skip to main content
survey

A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet

Published: 16 October 2019 Publication History

Abstract

Sending data to the cloud for analysis was a prominent trend during the past decades, driving cloud computing as a dominant computing paradigm. However, the dramatically increasing number of devices and data traffic in the Internet-of-Things (IoT) era are posing significant burdens on the capacity-limited Internet and uncontrollable service delay. It becomes difficult to meet the delay-sensitive and context-aware service requirements of IoT applications by using cloud computing alone. Facing these challenges, computing paradigms are shifting from the centralized cloud computing to distributed edge computing. Several new computing paradigms, including Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet, have emerged to leverage the distributed resources at network edge to provide timely and context-aware services. By integrating end devices, edge servers, and cloud, they form a hierarchical IoT architecture, i.e., End-Edge-Cloud orchestrated architecture to improve the performance of IoT systems. This article presents a comprehensive survey of these emerging computing paradigms from the perspective of end-edge-cloud orchestration. Specifically, we first introduce and compare the architectures and characteristics of different computing paradigms. Then, a comprehensive survey is presented to discuss state-of-the-art research in terms of computation offloading, caching, security, and privacy. Finally, some potential research directions are envisioned for fostering continuous research efforts.

References

[1]
Mobile Edge Computing Introductory Technical White Paper. 2014. Retrieved from https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf.
[2]
Mobile-Edge Computing (MEC); Service Scenarios. 2015. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/004/01.01.01_60/gs_MEC-IEG004v010101p.pdf.
[3]
Edge computing prepares for a multi-access future. 2016. Retrieved from http://www.telecomtv.com/articles/mec/edge-computing-prepares-for-a-multi-access-future-13986/.
[4]
Mobile-Edge Computing (MEC); Technical Requirements. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/002/01.01.01_60/gs_MEC002v010101p.pdf.
[5]
Mobile-Edge Computing (MEC); Terminology. 2016. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC/001_099/001/01.01.01_60/gs_MEC001v010101p.pdf.
[6]
APIs for IOT and FOG computing. 2017. Retrieve from https://www.vanrish.com/blog/2017/12/17/apis-for-iot-and-fog-computing/.
[7]
Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021. 2017. Retrieved from https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/mobile-white-paper-c11-520862.html.
[8]
Cloud Adoption Is Growing But Forecasts Differ on How Much. 2017. Retrieved from http://fortune.com/2017/02/22/cloud-growth-forecast-gartner/.
[9]
Mobile Edge Computing; Market Acceleration; MEC Metrics Best Practice and Guidelines. 2017. Retrieved from http://www.etsi.org/deliver/etsi_gs/MEC-IEG/001_099/006/01.01.01_60/gs_MEC-IEG006v010101p.pdf.
[10]
OpenFog Reference Architecture for Fog Computing. 2017. Retrieved from https://www.openfogconsortium.org/wp-content/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL.pdf.
[11]
Hasti Ahlehagh and Sujit Dey. 2014. Video-aware scheduling and caching in the radio access network. IEEE/ACM Trans. Netw. 22, 5 (2014), 1444--1462.
[12]
Arif Ahmed and Ejaz Ahmed. 2016. A survey on mobile edge computing. In Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO’16). 1--8.
[13]
Mohammed Alshiky Aisha, M. Buhari Seyed, and Barnawi Ahmed. 2017. Attribute-based access control (ABAC) for EHR in fog computing environment. Int. J. Cloud Comput.: Serv. Arch. 7, 1 (2017), 9--16.
[14]
Moustafa Ammar, Mohamed Rizk, Ayman Abdel-Hamid, and Ahmed K. Aboul-Seoud. 2016. A framework for security enhancement in SDN-based datacenters. In Proceedings of the IFIP International Conference on New Technologies, Mobility and Security (NTMS’16). IEEE, 1--4.
[15]
Arash Asadi, Qing Wang, and Vincenzo Mancuso. 2014. A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutor. 16, 4 (2014), 1801--1819.
[16]
Bahar Azari, Osvaldo Simeone, Umberto Spagnolini, and Antonia M. Tulino. 2016. Hypergraph-based analysis of clustered co-operative beamforming with application to edge caching. IEEE Wireless Commun. Lett. 5, 1 (2016), 84--87.
