Reliablity and Security for Fog Computing Systems
Abstract
:1. Introduction
2. State of the Problem
3. Fog Computing and Applications
- IoT: FC has a critical role in IoT deployment [6]. With the proliferation of connected devices generating massive amounts of data, FC brings local processing and analytics to the edge, reducing latency and enabling real-time decision making. This facilitates the efficient filtering and aggregation of data, optimizing the use of network bandwidth and reducing the load on cloud servers.
- Smart cities (SCs): FC plays an important role in the implementation of SC initiatives [7]. When fog nodes (FNs) are deployed throughout the city infrastructure, data from various sources, such as sensors, cameras, and connected devices, can be processed locally. This enables real-time monitoring, analysis, and decision making for applications such as traffic management, waste management, and public security.
- Automation: In industrial environments, FC enables real-time processing and analysis of data for mission-critical applications [8,9]. Edge devices and gateways collect and process data from industrial sensors and equipment, providing local control and monitoring. This reduces latency, provides faster response times, and improves efficiency in industries such as manufacturing, energy, and logistics.
- Healthcare: FC plays a vital role in healthcare systems by facilitating real-time monitoring, analysis, and decision making. Edge devices and gateways can collect and process patient data, enabling timely medical intervention, remote patient monitoring, and personalized healthcare services [10,11,12]. FC also addresses privacy issues by storing sensitive data locally, ensuring compliance with health regulations.
- Agriculture: In the agricultural sector, FC promotes precision farming and smart farming. Border devices and sensors collect data on soil, weather, and crop conditions to enable local decisions for irrigation, fertilization, and pest control. FC enables real-time analysis and monitoring to optimize resource usage and increase yields [13,14].
4. Method
4.1. Reliability of FC
- Ensuring low latency and response times of the computing nodes;
- Scalability and resource management of a pool of computing nodes;
- Fault tolerance for each individual computing node, as well as general fault tolerance, which can be ensured, among other things, by redundancy of the processed data.
4.2. Security of FC
- Advanced persistent threats (APTs) are cyberattacks that aim to compromise a company’s infrastructure in order to steal data and intellectual property.
- Access control issues (ACIs) can lead to poor management, and any unauthorized user will be able to obtain data and permissions to install software and change configurations.
- Account hijacking (AH) is when an attack is aimed at hijacking user accounts for malicious purposes. Phishing is a potential method of account hijacking.
- Denial of service (DoS) is when legitimate users are not allowed to use the system (data and applications) due to excessive use of limited system resources.
- A data leak (DB) is when an attacker divulges or steals important, protected, or confidential data.
- Data loss (DL) is the accidental (or malicious) deletion of data from the system. This does not necessarily have to be the result of a cyberattack and may result from a natural disaster.
- Insecure APIs (IAs): Many cloud service providers provide application programming interfaces (APIs) for use by customers. The security of these APIs is crucial to the security of any implemented applications.
- System and application vulnerabilities (SAVs) are vulnerabilities that can be exploited as a result of configuration errors in the ad software, which an attacker can use to infiltrate and compromise the system.
- A malicious insider (MI) is a user who has gained authorized access to the network and system, but intentionally decides to act maliciously.
- Insufficient due diligence (IDD) often occurs when an organization is in a hurry to adopt, design, and implement a system.
- Abuse and unfair use (ANU) often occurs when resources are provided free of charge, and attackers use these resources to carry out malicious activities.
- Problems with shared technologies (STIs) arise from sharing infrastructures, platforms, or applications. For example, the underlying hardware components may not have been designed to provide high-insulation properties.
5. Requirements
5.1. Low Delay and Response
- Edge caching: By caching frequently accessed data and content on edge devices or an FN closest to the end users, latency can be significantly reduced [35]. This allows for faster data and content retrieval as you do not have to traverse the entire network to get to the cloud or remote servers [36]. Edge caching improves the response times for applications such as video streaming, content delivery, and IoT data retrieval.
- Edge analytics: Real-time analytics and decision making at the edge delivers immediate responses without the need to transfer data to a remote server [37]. By deploying simplified analytics and machine learning models directly to the edge, you can instantly obtain insights and actions. Edge analytics is especially useful for time-critical applications, such as industrial automation, smart cities, and healthcare monitoring.
