Abstract
The cyberspace has expanded from traditional internet to ubiquitous cyberspace which interconnects human, machines, things, services, and applications. The computing paradigm is also shifting from centralized computing in the cloud to collaborative computing in the front end, middle layer, and cloud. Therefore, traditional computing paradigms such as cloud computing and edge computing can no longer satisfy the evolving computing needs of big data in ubiquitous cyberspace. This chapter proposes a computing architecture named Fog-cloud Computing for big data in ubiquitous cyberspace. Collaborative computing by multiple knowledge actors in the fog, middle layer, and cloud is realized based on the collaborative computing language and models, thereby providing a solution for big data computing in ubiquitous cyberspace.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gibson, G.A., Schroeder, B.: A large-scale study of failures in high-performance computing systems. IEEE Trans. Dependable Secur. Comput. 7(4), 337–351 (2010)
Song, A., Dong, F., Luo, Z., Jin, J.: Cloud computing: architecture and key technologies. J. Commun. 7, 3–21 (2011)
Zhu, J., Addepalli, S., Bonomi, F., Milito, R.: Fog computing and its role in the Internet of Things. In: Gerla, M., Huang, D. (eds.) Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC@SIGCOMM 2012, Helsinki, Finland, 17 August 2012, pp. 13–16. ACM (2012)
Zhang, Q., Li, Y., Xu, L., Shi, W., Cao, J.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Chen, J., Liu, D., Yang, K.: Agents: present status and trends. J. Softw. 11(3), 315–321 (2011)
Murray, R.M., Olfati-Saber, R., Fax, J.A.: Consensus and cooperation in networked multi-agent systems. Proc. IEEE 95(1), 215–233 (2007)
Cukier, K., Mayer-Schönberger, V.: Big Data: A Revolution That Will Transform How We Live, Work, and Think. Houghton Mifflin Harcourt, Boston (2013)
Grieco, L.A., Coen-Porisini, A., Sicari, S., Rizzardi, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Li, X., Li, A., Wu, X., Fang, B., Jia, Y.: Big search in cyberspace. IEEE Trans. Knowl. Data Eng. 29(9), 1793–1805 (2017)
López, G., Quesada, L., Guerrero, L.A.: Alexa vs. Siri vs. Cortana vs. Google assistant: a comparison of speech-based natural user interfaces. In: Nunes, I. (ed.) AHFE 2017. AISC, vol. 592, pp. 241–250. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60366-7_23
Baker, M.: Real, unreal, and hacked. IEEE Pervasive Comput. 17(1), 104–112 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jia, Y. et al. (2021). The Framework of the MDATA Computing Model. In: Jia, Y., Gu, Z., Li, A. (eds) MDATA: A New Knowledge Representation Model. Lecture Notes in Computer Science(), vol 12647. Springer, Cham. https://doi.org/10.1007/978-3-030-71590-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-71590-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71589-2
Online ISBN: 978-3-030-71590-8
eBook Packages: Computer ScienceComputer Science (R0)