메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 25445-25454

A framework of fog computing: Architecture, challenges, and optimization

Author keywords

Fog computing; Genetic algorithms; Internet of Things; Optimization

Indexed keywords

BIG DATA; CLOUD COMPUTING; COMPUTATION THEORY; COMPUTER ARCHITECTURE; EDGE COMPUTING; FAULT TOLERANCE; FOG; GENETIC ALGORITHMS; INTERNET OF THINGS; LOGIC GATES; OPTIMIZATION; RESOURCE ALLOCATION;

EID: 85032446751     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2766923     Document Type: Article
Times cited : (164)

References (35)
  • 1
    • 84874174122 scopus 로고    scopus 로고
    • Future Internet: The Internet of Things architecture, possible applications and key challenges
    • Dec
    • R. Khan, S. U. Khan, R. Zaheer, and S. Khan, ‘‘Future Internet: The Internet of Things architecture, possible applications and key challenges,’’ in Proc. FIT, Dec. 2012, pp. 257–260.
    • (2012) Proc. FIT , pp. 257-260
    • Khan, R.1    Khan, S.U.2    Zaheer, R.3    Khan, S.4
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • Oct
    • L. Atzori, A. Iera, and G. Morabito, ‘‘The Internet of Things: A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2787–2805, Oct. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 84899725808 scopus 로고    scopus 로고
    • The Internet of Things meets cloud computing [standards corner]
    • Apr
    • W. Lumpkins, ‘‘The Internet of Things meets cloud computing [standards corner],’’ IEEE Consum. Electron. Mag., vol. 2, no. 2, pp. 47–51, Apr. 2013.
    • (2013) IEEE Consum. Electron. Mag. , vol.2 , Issue.2 , pp. 47-51
    • Lumpkins, W.1
  • 4
    • 84962060491 scopus 로고    scopus 로고
    • Principles for engineering IoT cloud systems
    • Mar./Apr
    • H.-L. Truong and S. Dustdar, ‘‘Principles for engineering IoT cloud systems,’’ IEEE Cloud Comput., vol. 2, no. 2, pp. 68–76, Mar./Apr. 2015.
    • (2015) IEEE Cloud Comput , vol.2 , Issue.2 , pp. 68-76
    • Truong, H.-L.1    Dustdar, S.2
  • 5
    • 84913546410 scopus 로고    scopus 로고
    • Computational networks: Challenging traditional program management
    • Nov
    • G. Hurlburt, I. Bojanova, and R. Berezdivin, ‘‘Computational networks: Challenging traditional program management,’’ IT Prof., vol. 16, no. 6, pp. 66–69, Nov. 2014.
    • (2014) IT Prof , vol.16 , Issue.6 , pp. 66-69
    • Hurlburt, G.1    Bojanova, I.2    Berezdivin, R.3
  • 6
    • 84906841638 scopus 로고    scopus 로고
    • An information framework for creating a smart city through Internet of Things
    • Apr
    • J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, ‘‘An information framework for creating a smart city through Internet of Things,’’ IEEE Internet Things J., vol. 1, no. 2, pp. 112–121, Apr. 2014.
    • (2014) IEEE Internet Things J , vol.1 , Issue.2 , pp. 112-121
    • Jin, J.1    Gubbi, J.2    Marusic, S.3    Palaniswami, M.4
  • 7
    • 84894668409 scopus 로고    scopus 로고
    • Context aware computing for the Internet of Things: A survey
    • 1st Quart
    • C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ‘‘Context aware computing for the Internet of Things: A survey,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, 1st Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 414-454
    • Perera, C.1    Zaslavsky, A.2    Christen, P.3    Georgakopoulos, D.4
  • 9
    • 84902152743 scopus 로고    scopus 로고
    • Surveillance video: The biggest big data
    • Feb
    • T. Huang, ‘‘Surveillance video: The biggest big data,’’ Computing Now, vol. 7, no. 2, pp. 82–91, Feb. 2014.
    • (2014) Computing Now , vol.7 , Issue.2 , pp. 82-91
    • Huang, T.1
  • 10
    • 0033640753 scopus 로고    scopus 로고
    • Looking at people: Sensing for ubiquitous and wearable computing
    • Jan
    • A. Pentland, ‘‘Looking at people: Sensing for ubiquitous and wearable computing,’’ IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 1, pp. 107–119, Jan. 2000.