- Mobile edge computing (MEC): MEC brings the power of fog computing to a mobile network infrastructure, delivering low-latency services to mobile devices [38]. By deploying edge computing resources at cell base stations or access points, MEC shortens the distance between mobile devices and computing resources [39,40]. This proximity facilitates real-time applications, such as augmented reality (AR) and virtual reality (VR), where responsiveness is critical. This is useful, for example, in various rehabilitation centers [11,41].
5.2. Scalability and Resource Management
- Load balancing: Load-balancing methods evenly distribute computing tasks and network traffic among multiple fog nodes to avoid overloading certain nodes and ensure the optimal use of resources [42]. Load-balancing algorithms consider factors such as the processing capability, network conditions, and node availability to intelligently distribute workloads. This approach avoids bottlenecks, reduces the response time, and improves the system scalability. There are many types of load balancing based on different technologies [43,44,45,46,47,48,49,50,51,52].
- Edge federation: Edge federation enables collaboration and resource sharing between multiple fog nodes or edge networks [53]. By forming federated networks, fog computing environments can leverage pooled resources and provide seamless scalability across multiple administrative domains. Federation platforms establish communication protocols, trust mechanisms, and resource sharing agreements to enable dynamic resource allocation and load balancing between federated fog nodes [54].
- Virtualization and containerization: Virtualization technologies, such as hypervisors and VMs, abstract and isolate computing resources, improving the scalability and resource management [55]. Fog nodes can run multiple virtual machines, each with its own sandboxed environment, making efficient use of hardware resources. Containerization using technologies such as Docker [56] provides lightweight and portable environments for applications, enabling efficient deployment, scalability, and resource isolation in fog computing.
- Edge resource discovery and orchestration: Fog computing systems can implement resource discovery mechanisms to determine the available resources in the fog infrastructure [57]. These mechanisms facilitate dynamic resource provisioning by allowing fog nodes to efficiently discover and use nearby resources. Orchestration environments coordinate resource provisioning and management, ensuring that workloads are distributed to the appropriate fog nodes based on availability, capability, and proximity [58,59]. There are several effective solutions for orchestration. One of the most interesting is OASIS TOSCA [60], which allows you to effectively manage different containers in distributed systems based on templates, which allows you to combine different approaches. For example, the use of various methods of load balancing.
5.3. Fault Tolerance and Redundancy
5.4. Data Privacy
6. Discussion and Future Directions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AG | Augmented reality |
DCS | Distributed computing system |
CC | Cloud computing |
FC | Fog computing |
FHE | Fully homomorphic encryption |
FN | Fog node |
FS | Fog system |
IaaS | Infrastructure as a service |
IoT | Internet of things |
MEC | Mobile edge computing |
PaaS | Platform as a service |
RNS | Residue number system |
SaaS | Software as a service |
SC | Smart city |
SSS | Secret sharing system |
VR | Virtual reality |
References
- Singh, K.; Alam, M.; Kumar, S. A Survey of Static Scheduling Algorithm for Distributed Computing System. Int. J. Comput. Appl. 2015, 129, 25–30. [Google Scholar] [CrossRef]
- Kratzke, N. A Brief History of Cloud Application Architectures. Appl. Sci. 2018, 8, 1368. [Google Scholar] [CrossRef]
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing. National Institute of Standards and Technology. 2011. Available online: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-145.pdf (accessed on 22 April 2024).
