques. Int. J. Comput. Sci. Mob.
pp. 0697–0707. IEEE (2019) Comput. 5, 186–191 (2016)
182. Mao, Y., Li, J., Chen, M.R., Liu, J., Xie, C., Zhan, Y.: Fully 199. Liu, F., Hao, Wu., Mai, K., Lee, R.B.: Newcache: Secure cache
secure fuzzy identity-based encryption for secure iot commu- architecture thwarting cache side-channel attacks. IEEE Micro
nications. Comput. Stand. Interfaces 44, 117–122 (2016) 36(5), 8–16 (2016)
183. Azzabi, T., Farhat, H., Sahli, N.: A survey on wireless sensor 200. Panigrahy, N.K., Li, J., Towsley, D., Hollot, C.V.: Network
networks security issues and military specificities. In: 2017 cache design under stationary requests: exact analysis and
International Conference on Advanced Systems and Electric poisson approximation. Comput. Netw. 180, 107379 (2020)
Technologies (IC_ASET), pp. 66–72. IEEE (2017) 201. Zhou, Z., Reiter, M.K., Zhang, Y.: A software approach to
184. Chen, R.Y.: An intelligent value stream-based approach to defeating side channels in last-level caches. In: Proceedings of
collaboration of food traceability cyber physical system by fog the 2016 ACM SIGSAC Conference on Computer and Com-
computing. Food Control 71, 124–137 (2017) munications Security, pp. 871–882. (2016)
185. Joshi B, Singh NK (2016) Mitigating dynamic dos attacks in
mobile ad hoc network. In: Colossal Data Analysis and Net- Publisher’s Note Springer Nature remains neutral with regard to
working (CDAN), Symposium On. IEEE. Pp 1–8 jurisdictional claims in published maps and institutional affiliations.
186. Mishra, S., Sahoo, M.N., Bakshi, S., Rodrigues, J.J.: Dynamic
resource allocation in fog-cloud hybrid systems using multicri-
teria AHP techniques. IEEE Internet Things J. 7(9), 8993–9000
(2020)
187. Ha, D.A., Nguyen, K.T., Zao, J.K.: Efficient authentication of
resource-constrained iot devices based on ecqv implicit certifi-
cates and datagram transport layer security protocol. In:

123
1154 Cluster Computing (2022) 25:1111–1154

Siddhant Jain is currently an K. K. Sreelakshmi received her


undergraduate student pursuing B.Tech degree in Computer
his Bachelor’s degree in Com- Science and Engineering from
puter Science at Birla Institute Cochin University of Science
of Technology and Science and Technology (CUSAT),
Pilani, Pilani Campus. He is Kerala, India, in 2017. She is
currently working as a software currently doing her Master of
engineer intern at VMware Engineering in Computer Sci-
Software India. He has also ence and Engineering at BITS
worked as a Software Developer Pilani. Her research domains
Intern at ScoVelo Consulting include Artificial Intelligence,
Limited, Chennai. His research Deep Learning, and IoT.
interests include Internet of
Things (IoT), Fog Computing,
Healthcare monitoring, Com-
puter Architecture, Machine Learning, and Deep Learning.
Joel P. Rodrigues [S0 01, M0 06,
Dr. Shashank Gupta is an
SM0 06, F0 20] is a professor at
Assistant Professor in the
the Federal University of Piauı́
Department of Computer Sci-
(UFPI), Brazil; a senior
ence & Information Systems,
researcher at the Instituto de
Birla Institute of Technology &
Telecomunicações (IT), Portu-
Science, Pilani, Pilani Campus
gal; and collaborator of
since 2017. He is an active
PPGETI, Federal University of
member of Disruptive Tech-
Ceará, Brazil. His main research
nologies (DT) Lab. He has
interests include Internet tech-
received his PhD from National
nologies, sensor networks,
Institute of Technology Kuruk-
mobile and ubiquitous comput-
shetra, Haryana in Web Security
ing, vehicular communications,
in 2017, M.Tech. (CSE) from
e-learning and e-health tech-
Central University of Rajasthan
nologies, mobile and cloud
in 2012 and B.E (IT) from
computing. He has authored or co-authored over 850 scientific pub-
University of Pune in 2009. His research interest specializes in the
lications. He is Fellow of IEEE, ACM Senior Member, IEEE ComSoc
areas of Privacy and Security, Internet of Things (IoT), Fog Com-
Distinguished Lecturer, Past-Director for Conference Development -
puting, Internet of Vehicles (IoVs) and some related areas of high
IEEE ComSoc Board of Governors, a Past-Chair of the IEEE ComSoc
performance computing. He has recently contributed his research
Technical Committee on eHealth, and a Past-Chair of the IEEE
work in the related areas of HTML5 injection attacks, IoT healthcare
ComSoc Technical Committee on Communications Software. Joel is
systems, IoT-driven precision agriculture, cryptocurrencies related to
the Editor-in-Chief of the International Journal of E-Health and
blockchain, etc. He has published numerous research articles in var-
Medical Communications (from IGI Global, USA). He is the Sym-
ious top tier conferences and journals such as Future Generation
posium Co-Chair leader of Several ICC/GLOBECOM conferences,
Computer Systems (FGCS), Elsevier, Journal of Network and Com-
among others. He has authored or coauthored over 950 papers in
puter Applications (JNCA), Journal of Ambient Intelligence and
refereed international journals and conferences, 3 books, 2 patents,
Humanized Computing (AIHC), Springer, NSS, Globecom, ICC,
and 1 ITU-T Recommendation. He had been awarded several Out-
FIPS, etc. He is also a Senior member of IEEE and professional
standing Leadership and Outstanding Service Awards by IEEE
member of ACM. In addition, he is a part of program/review com-
Communications Society and several best papers awards. Prof.
mittee of various top-tier conferences, transactions and journals, and
Rodrigues is a member of the Internet Society, a senior member
also served as PI/Co-PI for numerous sponsored research grants. He
ACM, and Fellow of IEEE.
has also filed a few patents related to web security.

123

You might also like