[17]
Bo Bai, Li Wang, Zhu Han, Wei Chen, and Tommy Svensson. 2016. Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework. IEEE Wireless Commun. 23, 4 (2016), 74--81.
[18]
Ejder Bastug, Mehdi Bennis, and Mérouane Debbah. 2014. Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Commun. Mag. 52, 8 (2014), 82--89.
[19]
Sultan Basudan, Xiaodong Lin, and Karthik Sankaranarayanan. 2017. A privacy-preserving vehicular crowdsensing based road surface condition monitoring system using fog computing. IEEE IoT J. 4, 3 (2017), 772--782.
[20]
Suzhi Bi and Ying Jun Zhang. 2018. Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading. IEEE Trans. Wireless Commun. 17, 6 (Jun. 2018), 4177--4190.
[21]
Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog Computing: A Platform for Internet of Things and Analytics. Springer International Publishing, Cham, 169--186.
[22]
Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the Internet of Things. In Proceedings of the Workshop on Mobile Cloud Computing (MCC’12). ACM, New York, NY, 13--16.
[23]
Sem Borst, Varun Gupta, and Anwar Walid. 2010. Distributed caching algorithms for content distribution networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’10). IEEE, 1--9.
[24]
Piotr Borylo, Artur Lason, Jacek Rzasa, Andrzej Szymanski, and Andrzej Jajszczyk. 2016. Energy-aware fog and cloud interplay supported by wide area software defined networking. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 1--7.
[25]
A. Bourdena, C. X. Mavromoustakis, G. Mastorakis, J. J. P. C. Rodrigues, and C. Dobre. 2015. Using socio-spatial context in mobile cloud process offloading for energy conservation in wireless devices. IEEE Trans. Cloud Comput. 1 (2015).
[26]
Shiwei Cao, Xiaofeng Tao, Yanzhao Hou, and Qimei Cui. 2015. An energy-optimal offloading algorithm of mobile computing based on HetNets. In Proceedings of the IEEE International Conference on Connected Vehicles and Expo (ICCVE’15). IEEE, 254--258.
[27]
Sami Yangui Roch H. Glitho Monique J. Morrow Carla Mouradian, Diala Naboulsi and Paul A. Polakos. 2018. A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20, 1 (2018), 416--464.
[28]
Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, and Sue Moon. 2009. Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE/ACM Trans. Netw. 17, 5 (2009), 1357--1370.
[29]
Omar Chakroun and Soumaya Cherkaoui. 2016. Resource allocation for delay sensitive applications in mobile cloud computing. In Proceedings of the IEEE Conference on Local Computer Networks (LCN’16). IEEE, 615--618.
[30]
Binqiang Chen, Chenyang Yang, and Gang Wang. 2016. Cooperative device-to-device communications with caching. In Proceedings of the IEEE Vehicular Technology Conference (VTC’16). IEEE, 1--5.
[31]
Binqiang Chen, Chenyang Yang, and Gang Wang. 2017. High throughput opportunistic cooperative device-to-device communications with caching. IEEE Trans. Vehic. Technol. 66, 8 (2017), 7527--7539.
[32]
Di Chen, Stephan Schedler, and Volker Kuehn. 2016. Backhaul traffic balancing and dynamic content-centric clustering for the downlink of fog radio access network. In Proceedings of the IEEE SPAWC. IEEE, 1--5.
[33]
Guangyu Chen, B.-T. Kang, Mahmut Kandemir, Narayanan Vijaykrishnan, Mary Jane Irwin, and Rajarathnam Chandramouli. 2004. Studying energy trade offs in offloading computation/compilation in java-enabled mobile devices. IEEE Trans. Parallel Distrib. Syst. 15, 9 (2004), 795--809.
[34]
Lixing Chen, Sheng Zhou, and Jie Xu. 2018. Computation peer offloading for energy-constrained mobile edge computing in small-cell networks. IEEE/ACM Trans. Netw. 26, 4 (2018), 1619--1632.