- Klonoff, D.C. Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things. J. Diabetes Sci. Technol. 2017, 11, 647–652. [Google Scholar] [CrossRef]
- Abouaomar, A.; Cherkaoui, S.; Kobbane, A.; Dambri, O.A. A Resources Representation for Resource Allocation in Fog Computing Networks. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Sarkar, S.; Chatterjee, S.; Misra, S. Assessment of the Suitability of Fog Computing in the Context of Internet of Things. IEEE Trans. Cloud Comput. 2015, 6, 46–59. [Google Scholar] [CrossRef]
- Perera, C.; Qin, Y.; Estrella, J.C.; Reiff-Marganiec, S.; Vasilakos, A.V. Fog Computing for Sustainable Smart Cities: A Survey. ACM Comput. Surv. 2017, 50, 32:1–32:43. [Google Scholar] [CrossRef]
- Pop, P.; Raagaard, M.A.L.; Gutierrez, M.; Steiner, W. Enabling Fog Computing for Industrial Automation Through Time-Sensitive Networking (TSN). IEEE Commun. Stand. Mag. 2018, 2, 55–61. [Google Scholar] [CrossRef]
- Rani, S.; Kataria, A.; Chauhan, M. Fog Computing in Industry 4.0: Applications and Challenges—A Research Roadmap. In Energy Conservation Solutions for Fog-Edge Computing Paradigms; Tiwari, R., Mittal, M., Goyal, L.M., Eds.; Springer: Singapore, 2022; pp. 173–190. ISBN 9789811634482. [Google Scholar]
- Kraemer, F.A.; Braten, A.E.; Tamkittikhun, N.; Palma, D. Fog Computing in Healthcare—A Review and Discussion. IEEE Access 2017, 5, 9206–9222. [Google Scholar] [CrossRef]
- Kumari, A.; Tanwar, S.; Tyagi, S.; Kumar, N. Fog Computing for Healthcare 4.0 Environment: Opportunities and Challenges. Comput. Electr. Eng. 2018, 72, 1–13. [Google Scholar] [CrossRef]
- Shi, Y.; Ding, G.; Wang, H.; Roman, H.E.; Lu, S. The Fog Computing Service for Healthcare. In Proceedings of the 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), Beijing, China, 28–30 May 2015; pp. 1–5. [Google Scholar]
- Guardo, E.; Stefano, A.D.; Corte, A.L.; Sapienza, M.; Scatà, M. A Fog Computing-Based IoT Framework for Precision Agriculture. J. Internet Technol. 2018, 19, 1401–1411. [Google Scholar]
- Hsu, T.-C.; Yang, H.; Chung, Y.-C.; Hsu, C.-H. A Creative IoT Agriculture Platform for Cloud Fog Computing. Sustain. Comput. Inform. Syst. 2020, 28, 100285. [Google Scholar] [CrossRef]
- Berger, C.; Eichhammer, P.; Reiser, H.P.; Domaschka, J.; Hauck, F.J.; Habiger, G. A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. ACM Comput. Surv. 2022, 54, 1–39. [Google Scholar] [CrossRef]
- Yi, S.; Li, C.; Li, Q. A Survey of Fog Computing: Concepts, Applications and Issues. In Proceedings of the 2015 Workshop on Mobile Big Data, Hangzhou, China, 21 June 2015; Association for Computing Machinery: New York, NY, USA, 2015; pp. 37–42. [Google Scholar]
- Soomro, Z.A.; Shah, M.H.; Ahmed, J. Information Security Management Needs More Holistic Approach: A Literature Review. Int. J. Inf. Manag. 2016, 36, 215–225. [Google Scholar] [CrossRef]
- Songhorabadi, M.; Rahimi, M.; MoghadamFarid, A.; Kashani, M.H. Fog Computing Approaches in IoT-Enabled Smart Cities. J. Netw. Comput. Appl. 2023, 211, 103557. [Google Scholar] [CrossRef]
- Sabireen, H.; Neelanarayanan, V. A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 2021, 7, 162–176. [Google Scholar]
- Peter, N. Fog computing and its real time applications. Int. J. Emerg. Technol. Adv. Eng. 2015, 5, 266–269. [Google Scholar]
- Zhang, C. Design and Application of Fog Computing and Internet of Things Service Platform for Smart City. Future Gener. Comput. Syst. 2020, 112, 630–640. [Google Scholar] [CrossRef]
- Yi, S.; Hao, Z.; Qin, Z.; Li, Q. Fog Computing: Platform and Applications. In Proceedings of the 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb), Washington, DC, USA, 12–13 November 2015; pp. 73–78. [Google Scholar]
- Madsen, H.; Burtschy, B.; Albeanu, G.; Popentiu-Vladicescu, F.L. Reliability in the Utility Computing Era: Towards Reliable Fog Computing. In Proceedings of the 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP), Bucharest, Romania, 7–9 July 2013; pp. 43–46. [Google Scholar]
