5,762 research outputs found

    A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination

    Get PDF
    © 2020, Springer Nature Switzerland AG. This paper presents a multi-criteria cloud-fog coordination model to recommend where data that things generate should be sent (either cloud, fog, or cloud & fog concurrently) and in what order (either cloud then fog, fog then cloud, or fog & cloud concurrently). The model considers end-users’ concerns such as data latency, sensitivity, and freshness. The coordination model uses fuzzy logic when addressing these concerns in preparation for producing the recommendations. For validation purposes, a healthcare-driven IoT application along with an in-house testbed, that features real sensors and fog and cloud platforms, have permitted to carry out different experiments that demonstrate the technical feasibility of both the multi-criteria cloud-fog coordination model and the fuzzy-logic-based approach

    Addressing the Challenges in Federating Edge Resources

    Full text link
    This book chapter considers how Edge deployments can be brought to bear in a global context by federating them across multiple geographic regions to create a global Edge-based fabric that decentralizes data center computation. This is currently impractical, not only because of technical challenges, but is also shrouded by social, legal and geopolitical issues. In this chapter, we discuss two key challenges - networking and management in federating Edge deployments. Additionally, we consider resource and modeling challenges that will need to be addressed for a federated Edge.Comment: Book Chapter accepted to the Fog and Edge Computing: Principles and Paradigms; Editors Buyya, Sriram

    Collective intelligence in self-organized industrial cyber-physical systems

    Get PDF
    Cyber-physical systems (CPS) play an important role in the implementation of new Industry 4.0 solutions, acting as the backbone infrastructure to host distributed intelligence capabilities and promote the collective intelligence that emerges from the interactions among individuals. This collective intelligence concept provides an alternative way to design complex systems with several benefits, such as modularity, flexibility, robustness, and reconfigurability to condition changes, but it also presents several challenges to be managed (e.g., non-linearity, self-organization, and myopia). With this in mind, this paper discusses the factors that characterize collective intelligence, particularly that associated with industrial CPS, analyzing the enabling concepts, technologies, and application sectors, and providing an illustrative example of its application in an automotive assembly line. The main contribution of the paper focuses on a comprehensive review and analysis of the main aspects, challenges, and research opportunities to be considered for implementing collective intelligence in industrial CPS. The identified challenges are clustered according to five different categories, namely decentralization, emergency, intelligent machines and products, infrastructures and methods, and human integration and ethics. Although the research indicates some potential benefits of using collective intelligence to achieve the desired levels of autonomy and dynamic adaptation of industrial CPS, such approaches are still in the early stages, with perspectives to increase in the coming years. Based on that, they need to be further developed considering some main aspects, for example, related to balancing the distribution of intelligence by the vertical and horizontal dimensions and controlling the nervousness in self-organized systems.info:eu-repo/semantics/publishedVersio

    Trust-empowered, IoT-driven legitimate data offloading

    Get PDF
    In an IoT environment deployed on top of fog and/or cloud nodes, offloading data between nodes is a common practice that aims at lessening the burden on these nodes and hence, meeting some real-time processing requirements. Existing initiatives put emphasis on “when to offload” and “where to offload” using criteria like resource constraint, load balancing, and data safety during transfer. However, there is limited emphasis on the trustworthiness of those nodes that will accept the offloaded data putting these data at risk of misuse. To address this limited emphasis, this paper advocates for trust as a decision criterion for identifying the appropriate nodes for hosting the offloaded data. A trust model is designed and then, developed considering factors like legitimacy, quality-of-service, and quality-of-experience. A system demonstrating the technical doability of the trust model is presented in the paper, as well

    A Fog Computing Approach for Cognitive, Reliable and Trusted Distributed Systems

    Get PDF
    In the Internet of Things era, a big volume of data is generated/gathered every second from billions of connected devices. The current network paradigm, which relies on centralised data centres (a.k.a. Cloud computing), becomes an impractical solution for IoT data storing and processing due to the long distance between the data source (e.g., sensors) and designated data centres. It worth noting that the long distance in this context refers to the physical path and time interval of when data is generated and when it get processed. To explain more, by the time the data reaches a far data centre, the importance of the data can be depreciated. Therefore, the network topologies have evolved to permit data processing and storage at the edge of the network, introducing what so-called fog Computing. The later will obviously lead to improvements in quality of service via processing and responding quickly and efficiently to varieties of data processing requests. Although fog computing is recognized as a promising computing paradigm, it suffers from challenging issues that involve: i) concrete adoption and management of fogs for decentralized data processing. ii) resources allocation in both cloud and fog layers. iii) having a sustainable performance since fog have a limited capacity in comparison with cloud. iv) having a secure and trusted networking environment for fogs to share resources and exchange data securely and efficiently. Hence, the thesis focus is on having a stable performance for fog nodes by enhancing resources management and allocation, along with safety procedures, to aid the IoT-services delivery and cloud computing in the ever growing industry of smart things. The main aspects related to the performance stability of fog computing involves the development of cognitive fog nodes that aim at provide fast and reliable services, efficient resources managements, and trusted networking, and hence ensure the best Quality of Experience, Quality of Service and Quality of Protection to end-users. Therefore the contribution of this thesis in brief is a novel Fog Resource manAgeMEnt Scheme (FRAMES) which has been proposed to crystallise fog distribution and resource management with an appropriate service's loads distribution and allocation based on the Fog-2-Fog coordination. Also, a novel COMputIng Trust manageMENT (COMITMENT) which is a software-based approach that is responsible for providing a secure and trusted environment for fog nodes to share their resources and exchange data packets. Both FRAMES and COMITMENT are encapsulated in the proposed Cognitive Fog (CF) computing which aims at making fog able to not only act on the data but also interpret the gathered data in a way that mimics the process of cognition in the human mind. Hence, FRAMES provide CF with elastic resource managements for load balancing and resolving congestion, while the COMITMENT employ trust and recommendations models to avoid malicious fog nodes in the Fog-2-Fog coordination environment. The proposed algorithms for FRAMES and COMITMENT have outperformed the competitive benchmark algorithms, namely Random Walks Offloading (RWO) and Nearest Fog Offloading (NFO) in the experiments to verify the validity and performance. The experiments were conducted on the performance (in terms of latency), load balancing among fog nodes and fogs trustworthiness along with detecting malicious events and attacks in the Fog-2-Fog environment. The performance of the proposed FRAMES's offloading algorithms has the lowest run-time (i.e., latency) against the benchmark algorithms (RWO and NFO) for processing equal-number of packets. Also, COMITMENT's algorithms were able to detect the collaboration requests whether they are secure, malicious or anonymous. The proposed work shows potential in achieving a sustainable fog networking paradigm and highlights significant benefits of fog computing in the computing ecosystem
    • …
    corecore