53 research outputs found

    Fog Computing Challenges: A Systematic Review

    Get PDF
    This paper reports on a study of major Australian organisations that are using programs to achieve strategic transformation of their work. While the program management literature has focused on the coordination of the multiple projects and related operational activities within the programs, little is known about how these programs deploy efforts to coordinate activities in response to contextual pressures. This exploratory, multi-case study asserts that a significant effort is needed to coordinate responses to factors external to the program. In addition, this study shows the key internal and external forces that combine in shifting the locus of effort in coordinating and integrating multiple activities and projects in major transformation programs

    A review on orchestration distributed systems for IoT smart services in fog computing

    Get PDF
    This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agend

    Orchestrating Service Migration for Low Power MEC-Enabled IoT Devices

    Full text link
    Multi-Access Edge Computing (MEC) is a key enabling technology for Fifth Generation (5G) mobile networks. MEC facilitates distributed cloud computing capabilities and information technology service environment for applications and services at the edges of mobile networks. This architectural modification serves to reduce congestion, latency, and improve the performance of such edge colocated applications and devices. In this paper, we demonstrate how reactive service migration can be orchestrated for low-power MEC-enabled Internet of Things (IoT) devices. Here, we use open-source Kubernetes as container orchestration system. Our demo is based on traditional client-server system from user equipment (UE) over Long Term Evolution (LTE) to the MEC server. As the use case scenario, we post-process live video received over web real-time communication (WebRTC). Next, we integrate orchestration by Kubernetes with S1 handovers, demonstrating MEC-based software defined network (SDN). Now, edge applications may reactively follow the UE within the radio access network (RAN), expediting low-latency. The collected data is used to analyze the benefits of the low-power MEC-enabled IoT device scheme, in which end-to-end (E2E) latency and power requirements of the UE are improved. We further discuss the challenges of implementing such schemes and future research directions therein

    Some Placement Techniques of Test Components Inspired by Fog Computing Approaches

    Get PDF
    In this work we are interested in placing test components for Internet of Things (IoT) and Smart Cities. Our work is inspired by similar works aiming the placement of application components in Fog computational nodes. First we give an overview about the decision variables to consider. Then, we define several types of constraints that may be included in the placement problem. Moreover, We list a set of possible Objectives Functions to maximize or minimize. Finally, we propose some algorithms and techniques to solve the considered Test Component Placement Problem (TCPP) taken from the literature

    An Integrated Edge and Fog System for Future Communication Networks

    Get PDF
    Put together, the edge and fog form a large diverse pool of computing and networking resources from different owners that can be leveraged towards low latency applications as well as for alleviating high traffic volume in future networks including 5G and beyond. This paper sets out a framework for the integration of edge and fog computing and networking leveraging on ongoing specifications by ETSI MEC ISG and the OpenFog Consortium. It also presents the technological gaps that need to be addressed before such an integrated solution can be developed. These noticeably include challenges relating to the volatility of resources, heterogeneity of underlying technologies, virtualization of devices, and security issues. The framework presented is a Launchpad for a complete solution under development by the 5G-CORAL consortium.This work has been partially funded by the H2020 collaborative Europe/Taiwan research project 5G-CORAL (grant num. 761586

    Data Processing in Cyber-Physical-Social Systems Through Edge Computing

    Get PDF
    © 2013 IEEE. Cloud and Fog computing have established a convenient and widely adopted approach for computation offloading, where raw data generated by edge devices in the Internet of Things (IoT) context is collected and processed remotely. This vertical offloading pattern, however, typically does not take into account increasingly pressing time constraints of the emerging IoT scenarios, in which numerous data sources, including human agents (i.e., Social IoT), continuously generate large amounts of data to be processed in a timely manner. Big data solutions could be applied in this respect, provided that networking issues and limitations related to connectivity of edge devices are properly addressed. Although edge devices are traditionally considered to be resource-constrained, main limitations refer to energy, networking, and memory capacities, whereas their ever-growing processing capabilities are already sufficient to be effectively involved in actual (big data) processing. In this context, the role of human agents is no longer limited to passive data generation, but can also include their voluntary involvement in relatively complex computations. This way, users can share their personal computational resources (i.e., mobile phones) to support collaborative data processing, thereby turning the existing IoT into a global cyber-physical-social system (CPSS). To this extent, this paper proposes a novel IoT/CPSS data processing pattern based on the stream processing technology, aiming to distribute the workload among a cluster of edge devices, involving mobile nodes shared by contributors on a voluntary basis, and paving the way for cluster computing at the edge. Experiments on an intelligent surveillance system deployed on an edge device cluster demonstrate the feasibility of the proposed approach, illustrating how its distributed in-memory data processing architecture can be effective

    Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems

    Get PDF
    In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which is solved by employing random forest regression model. Additionally, as the Fog-CPS systems could be deployed in open and unprotected environments, the CPS devices and fog nodes are vulnerable to numerous attacks namely, collusion, self-promotion, badmouthing, ballot-stuffing, and opportunistic service. The compromised entities can impact the accuracy of trust computation model by increasing/decreasing the trust of other nodes. These challenges are addressed by designing a generic trust credibility model which can countermeasures the compromise of both CPS devices and fog nodes. The credibility of each newly computed trust value is evaluated and subsequently adjusted by correlating it with a standard deviation threshold. The standard deviation is quantified by computing the trust in two configurations of hostile environments and subsequently comparing it with the trust value in a legitimate/normal environment. Our results demonstrate that credibility model successfully countermeasures the malicious behaviour of all Fog-CPS entities i.e. CPS devices and fog nodes. The multi-factor trust assessment and credibility evaluation enable accurate and precise trust computation and guarantee a dependable Fog-CPS system

    A Demo of Application Lifecycle Management for IoT Collaborative Neighborhood in the Fog

    Get PDF
    International audienceRegarding latency, privacy, resiliency and network scarcity management, only distributed approaches such as proposed by Fog Computing architecture can efficiently address the fantastic growth of the Internet of Things (IoT). IoT applications could be deployed and run hierarchically at different levels in an infrastructure ranging from centralized datacenters to the connected things themselves. Consequently, software entities composing IoT applications could be executed in many different configurations. The heterogeneity of the equipment and devices of the target infrastructure opens opportunities in the placement of the software entities, taking into account their requirements in terms of hardware, cyber-physical interactions and software dependencies. Once the most appropriate place has been found, software entities have to be deployed and run. Container-based virtualization has been considered to overpass the complexity of packaging, deploying and running software entities in a heterogeneous distributed infrastructure at the vicinity of the connected devices. This paper reports a practical experiment presented as a live demo that showcases a " Smart Bell in a Collaborative Neighborhood " IoT application in the Fog. Application Lifecycle Management (ALM) has been put in place based on Docker technologies to deploy and run micro-services in the context of Smart Homes operated by Orange

    Secure Cloud-Edge Deployments, with Trust

    Get PDF
    Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology
    • …
    corecore