- Popentiu-Vladicescu, F.; Albeanu, G. Software Reliability in the Fog Computing. In Proceedings of the 2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), Karachi, Pakistan, 5–7 April 2017; pp. 1–4. [Google Scholar]
- Zhang, P.; Chen, Y.; Zhou, M.; Xu, G.; Huang, W.; Al-Turki, Y.; Abusorrah, A. A Fault-Tolerant Model for Performance Optimization of a Fog Computing System. IEEE Internet Things J. 2022, 9, 1725–1736. [Google Scholar] [CrossRef]
- Hou, X.; Ren, Z.; Wang, J.; Zheng, S.; Cheng, W.; Zhang, H. Distributed Fog Computing for Latency and Reliability Guaranteed Swarm of Drones. IEEE Access 2020, 8, 7117–7130. [Google Scholar] [CrossRef]
- Melnik, E.V.; Klimenko, A.B. A Condition of Reliability Improvement of the System Based on the Fog-Computing Concept. J. Phys. Conf. Ser. 2020, 1661, 012007. [Google Scholar] [CrossRef]
- Klimenko, A.B.; Melnik, E.V. An Experimental Study of the Fog-Computing-Based Systems Reliability. In Artificial Intelligence and Bioinspired Computational Methods; Silhavy, R., Ed.; Springer International Publishing: Cham, Switzerland, 2020; pp. 438–449. [Google Scholar]
- Khan, S.; Parkinson, S.; Qin, Y. Fog Computing Security: A Review of Current Applications and Security Solutions. J. Cloud Comp. 2017, 6, 19. [Google Scholar] [CrossRef]
- Stojmenovic, I.; Wen, S.; Huang, X.; Luan, H. An Overview of Fog Computing and Its Security Issues. Concurr. Comput. Pract. Exper. 2016, 28, 2991–3005. [Google Scholar] [CrossRef]
- Stojmenovic, I.; Wen, S. The Fog Computing Paradigm: Scenarios and Security Issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
- Yi, S.; Qin, Z.; Li, Q. Security and Privacy Issues of Fog Computing: A Survey. In Wireless Algorithms, Systems, and Applications; Xu, K., Zhu, H., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 685–695. [Google Scholar]
- Zhang, P.; Zhou, M.; Fortino, G. Security and Trust Issues in Fog Computing: A Survey. Future Gener. Comput. Syst. 2018, 88, 16–27. [Google Scholar] [CrossRef]
- Thota, C.; Sundarasekar, R.; Manogaran, G.; Varatharajan, R.; Priyan, M.K. Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System. In Fog Computing: Breakthroughs in Research and Practice; IGI Global: Pennsylvania, PA, USA, 2018; pp. 365–378. ISBN 978-1-5225-5649-7. [Google Scholar]
- Zahmatkesh, H.; Al-Turjman, F. Fog Computing for Sustainable Smart Cities in the IoT Era: Caching Techniques and Enabling Technologies—An Overview. Sustain. Cities Soc. 2020, 59, 102139. [Google Scholar] [CrossRef]
- Li, Q.; Zhang, Y.; Li, Y.; Xiao, Y.; Ge, X. Capacity-Aware Edge Caching in Fog Computing Networks. IEEE Trans. Veh. Technol. 2020, 69, 9244–9248. [Google Scholar] [CrossRef]
- Anawar, M.R.; Wang, S.; Azam Zia, M.; Jadoon, A.K.; Akram, U.; Raza, S. Fog Computing: An Overview of Big IoT Data Analytics. Wirel. Commun. Mob. Comput. 2018, 2018, 7157192. [Google Scholar] [CrossRef]
- Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A Survey on Mobile Edge Computing: The Communication Perspective. IEEE Commun. Surv. Tutorials 2017, 19, 2322–2358. [Google Scholar] [CrossRef]
- Ren, J.; Zhang, D.; He, S.; Zhang, Y.; Li, T. A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet. ACM Comput. Surv. 2019, 52, 125:1–125:36. [Google Scholar] [CrossRef]
- Dolui, K.; Datta, S.K. Comparison of Edge Computing Implementations: Fog Computing, Cloudlet and Mobile Edge Computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar]
- Paul, A.; Pinjari, H.; Hong, W.-H.; Seo, H.C.; Rho, S. Fog Computing-Based IoT for Health Monitoring System. J. Sens. 2018, 2018, e1386470. [Google Scholar] [CrossRef]
- Jafarnejad Ghomi, E.; Masoud Rahmani, A.; Nasih Qader, N. Load-Balancing Algorithms in Cloud Computing: A Survey. J. Netw. Comput. Appl. 2017, 88, 50–71. [Google Scholar] [CrossRef]
- Aote, S.S.; Kharat, M.U. A Game-Theoretic Model for Dynamic Load Balancing in Distributed Systems. In Proceedings of the International Conference on Advances in Computing, Communication and Control, Bangalore, India, 28–29 December 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 235–238. [Google Scholar]