[35]
Min Chen, Yixue Hao, Chin-Feng Lai, Di Wu, Yong Li, and Kai Hwang. 2018. Opportunistic task scheduling over co-located clouds in mobile environment. IEEE Trans. Serv. Comput. 11, 3 (2018), 549--561.
[36]
M. Chen, Y. Hao, Y. Li, C. Lai, and D. Wu. 2015. On the computation offloading at ad hoc cloudlet: Architecture and service modes. IEEE Commun. Mag. 53, 6 (Jun. 2015), 18--24.
[37]
Mingzhe Chen, Walid Saad, Changchuan Yin, and Mérouane Debbah. 2017. Echo state networks for proactive caching in cloud-based radio access networks with mobile users. IEEE Trans. Wireless Commun. 16, 6 (2017), 3520--3535.
[38]
Mingkai Chen, Lei Wang, and Jianxin Chen. 2016. Users-media cloud assisted D2D communications for distributed caching underlaying cellular network. Chin. Commun. 13, 8 (2016), 13--23.
[39]
Meng-Hsi Chen, Min Dong, and Ben Liang. 2016. Joint offloading decision and resource allocation for mobile cloud with computing access point. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’16). IEEE, 3516--3520.
[40]
Meng-Hsi Chen, Ben Liang, and Min Dong. 2015. A semidefinite relaxation approach to mobile cloud offloading with computing access point. In Proceedings of the IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC’15). IEEE, 186--190.
[41]
Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. 2016. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans. Netw. 24, 5 (2016), 2795--2808.
[42]
Mung Chiang, Sangtae Ha, I. Chih-Lin, Fulvio Risso, and Tao Zhang. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (2017), 18--20.
[43]
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, and Ashwin Patti. 2011. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the the 6th Conference on Computer Systems. ACM, 301--314.
[44]
Byung-Gon Chun and Petros Maniatis. 2010. Dynamically partitioning applications between weak devices and clouds. In Proceedings of the 1st ACM Workshop on Mobile Cloud Computing 8 Services: Social Networks and Beyond. ACM, 7.
[45]
Hardy Corentin, Le Merrer Erwan, and Sericola Bruno. 2017. Distributed deep learning on edge-devices: Feasibility via adaptive compression. In Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA’17). IEEE, 1--8.
[46]
Eduardo Cuervo, Aruna Balasubramanian, Dae-ki Cho, Alec Wolman, Stefan Saroiu, Ranveer Chandra, and Paramvir Bahl. 2010. MAUI: Making smartphones last longer with code offload. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’10). ACM, 49--62.
[47]
Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112--116.
[48]
Maofei Deng, Hui Tian, and Bo Fan. 2016. Fine-granularity based application offloading policy in cloud-enhanced small cell networks. In Proceedings of the IEEE International Conference on Communications (ICC’16). IEEE, 638--643.
[49]
Haichuan Ding and Yuguang Fang. 2018. Virtual infrastructure at traffic lights: Vehicular temporary storage assisted data transportation at signalized intersections. IEEE Trans. Vehic. Technol. 67, 12 (2018), 12452--12456.
[50]
Haichuan Ding, Yuanxiong Guo, Xuanheng Li, and Yuguang Fang. 2018. Beef up the edge: Spectrum-aware placement of edge computing services for the Internet of Things. IEEE Trans. Mobile Comput. (2018).
[51]
Abebe Abeshu Diro, Naveen Chilamkurti, and Neeraj Kumar. 2017. Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing. Mobile Netw. Appl. 22, 5 (2017), 848--858.
[52]
Clinton Dsouza, Gail-Joon Ahn, and Marthony Taguinod. 2014. Policy-driven security management for fog computing: Preliminary framework and a case study. In Proceedings of the IEEE International Conference on Information Reuse and Information (IRI’14). IEEE, 16--23.
[53]
Sebastián Echeverría, Dan Klinedinst, Keegan Williams, and Grace A. Lewis. 2016. Establishing trusted identities in disconnected edge environments. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC’16). IEEE, 51--63.
[54]
Khalid Elgazzar, Patrick Martin, and Hossam S. Hassanein. 2016. Cloud-assisted computation offloading to support mobile services. IEEE Trans. Cloud Comput. 4, 3 (2016), 279--292.