    • (2000) IEEE Trans. Pattern Anal. Mach. Intell. , vol.22 , Issue.1 , pp. 107-119
    • Pentland, A.1
  • 11
    • 84925880386 scopus 로고    scopus 로고
    • Exploiting mobile crowd-sourcing for pervasive cloud services: Challenges and solutions
    • Mar
    • J. Ren, Y. Zhang, K. Zhang, and X. Shen, ‘‘Exploiting mobile crowd-sourcing for pervasive cloud services: Challenges and solutions,’’ IEEE Commun. Mag., vol. 53, no. 3, pp. 98–105, Mar. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.3 , pp. 98-105
    • Ren, J.1    Zhang, Y.2    Zhang, K.3    Shen, X.4
  • 13
    • 70350136710 scopus 로고    scopus 로고
    • The case for VM-based cloudlets in mobile computing
    • Oct./Dec
    • M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, ‘‘The case for VM-based cloudlets in mobile computing,’’ IEEE Pervasive Comput., vol. 8, no. 4, pp. 14–23, Oct./Dec. 2009.
    • (2009) IEEE Pervasive Comput , vol.8 , Issue.4 , pp. 14-23
    • Satyanarayanan, M.1    Bahl, P.2    Caceres, R.3    Davies, N.4
  • 15
    • 81355138520 scopus 로고    scopus 로고
    • SPITFIRE: Toward a semantic Web of things
    • Nov
    • D. Pfisterer et al., ‘‘SPITFIRE: Toward a semantic Web of things,’’ IEEE Commun. Mag., vol. 49, no. 11, pp. 40–48, Nov. 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.11 , pp. 40-48
    • Pfisterer, D.1
  • 17
    • 30344440798 scopus 로고    scopus 로고
    • Prototypes and paratypes: Designing mobile and ubiquitous computing applications
    • Oct
    • G. D. Abowd et al., ‘‘Prototypes and paratypes: Designing mobile and ubiquitous computing applications,’’ IEEE Pervasive Comput., vol. 4, no. 4, pp. 67–73, Oct. 2005.
    • (2005) IEEE Pervasive Comput , vol.4 , Issue.4 , pp. 67-73
    • Abowd, G.D.1
  • 18
    • 0038032339 scopus 로고    scopus 로고
    • Issues and challenges in ubiquitous computing: Introduction
    • Dec
    • K. Lyytinen and Y. Yoo, ‘‘Issues and challenges in ubiquitous computing: Introduction,’’ Commun. ACM, vol. 45, no. 12, pp. 62–65, Dec. 2002.
    • (2002) Commun. ACM , vol.45 , Issue.12 , pp. 62-65
    • Lyytinen, K.1    Yoo, Y.2
  • 19
    • 84864303136 scopus 로고    scopus 로고
    • Cloudlets: Bringing the cloud to the mobile user
    • T. Verbelen, P. Simoens, F. De Turck, and B. Dhoedt, ‘‘Cloudlets: Bringing the cloud to the mobile user,’’ in Proc. MCS, 2012, pp. 29–36.
    • (2012) Proc. MCS , pp. 29-36
    • Verbelen, T.1    Simoens, P.2    De Turck, F.3    Dhoedt, B.4
  • 20
    • 84897768409 scopus 로고    scopus 로고
    • Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems
    • Jun
    • L. Gkatzikis and I. Koutsopoulos, ‘‘Migrate or not? Exploiting dynamic task migration in mobile cloud computing systems,’’ IEEE Wireless Commun., vol. 20, no. 3, pp. 24–32, Jun. 2013.
    • (2013) IEEE Wireless Commun , vol.20 , Issue.3 , pp. 24-32
    • Gkatzikis, L.1    Koutsopoulos, I.2
  • 21
    • 84866627419 scopus 로고    scopus 로고
    • Fog computing and its role in the Internet of Things
    • F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its role in the Internet of Things,’’ in Proc. MCC, 2012, pp. 13–16.
    • (2012) Proc. MCC , pp. 13-16
    • Bonomi, F.1    Milito, R.2    Zhu, J.3    Addepalli, S.4
  • 24
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive definition of fog computing
    • Oct
    • L. M. Vaquero and L. Rodero-Merino, ‘‘Finding your way in the fog: Towards a comprehensive definition of fog computing,’’ ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27–32, Oct. 2014.
    • (2014) ACM SIGCOMM Comput. Commun. Rev. , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 25
    • 84875870920 scopus 로고    scopus 로고
    • Performance-driven load balancing with a primary-backup approach for computational grids with low communication cost and replication cost
    • May