- Baihaqi, M.R.; Negara, R.M.; Tulloh, R. Analysis of Load Balancing Performance Using Round Robin and IP Hash Algorithm on P4. In Proceedings of the 2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 8 December 2022; pp. 93–98. [Google Scholar]
- Mishra, S.K.; Sahoo, B.; Parida, P.P. Load Balancing in Cloud Computing: A Big Picture. J. King Saud Univ. Comput. Inf. Sci. 2020, 32, 149–158. [Google Scholar] [CrossRef]
- Kumar, P.; Kumar, R. Issues and Challenges of Load Balancing Techniques in Cloud Computing: A Survey. ACM Comput. Surv. 2019, 51, 120:1–120:35. [Google Scholar] [CrossRef]
- Jader, O.; Zeebaree, S.; Zebari, R. A State Of Art Survey For Web Server Performance Measurement And Load Balancing Mechanisms. Int. J. Sci. Technol. Res. 2019, 8, 535–543. [Google Scholar]
- Chandak, A.; Ray, N.K. A Review of Load Balancing in Fog Computing. In Proceedings of the 2019 International Conference on Information Technology (ICIT), Shanghai, China, 20–23 December 2019; pp. 460–465. [Google Scholar]
- Devaraj, A.F.S.; Elhoseny, M.; Dhanasekaran, S.; Lydia, E.L.; Shankar, K. Hybridization of Firefly and Improved Multi-Objective Particle Swarm Optimization Algorithm for Energy Efficient Load Balancing in Cloud Computing Environments. J. Parallel Distrib. Comput. 2020, 142, 36–45. [Google Scholar] [CrossRef]
- Devi, D.C.; Uthariaraj, V.R. Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks. Sci. World J. 2016, 2016, e3896065. [Google Scholar] [CrossRef]
- Wan, J.; Chen, B.; Wang, S.; Xia, M.; Li, D.; Liu, C. Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory. IEEE Trans. Ind. Inform. 2018, 14, 4548–4556. [Google Scholar] [CrossRef]
- Ningning, S.; Chao, G.; Xingshuo, A.; Qiang, Z. Fog Computing Dynamic Load Balancing Mechanism Based on Graph Repartitioning. China Commun. 2016, 13, 156–164. [Google Scholar] [CrossRef]
- Savi, M.; Santoro, D.; Di Meo, K.; Pizzolli, D.; Pincheira, M.; Giaffreda, R.; Cretti, S.; Kum, S.; Siracusa, D. A Blockchain-Based Brokerage Platform for Fog Computing Resource Federation. In Proceedings of the 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France, 24–27 February 2020; pp. 147–149. [Google Scholar]
- Veillon, V.; Denninnart, C.; Salehi, M.A. F-FDN: Federation of Fog Computing Systems for Low Latency Video Streaming. In Proceedings of the 2019 IEEE 3rd International Conference on Fog and Edge Computing (ICFEC), Larnaca, Cyprus, 14–17 May 2019; pp. 1–9. [Google Scholar]
- Sri Raghavendra, M.; Chawla, P. A Review on Container-Based Lightweight Virtualization for Fog Computing. In Proceedings of the 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 29–31 August 2018; pp. 378–384. [Google Scholar]
- Bellavista, P.; Zanni, A. Feasibility of Fog Computing Deployment Based on Docker Containerization over RaspberryPi. In Proceedings of the 18th International Conference on Distributed Computing and Networking, Hyderabad, India, 5–7 January 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–10. [Google Scholar]
- Hoque, S.; De Brito, M.S.; Willner, A.; Keil, O.; Magedanz, T. Towards Container Orchestration in Fog Computing Infrastructures. In Proceedings of the 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, 4–8 July 2017; Volume 2, pp. 294–299. [Google Scholar]
- Santoro, D.; Zozin, D.; Pizzolli, D.; De Pellegrini, F.; Cretti, S. Foggy: A Platform for Workload Orchestration in a Fog Computing Environment. In Proceedings of the 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong, 11–14 December 2017; pp. 231–234. [Google Scholar]
- Jiang, Y.; Huang, Z.; Tsang, D.H.K. Challenges and Solutions in Fog Computing Orchestration. IEEE Netw. 2018, 32, 122–129. [Google Scholar] [CrossRef]
- OASIS Topology and Orchestration Specification for Cloud Applications (TOSCA) TC. Topology and Orchestration Specification for Cloud Applications Version 1.0. 2013. Available online: http://docs.oasis-open.org/tosca/TOSCA/v1.0/TOSCA-v1.0.html (accessed on 22 April 2024).