[55]
Jeffrey Erman, Alexandre Gerber, Mohammad Hajiaghayi, Dan Pei, Subhabrata Sen, and Oliver Spatscheck. 2011. To cache or not to cache: The 3G case. IEEE Internet Comput. 15, 2 (2011), 27--34.
[56]
Ertem Esiner and Anwitaman Datta. 2016. Layered security for storage at the edge: On decentralized multi-factor access control. In Proceedings of the ACM International Conference on Distributed Computing and Networking (ICDCN’16). ACM, 9.
[57]
Jose Oscar Fajardo, Ianire Taboada, and Fidel Liberal. 2015. Radio-aware service-level scheduling to minimize downlink traffic delay through mobile edge computing. In Proceedings of the 7th EAI International Conference on Mobile Networks and Management. Springer, 121--134.
[58]
Yuan Gao, Yaoxue Zhang, and Yuezhi Zhou. 2012. A cache management strategy for transparent computing storage system. In Proceedings of the International Conference on New Trends in Computing Sciences (ICTCS’12). Springer, 651--658.
[59]
Ioana Giurgiu, Oriana Riva, Dejan Juric, Ivan Krivulev, and Gustavo Alonso. 2009. Calling the cloud: Enabling mobile phones as interfaces to cloud applications. In Proceedings of the International Middleware Conference (Middleware’09). Springer-Verlag New York, 5.
[60]
Negin Golrezaei, Parisa Mansourifard, Andreas F Molisch, and Alexandros G Dimakis. 2014. Base-station assisted device-to-device communications for high-throughput wireless video networks. IEEE Trans. Wireless Commun. 13, 7 (2014), 3665--3676.
[61]
Negin Golrezaei, Karthikeyan Shanmugam, Alexandros G. Dimakis, Andreas F. Molisch, and Giuseppe Caire. 2012. Femtocaching: Wireless video content delivery through distributed caching helpers. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 1107--1115.
[62]
Andre S. Gomes, Bruno Sousa, David Palma, Vitor Fonseca, Zhongliang Zhao, Edmundo Monteiro, Torsten Braun, Paulo Simoes, and Luis Cordeiro. 2017. Edge caching with mobility prediction in virtualized LTE mobile networks. Future Gener. Comput. Syst. 70, 5 (2017), 148--162.
[63]
Mohammad Goudarzi, Zeinab Movahedi, and Masoud Nazari. 2016. Mobile cloud computing: A multisite computation offloading. In Proceedings of the IEEE International Conference on Imaging Systems and Techniques (IST’16). IEEE, 660--665.
[64]
Jingxiong Gu, Wei Wang, Aiping Huang, Hangguan Shan, and Zhaoyang Zhang. 2014. Distributed cache replacement for caching-enable base stations in cellular networks. In Proceedings of the IEEE International Conference on Communications (ICC’14). IEEE, 2648--2653.
[65]
Hongzhi Guo and Jiajia Liu. 2018. Collaborative computation offloading for multiaccess edge computing over fiber--wireless networks. IEEE Trans. Vehic. Technol. 67, 5 (May 2018), 4514--4526.
[66]
Kiryong Ha and Mahadev Satyanarayanan. 2015. OpenStack++ for Cloudlet Deployment. Technical Report. http://elijah.cs.cmu.edu/DOCS/CMU-CS-15-113.pdf
[67]
J. He, Y. Zhang, J. Lu, M. Wu, and F. Huang. 2018. Block-stream as a service: A more secure, nimble, and dynamically balanced cloud service model for ambient computing. IEEE Netw. 32, 1 (2018), 126--132.
[68]
Dinh T. Hoang, Chonho Lee, Dusit Niyato, and Ping Wang. 2013. A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Commun. Mobile Comput. 13, 18 (2013), 1587--1611.
[69]
Farhoud Hosseinpour, Payam Vahdani Amoli, Juha Plosila, Timo Hämäläinen, and Hannu Tenhunen. 2016. An intrusion detection system for fog computing and IoT based logistic systems using a smart data approach. Int. J. Dig. Content Technol. Appl. 10, 5 (2016), 34--46.
