Review
BibTex RIS Cite
Year 2020, Volume: 3 Issue: 2, 21 - 25, 31.12.2020

Abstract

References

  • Tabii, işte düzeltilmiş referanslar:
  • [1] M. Armbrust, et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
  • [2] H. H. Nidal and A. Khalid, “A survey of Cloud Computing Security challenges and solutions,” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 1, pp. 52-56, 2016.
  • [3] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges,” IEEE Internet of Things Journal, Vol. 3, No. 5, pp. 637-646, 2016.
  • [4] P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 2009, 53(6):50.
  • [5] B.P. Rimal, E. Choi and I. LumbI, "A taxonomy and survey of cloud computing systems," Fifth International Joint Conference on INC, IMS and IDC, 2009, pages 44–51.
  • [6] Q. Zhang, L. Cheng and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7–18, 2010.
  • [7] S. Aldossary and W. Allen, “Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 4, pp. 485-498, 2016.
  • [8] J. Zhang, B. Chen, Y. Zhao, X. Cheng and F. Hu, “Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,” IEEE Access, 2018, 18209-18237.
  • [9] S. Khan, S. Parkinson and Y. Qin, “Fog computing security: a review of current applications and security solutions,” Journal of Cloud Computing: Advances, Systems and Applications, 2017, Article number:19.
  • [10] D. He, S. Chan and M. Guizani, “Security in the Internet of Things Supported by Mobile Edge Computing,” IEEE Communications Magazine, 2018, pp. 56-61.
  • [11] P. Kumar, N. Zaidi and T. Choudhury, “Fog Computing: Common Security Issues and Proposed Countermeasures,” 5th International Conference on System Modeling & Advancement in Research Trends, 2016, pp. 311-315.
  • [12] M. Abrash, "Latency as the sine qua non of AR and VR," 2012.
  • [13] Rift O. delivers some home truths on latency. http://oculusrift-blog.com/john-carmacks-message-of-latency/682/, Accessed: 2016-06-01. Tabii, işte düzeltilmiş referanslar:
  • [14] CLAudit Project. Planetary-scale cloud latency auditing platform, 2016.
  • [15] A.R. Biswas and R. Giaffreda, “IoT and cloud convergence: Opportunities and challenges”, in Proc. IEEE World Forum on Internet of Things, 2014.
  • [16] M. Taneja and A. Davy, “Resource aware placement of IoT application modules in fog-cloud computing paradigm”, in Proc. Symposium on Integrated Network and Service Management, 2017.
  • [17] R. Arshad, S. Zahoor, M.A. Shah, A. Wahid and H. Yu, “Green IoT: An investigation on energy saving practices for 2020 and beyond”, IEEE Access, vol. 5, 2017.
  • [18] F. Jalali, A. Vishwanath, J. De Hoog and F. Suits, “Interconnecting fog computing and microgrids for greening IoT”, in Proc. ISGT-Asia, 2016.
  • [19] R. Buyya, M. Pathan and A. Vakali, Content delivery networks. Springer, 2008, vol. 9.
  • [20] A.M.K. Pathan and R. Buyya, “A taxonomy and survey of content delivery networks”, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report, 2007, vol. 4.
  • [21] J. Choi, J. Han, E. Cho, T. Kwon and Y. Choi, “A survey on content-oriented networking for efficient content delivery”, IEEE Communications Magazine, vol. 49, no. 3, 2011.
  • [22] C. Papagianni, A. Leivadeas and S. Papavassiliou, “A cloud-oriented content delivery network paradigm: Modeling and assessment”, IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 5, 2013.
  • [23] X. Wang, S. Leng and K. Yang, “Social-aware edge caching in fog radio access networks”, IEEE Access, vol. 5, 2017.