- Valueva, M.V.; Nagornov, N.N.; Lyakhov, P.A.; Valuev, G.V.; Chervyakov, N.I. Application of the Residue Number System to Reduce Hardware Costs of the Convolutional Neural Network Implementation. Math. Comput. Simul. 2020, 177, 232–243. [Google Scholar] [CrossRef]
- Babenko, M.; Tchernykh, A.; Pulido-Gaytan, B.; Cortés-Mendoza, J.M.; Shiryaev, E.; Golimblevskaia, E.; Avetisyan, A.; Nesmachnow, S. RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage. In Proceedings of the 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, OR, USA, 17–21 June 2021; pp. 548–553. [Google Scholar]
- Tay, T.F.; Chang, C.-H. A New Algorithm for Single Residue Digit Error Correction in Redundant Residue Number System. In Proceedings of the 2014 IEEE International Symposium on Circuits and Systems (ISCAS), Melbourne, Australia, 1–5 June 2014; pp. 1748–1751. [Google Scholar] [CrossRef]
- Ananda Mohan, P.V. Error Detection, Correction and Fault Tolerance in RNS-Based Designs. In Residue Number Systems: Theory and Applications; Mohan, P.V.A., Ed.; Springer International Publishing: Cham, Switzerland, 2016; pp. 163–175. ISBN 978-3-319-41385-3. [Google Scholar]
- Chang, C.-H.; Molahosseini, A.S.; Zarandi, A.A.E.; Tay, T.F. Residue Number Systems: A New Paradigm to Datapath Optimization for Low-Power and High-Performance Digital Signal Processing Applications. IEEE Circ. Syst. Mag. 2015, 15, 26–44. [Google Scholar] [CrossRef]
- Gentry, C. A Fully Homomorphic Encryption Scheme. Ph.D. Thesis, Stanford University, Stanford, CA, USA, 2009. [Google Scholar]
- Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic Encryption for Arithmetic of Approximate Numbers. In Advances in Cryptology—ASIACRYPT 2017; Takagi, T., Peyrin, T., Eds.; Springer International Publishing: Cham, Switzerland, 2017; pp. 409–437. [Google Scholar]
- Cheon, J.H.; Kim, D.; Kim, Y.; Song, Y. Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 2018, 6, 46938–46948. [Google Scholar] [CrossRef]
- Cheon, J.H.; Kim, D.; Kim, D. Efficient Homomorphic Comparison Methods with Optimal Complexity. In Advances in Cryptology—ASIACRYPT 2020; Moriai, S., Wang, H., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 221–256. [Google Scholar]
- Kim, S.; Lee, K.; Cho, W.; Cheon, J.H.; Rutenbar, R.A. FPGA-Based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption. In Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico, 9–11 December 2019; pp. 1–8. [Google Scholar]
- Al Badawi, A.; Polyakov, Y.; Aung, K.M.M.; Veeravalli, B.; Rohloff, K. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Trans. Emerg. Top. Comput. 2021, 9, 941–956. [Google Scholar] [CrossRef]
- Gomathisankaran, M.; Tyagi, A.; Namuduri, K. HORNS: A Homomorphic Encryption Scheme for Cloud Computing Using Residue Number System. In Proceedings of the 2011 45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 23–25 March 2011; pp. 1–5. [Google Scholar]
- Lee, J.-W.; Lee, E.; Lee, Y.; Kim, Y.-S.; No, J.-S. High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function. In Advances in Cryptology—EUROCRYPT 2021; Canteaut, A., Standaert, F.-X., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 618–647. [Google Scholar]
- Goyal, V.; Kumar, A. Non-Malleable Secret Sharing. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, Los Angeles, CA, USA, 25–29 June 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 685–698. [Google Scholar]
- Applebaum, B.; Beimel, A.; Farràs, O.; Nir, O.; Peter, N. Secret-Sharing Schemes for General and Uniform Access Structures. In Advances in Cryptology—EUROCRYPT 2019; Ishai, Y., Rijmen, V., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 441–471. [Google Scholar]