[70]
Yunchao Hu, Milan Patel, Dario Sabella, Nurit Sprecher, and Valerie Young. 2015. ETSI. White Paper No. 11. Mobile Edge Computing a Key Technology Towards 5G [S].
[71]
Maged Ibrahim. 2016. Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 18, 6 (2016), 1089--1101.
[72]
Andriana Ioannou and Stefan Weber. 2016. A survey of caching policies and forwarding mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 18, 4 (2016), 2847--2886.
[73]
Mingyue Ji, Giuseppe Caire, and Andreas F. Molisch. 2016. Wireless device-to-device caching networks: Basic principles and system performance. IEEE J. Select. Areas Commun. 34, 1 (2016), 176--189.
[74]
Shiwei Jia, Yuan Ai, Zhongyuan Zhao, Mugen Peng, and Chunjing Hu. 2016. Hierarchical content caching in fog radio access networks: Ergodic rate and transmit latency. Chin. Commun. 13, 12 (2016), 1--14.
[75]
Wei Jiang, Gang Feng, and Shuang Qin. 2017. Optimal cooperative content caching and delivery policy for heterogeneous cellular networks. IEEE Trans. Mobile Comput. 16, 5 (2017), 1382--1393.
[76]
Sladana Jos̆ilo and György Dán. 2019. Selfish decentralized computation offloading for mobile cloud computing in dense wireless networks. IEEE Trans. Mobile Comput. 18, 1 (2019), 207--220.
[77]
Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, and Rodrigo Diaz. 2017. Securing combined fog-to-cloud system through SDN approach. In Proceedings of the Workshop on CrossCloud Infrastructures 8 Platforms (CrossCloud’17). ACM, 2.
[78]
Jakub Koneáý, H. Brendan, McMahan, Daniel Ramage, and Peter Richtárik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. arXiv:1610.02527v1 (10 2016).
[79]
Dongyoung Koo, Youngjoo Shin, Joobeom Yun, and Junbeom Hur. 2016. A hybrid deduplication for secure and efficient data outsourcing in fog computing. In Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom’16). IEEE, 285--293.
[80]
Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, and Xinwen Zhang. 2012. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 945--953.
[81]
Wenyuan Kuang, Yaoxue Zhang, Yuezhi Zhou, and Huajie Yang. 2007. RBIS: Security enhancement for MRBP and MRBP2 using integrity check. J. Chin. Comput. Syst. 28, 2 (2007), 251--254.
[82]
D. Van Le and C. Tham. 2018. A deep reinforcement learning based offloading scheme in ad-hoc mobile clouds. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’18). 760--765.
[83]
Hongjia Li and Dan Hu. 2016. Mobility prediction based seamless RAN-cache handover in HetNet. In Proc. IEEE Wireless Communications and Networking Conference (WCNC’16). IEEE, 1--7.
[84]
Xue Lin, Yanzhi Wang, Qing Xie, and Massoud Pedram. 2015. Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Trans. Serv. Comput. 8, 2 (2015), 175--186.
[85]
Ying-Dar Lin, Edward T-H Chu, Yuan-Cheng Lai, and Ting-Jun Huang. 2015. Time-and-energy-aware computation offloading in handheld devices to coprocessors and clouds. IEEE Syst. J. 9, 2 (2015), 393--405.
[86]
Juan Liu, Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Delay-optimal computation task scheduling for mobile-edge computing systems. In Proceedings of the IEEE International Symposium on Information Theory (ISIT’16). IEEE, 1451--1455.
[87]
Jinzhao Liu, Yuezhi Zhou, and Di Zhang. 2016. TranSim: A simulation framework for cache-enabled transparent computing systems. IEEE Trans. Comput. 65, 10 (2016), 3171--3183.
[88]
Liqing Liu, Zheng Chang, and Xijuan Guo. 2018. Socially aware dynamic computation offloading scheme for fog computing system with energy harvesting devices. IEEE IoT J. 5, 3 (Jun. 2018), 1869--1879.
[89]
Yanchen Liu, Myung J Lee, and Yanyan Zheng. 2016. Adaptive multi-resource allocation for cloudlet-based mobile cloud computing system. IEEE Trans. Mobile Comput. 15, 10 (2016), 2398--2410.