    • J. Balasangameshwara and N. Raju, ‘‘Performance-driven load balancing with a primary-backup approach for computational grids with low communication cost and replication cost,’’ IEEE Trans. Comput., vol. 62, no. 5, pp. 990–1003, May 2013.
    • (2013) IEEE Trans. Comput. , vol.62 , Issue.5 , pp. 990-1003
    • Balasangameshwara, J.1    Raju, N.2
  • 26
    • 84941286216 scopus 로고    scopus 로고
    • Policy-driven security management for fog computing: Preliminary framework and a case study
    • Aug
    • C. Dsouza, G.-J. Ahn, and M. Taguinod, ‘‘Policy-driven security management for fog computing: Preliminary framework and a case study,’’ in Proc. IRI, Aug. 2014, pp. 16–23.
    • (2014) Proc. IRI , pp. 16-23
    • Dsouza, C.1    Ahn, G.-J.2    Taguinod, M.3
  • 28
    • 85009710498 scopus 로고    scopus 로고
    • C. Babcock. (2014). 9 Worst Cloud Security Threats. [Online]. Available: http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085n?pagenumber=1
    • (2014) 9 Worst Cloud Security Threats
    • Babcock, C.1
  • 29
    • 84912130127 scopus 로고    scopus 로고
    • The fog computing paradigm: Scenarios and security issues
    • Sep
    • I. Stojmenovic and S. Wen, ‘‘The fog computing paradigm: Scenarios and security issues,’’ in Proc. FedCSIS, Sep. 2014, pp. 1–8.
    • (2014) Proc. FedCSIS , pp. 1-8
    • Stojmenovic, I.1    Wen, S.2
  • 30
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov
    • L. Zhou and Z. J. Haas, ‘‘Securing ad hoc networks,’’ IEEE Netw., vol. 13, no. 6, pp. 24–30, Nov. 1999.
    • (1999) IEEE Netw , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 31
    • 77958084781 scopus 로고    scopus 로고
    • Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks]
    • Oct
    • A. Wasef, R. Lu, X. Lin, and X. Shen, ‘‘Complementing public key infrastructure to secure vehicular ad hoc networks [security and privacy in emerging wireless networks],’’ IEEE Wireless Commun., vol. 17, no. 5, pp. 22–28, Oct. 2010.
    • (2010) IEEE Wireless Commun , vol.17 , Issue.5 , pp. 22-28
    • Wasef, A.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 32
    • 77957929278 scopus 로고    scopus 로고
    • Securing cluster-based ad hoc networks with distributed authorities
    • Oct
    • L.-C. Li and R.-S. Liu, ‘‘Securing cluster-based ad hoc networks with distributed authorities,’’ IEEE Trans. Wireless Commun., vol. 9, no. 10, pp. 3072–3081, Oct. 2010.
    • (2010) IEEE Trans. Wireless Commun. , vol.9 , Issue.10 , pp. 3072-3081
    • Li, L.-C.1    Liu, R.-S.2
  • 33
    • 84874876498 scopus 로고    scopus 로고
    • A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
    • Apr
    • R. Lacuesta, J. Lloret, M. Garcia, and L. Peñalver, ‘‘A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation,’’ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 4, pp. 629–641, Apr. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.4 , pp. 629-641
    • Lacuesta, R.1    Lloret, J.2    Garcia, M.3    Peñalver, L.4
  • 34
    • 84963853667 scopus 로고    scopus 로고
    • Privacy preserving deep computation model on cloud for big data feature learning
    • May
    • Q. Zhang, L. T. Yang, and Z. Chen, ‘‘Privacy preserving deep computation model on cloud for big data feature learning,’’ IEEE Trans. Comput., vol. 65, no. 5, pp. 1351–1362, May 2016.
    • (2016) IEEE Trans. Comput. , vol.65 , Issue.5 , pp. 1351-1362
    • Zhang, Q.1    Yang, L.T.2    Chen, Z.3
  • 35
    • 84993949465 scopus 로고    scopus 로고
    • PPHOCFS: Privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data
    • Q. Zhang, H. Zhong, L. T. Yang, F. Bu, and Z. Chen, ‘‘PPHOCFS: Privacy preserving high-order CFS algorithm on the cloud for clustering multimedia data,’’ ACM Trans. Multimedia Comput., Commun., Appl., vol. 12, no. 4s, p. 66:1–66:15, 2016.
    • (2016) ACM Trans. Multimedia Comput., Commun., Appl. , vol.12 , Issue.4 s
    • Zhang, Q.1    Zhong, H.2    Yang, L.T.3    Bu, F.4    Chen, Z.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.