- Gladkov, A.; Gladkova, N.; Kucherov, N. Analytical Review of Methods for Detection, Localization and Error Correction in the Residue Number System. In Mathematics and its Applications in New Computer Systems; Tchernykh, A., Alikhanov, A., Babenko, M., Samoylenko, I., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 507–514. [Google Scholar]
- Gladkov, A.; Shiriaev, E.; Tchernykh, A.; Deryabin, M.; Bezuglova, E.; Valuev, G.; Babenko, M. SNS-Based Secret Sharing Scheme for Security of Smart City Communication Systems. In Smart Cities; Nesmachnow, S., Hernández Callejo, L., Eds.; Springer Nature Switzerland: Cham, Switzerland, 2023; pp. 248–263. [Google Scholar]
- Boyle, E.; Gilboa, N.; Ishai, Y. Function Secret Sharing: Improvements and Extensions. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 1292–1303. [Google Scholar]
- Bachiega, J.; Costa, B.; Carvalho, L.R.; Rosa, M.J.F.; Araujo, A. Computational Resource Allocation in Fog Computing: A Comprehensive Survey. ACM Comput. Surv. 2023, 55, 1–31. [Google Scholar] [CrossRef]
Database | Fault Tolerance | Reliability of Functioning | Data Privacy | Data Security | Robustness |
---|---|---|---|---|---|
Google Scholar | 16,200 | 16,800 | 12,700 | 14,700 | 14,700 |
Core | 1363 | 828 | 792 | 6014 | 1740 |
Semantic Scholar | 3050 | 86 | 3920 | 4800 | 4490 |
Name | Citations | Downloads | Publisher |
---|---|---|---|
Reliability in the utility computing era: Towards reliable fog computing | 256 | 3535 | IEEE |
Software reliability in the fog computing | 24 | 712 | IEEE |
A fault-tolerant model for performance optimization of a fog computing system | 29 | 711 | IEEE |
Distributed fog computing for latency and reliability guaranteed swarm of drones | 64 | 3080 | IEEE |
A condition of reliability improvement of the system based on the fog-computing concept | 10 | 90 | IOPScience |
An experimental study of the fog-computing-based systems reliability | 7 | 697 | Springer |
Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies—an overview | 169 | 292 | Elsevier |
Capacity-Aware Edge Caching in Fog Computing Networks | 41 | 1055 | IEEE |
Fog Computing: An Overview of Big IoT Data Analytics | 202 | 23,455 | Hindawi |
A Survey on Mobile Edge Computing: The Communication Perspective | 4935 | 63,962 | IEEE |
A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet | 425 | 6027 | ACM |
Comparison of Edge Computing Implementations: Fog Computing, Cloudlet and Mobile Edge Computing | 609 | 12,893 | IEEE |
Fog Computing for Healthcare 4.0 Environment: Opportunities and Challenges | 375 | 477 | Elsevier |
Fog Computing in Healthcare—A Review and Discussion | 360 | 12,473 | IEEE |
Fog computing-based IoT for health monitoring system | 143 | 10,020 | Hindawi |
Load-balancing algorithms in cloud computing: A survey | 291 | 345 | Elsevier |
Game-Theoretic Model for Dynamic Load Balancing in Distributed Systems | 63 | 695 | ACM |
Analysis of Load Balancing Performance Using Round Robin and IP Hash Algorithm on P4 | 4 | 241 | IEEE |
A Review of Load Balancing in Fog Computing | 40 | 808 | IEEE |
Hybridization of Firefly and Improved Multi-Objective Particle Swarm Optimization Algorithm for Energy Efficient Load Balancing in Cloud Computing Environments | 151 | 131 | Elsevier |
Load Balancing in Cloud Computing Environment Using Improved Weighted Round Robin Algorithm for Nonpreemptive Dependent Tasks | 237 | 4767 | Hindawi |
Fog Computing for Energy-Aware Load Balancing and Scheduling in Smart Factory | 330 | 4976 | IEEE |
Fog Computing Dynamic Load Balancing Mechanism Based on Graph Repartitioning | 213 | 2294 | IEEE |