Edge, Fog and Cloud Computing: Offering Strong Computing

Year 2020, Volume: 3 Issue: 2, 21 - 25, 31.12.2020

Abstract

Advances in the Internet of Things (IoT) and 5G technology require new strategies and technologies to process any data from these areas. With edge, fog and could computing technologies, it will be possible to collect data from devices that use a wide variety of protocols and produce data in many different formats, and process these data in real time. This article, by examining the difficulties in the advancement of computing types and their application areas, the requirements and solutions are presented to provide strong computing

References

  • Tabii, işte düzeltilmiş referanslar:
  • [1] M. Armbrust, et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
  • [2] H. H. Nidal and A. Khalid, “A survey of Cloud Computing Security challenges and solutions,” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 1, pp. 52-56, 2016.
  • [3] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, “Edge Computing: Vision and Challenges,” IEEE Internet of Things Journal, Vol. 3, No. 5, pp. 637-646, 2016.
  • [4] P. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, 2009, 53(6):50.
  • [5] B.P. Rimal, E. Choi and I. LumbI, "A taxonomy and survey of cloud computing systems," Fifth International Joint Conference on INC, IMS and IDC, 2009, pages 44–51.
  • [6] Q. Zhang, L. Cheng and R. Boutaba, "Cloud computing: state-of-the-art and research challenges," Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7–18, 2010.
  • [7] S. Aldossary and W. Allen, “Data Security, Privacy, Availability, and Integrity in Cloud Computing: Issues and Current Solutions,” International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 7, No. 4, pp. 485-498, 2016.
  • [8] J. Zhang, B. Chen, Y. Zhao, X. Cheng and F. Hu, “Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,” IEEE Access, 2018, 18209-18237.
  • [9] S. Khan, S. Parkinson and Y. Qin, “Fog computing security: a review of current applications and security solutions,” Journal of Cloud Computing: Advances, Systems and Applications, 2017, Article number:19.
  • [10] D. He, S. Chan and M. Guizani, “Security in the Internet of Things Supported by Mobile Edge Computing,” IEEE Communications Magazine, 2018, pp. 56-61.
  • [11] P. Kumar, N. Zaidi and T. Choudhury, “Fog Computing: Common Security Issues and Proposed Countermeasures,” 5th International Conference on System Modeling & Advancement in Research Trends, 2016, pp. 311-315.
  • [12] M. Abrash, "Latency as the sine qua non of AR and VR," 2012.
  • [13] Rift O. delivers some home truths on latency. http://oculusrift-blog.com/john-carmacks-message-of-latency/682/, Accessed: 2016-06-01. Tabii, işte düzeltilmiş referanslar:
  • [14] CLAudit Project. Planetary-scale cloud latency auditing platform, 2016.
  • [15] A.R. Biswas and R. Giaffreda, “IoT and cloud convergence: Opportunities and challenges”, in Proc. IEEE World Forum on Internet of Things, 2014.
  • [16] M. Taneja and A. Davy, “Resource aware placement of IoT application modules in fog-cloud computing paradigm”, in Proc. Symposium on Integrated Network and Service Management, 2017.
  • [17] R. Arshad, S. Zahoor, M.A. Shah, A. Wahid and H. Yu, “Green IoT: An investigation on energy saving practices for 2020 and beyond”, IEEE Access, vol. 5, 2017.
  • [18] F. Jalali, A. Vishwanath, J. De Hoog and F. Suits, “Interconnecting fog computing and microgrids for greening IoT”, in Proc. ISGT-Asia, 2016.
  • [19] R. Buyya, M. Pathan and A. Vakali, Content delivery networks. Springer, 2008, vol. 9.
  • [20] A.M.K. Pathan and R. Buyya, “A taxonomy and survey of content delivery networks”, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report, 2007, vol. 4.
  • [21] J. Choi, J. Han, E. Cho, T. Kwon and Y. Choi, “A survey on content-oriented networking for efficient content delivery”, IEEE Communications Magazine, vol. 49, no. 3, 2011.
  • [22] C. Papagianni, A. Leivadeas and S. Papavassiliou, “A cloud-oriented content delivery network paradigm: Modeling and assessment”, IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 5, 2013.
  • [23] X. Wang, S. Leng and K. Yang, “Social-aware edge caching in fog radio access networks”, IEEE Access, vol. 5, 2017.
There are 24 citations in total.

Details

Primary Language English
Subjects Artificial Life and Complex Adaptive Systems
Journal Section Reviews
Authors

Fatih Topaloğlu

Publication Date December 31, 2020
Published in Issue Year 2020 Volume: 3 Issue: 2

Cite

IEEE F. Topaloğlu, “Edge, Fog and Cloud Computing: Offering Strong Computing”, International Journal of Data Science and Applications, vol. 3, no. 2, pp. 21–25, 2020.

AI Research and Application Center, Sakarya University of Applied Sciences, Sakarya, Türkiye.