From Cloud to Fog Computing

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en Osanaiye, Opeyemi Chen, Shuo Yan, Zheng Lu, Rongxing Choo, Kim Kwang Raymond Dlodlo, Mqhele 2017-10-15T20:54:51Z 2017-10-15T20:54:51Z 2017
dc.identifier.citation Osanaiye , O , Chen , S , Yan , Z , Lu , R , Choo , K K R & Dlodlo , M 2017 , ' From Cloud to Fog Computing : A Review and a Conceptual Live VM Migration Framework ' IEEE ACCESS , vol 5 , 7896564 , pp. 8284-8300 . DOI: 10.1109/ACCESS.2017.2692960 en
dc.identifier.issn 2169-3536
dc.identifier.other PURE UUID: b3508d69-d932-46e1-a97f-106ae7416702
dc.identifier.other PURE ITEMURL:
dc.identifier.other PURE LINK:
dc.identifier.other PURE FILEURL:
dc.description.abstract Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined. en
dc.format.extent 17
dc.format.extent 8284-8300
dc.format.mimetype application/pdf
dc.language.iso en en
dc.relation.ispartofseries IEEE ACCESS en
dc.relation.ispartofseries Volume 5 en
dc.rights openAccess en
dc.subject.other Computer Science(all) en
dc.subject.other Materials Science(all) en
dc.subject.other Engineering(all) en
dc.subject.other 113 Computer and information sciences en
dc.subject.other 213 Electronic, automation and communications engineering, electronics en
dc.title From Cloud to Fog Computing en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department University of South Australia
dc.contributor.department Nanyang Technological University
dc.contributor.department Department of Communications and Networking
dc.contributor.department University of New Brunswick
dc.contributor.department University of Cape Town
dc.subject.keyword Cloud computing
dc.subject.keyword edge computing
dc.subject.keyword fog computing
dc.subject.keyword live VM migration framework
dc.subject.keyword virtualization
dc.subject.keyword Computer Science(all)
dc.subject.keyword Materials Science(all)
dc.subject.keyword Engineering(all)
dc.subject.keyword 113 Computer and information sciences
dc.subject.keyword 213 Electronic, automation and communications engineering, electronics
dc.identifier.urn URN:NBN:fi:aalto-201710157141
dc.identifier.doi 10.1109/ACCESS.2017.2692960
dc.type.version publishedVersion

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive

Advanced Search

article-iconSubmit a publication


My Account