A Blockchain-Based Brokerage Platform for Fog Computing Resource Federation | 19 | 261 | IEEE |
F-FDN: Federation of Fog Computing Systems for Low Latency Video Streaming | 34 | 534 | IEEE |
A Review on Container-Based Lightweight Virtualization for Fog Computing | 13 | 1138 | IEEE |
Feasibility of Fog Computing Deployment Based on Docker Containerization over RaspberryPi | 249 | 2158 | ACM |
Towards Container Orchestration in Fog Computing Infrastructures | 129 | 2812 | IEEE |
Foggy: A Platform for Workload Orchestration in a Fog Computing Environment | 110 | 1607 | IEEE |
Challenges and Solutions in Fog Computing Orchestration | 118 | 2441 | IEEE |
Topology and Orchestration Specification for Cloud Applications Version 1.0 | 27 | - | OASIS |
The Residue Number System | 650 | 1602 | ACM |
RRNS Base Extension Error-Correcting Code for Performance Optimization of Scalable Reliable Distributed Cloud Data Storage | 8 | 135 | IEEE |
Parallel Error Correction Algorithm in RNS VLSI Digital Circuits | 4 | 52 | IEEE |
Correction and Fault Tolerance in RNS-Based Designs. In Residue Number Systems: Theory and Applications | 9 | 979 | Springer |
A Novel Error Detection and Correction Technique for RNS Based FIR Filters | 27 | 251 | IEEE |
Name | Citations | Downloads | Publisher |
---|---|---|---|
Fog Computing Security: A Review of Current Applications and Security Solutions | 440 | 49,000 | Springer |
An Overview of Fog Computing and Its Security Issues | 484 | - | Wiley |
The Fog computing paradigm: Scenarios and security issues | 1369 | 13,222 | IEEE |
Security and privacy issues of fog computing: A survey | 661 | 7687 | Springer |
Security and trust issues in Fog computing: A survey | 305 | 335 | Elsevier |
Centralized fog computing security platform for IoT and cloud in healthcare system | 236 | - | IGI Global |
A Fully Homomorphic Encryption Scheme | 3989 | - | Stanford |
Homomorphic Encryption for Arithmetic of Approximate Numbers | 1809 | 27,000 | Springer |
Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption | 78 | 2909 | IEEE |
Efficient Homomorphic Comparison Methods with Optimal Complexity | 116 | 2914 | Springer |
FPGA-Based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption | 43 | 1791 | IEEE |
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme | 116 | 1445 | IEEE |
A Homomorphic Encryption Scheme for Cloud Computing Using Residue Number System | 93 | 879 | IEEE |
High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function | 76 | 3837 | Springer |
Secret-Sharing Schemes: A Survey | 826 | 3643 | Springer |
How to Share a Secret | 19,438 | 29,420 | ACM |
A Modular Approach to Key Safeguarding | 975 | 1802 | IEEE |
How to Share a Secret | 455 | 1710 | Springer |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shiriaev, E.; Ermakova, T.; Bezuglova, E.; Lapina, M.A.; Babenko, M. Reliablity and Security for Fog Computing Systems. Information 2024, 15, 317. https://doi.org/10.3390/info15060317
Shiriaev E, Ermakova T, Bezuglova E, Lapina MA, Babenko M. Reliablity and Security for Fog Computing Systems. Information. 2024; 15(6):317. https://doi.org/10.3390/info15060317
Chicago/Turabian StyleShiriaev, Egor, Tatiana Ermakova, Ekaterina Bezuglova, Maria A. Lapina, and Mikhail Babenko. 2024. "Reliablity and Security for Fog Computing Systems" Information 15, no. 6: 317. https://doi.org/10.3390/info15060317
APA StyleShiriaev, E., Ermakova, T., Bezuglova, E., Lapina, M. A., & Babenko, M. (2024). Reliablity and Security for Fog Computing Systems. Information, 15(6), 317. https://doi.org/10.3390/info15060317