[90]
Garcia Pedro Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. SIGCOMM Comput. Commun. Rev. 45, 5 (2015), 37--42.
[91]
Rongxing Lu, Kevin Heung, Arash Habibi Lashkari, and Ali A. Ghorbani. 2017. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5 (2017), 3302--3312.
[92]
Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, and Xuemin Shen. 2012. Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23, 9 (2012), 1621--1631.
[93]
Pavel Mach and Zdenek Becvar. 2016. Cloud-aware power control for real-time application offloading in mobile edge computing. Trans. Emerg. Telecommun. Technol. 27, 5 (2016), 648--661.
[94]
S. Eman Mahmoodi, R. N. Uma, and K. P Subbalakshmi. 2019. Optimal joint scheduling and cloud offloading for mobile applications. IEEE Trans. Cloud Comput. 7, 2 (2019), 301--313.
[95]
Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. Mobile edge computing: Survey and research outlook. arXiv preprint arXiv:1701.01090 (2017).
[96]
Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2322--2358.
[97]
Yuyi Mao, Jun Zhang, and Khaled B. Letaief. 2016. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3590--3605.
[98]
Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2016. Power-delay tradeoff in multi-user mobile-edge computing systems. arXiv preprint arXiv:1609.06027 (2016).
[99]
Yuyi Mao, Jun Zhang, S. H. Song, and Khaled B. Letaief. 2017. Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans. Wireless Commun. 16, 9 (2017), 5994--6009.
[100]
Muhammad Baqer Mollah, Md Abul Kalam Azad, and Athanasios Vasilakos. 2017. Secure data sharing and searching at the edge of cloud-assisted Internet of Things. IEEE Cloud Comput. 4, 1 (2017), 34--42.
[101]
Ei Ei Mon and Thinn Thu Naing. 2011. The privacy-aware access control system using attribute-and role-based access control in private cloud. In Proceedings of the IEEE International Conference on Broadband Network 8 Multimedia Technology (IC-BNMT’11). IEEE, 447--451.
[102]
Diego Montero, Marcelo Yannuzzi, Adrian Shaw, Ludovic Jacquin, Antonio Pastor, Rene Serral-Gracia, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, et al. 2015. Virtualized security at the network edge: A user-centric approach. IEEE Commun. Mag. 53, 4 (2015), 176--186.
[103]
R. Morabito, I. Farris, A. Iera, and T. Taleb. 2017. Evaluating performance of containerized IoT services for clustered devices at the network edge. IEEE IoT J. 4, 4 (2017), 1019--1030.
[104]
Chiang Mung, Ha Sangtae, I Chih-lin, Risso Fulvio, and Zhang Tao. 2017. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 55, 4 (Apr. 2017), 18--20.
[105]
Olga Muñoz, Antonio Pascual Iserte, Josep Vidal, and Marc Molina. 2014. Energy-latency trade-off for multiuser wireless computation offloading. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshop (WCNCW’14). IEEE, 29--33.
[106]
Jianbing Ni, Xiaodong Lin, Kuan Zhang, and Yong Yu. 2016. Secure and deduplicated spatial crowdsourcing: A fog-based approach. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). 1--6.
[107]
Ruifang Niu, Wenfang Song, and Yong Liu. 2013. An energy-efficient multisite offloading algorithm for mobile devices. Int. J. Distrib. Sens. Netw. 9, 3 (2013), 1--6.
[108]
OECI. 2017. Retrieved from http://openedgecomputing.org/index.html.
[109]
Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access (2017).
[110]
Jesus Pacheco and Salim Hariri. 2016. IoT security framework for smart cyber infrastructures. In Proceedings of the IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W’16). IEEE, 242--247.
[111]
Seok-Hwan Park, Osvaldo Simeone, and Shlomo Shamai. 2016. Joint cloud and edge processing for latency minimization in fog radio access networks. In Proceedings of the IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC’16). IEEE, 1--5.
[112]
Georgios Paschos, Ejder Bastug, Ingmar Land, Giuseppe Caire, and Mérouane Debbah. 2016. Wireless caching: Technical misconceptions and business barriers. IEEE Commun. Mag. 54, 8 (2016), 16--22.
[113]
Mach Pavel and Becvar Zdenek. 2017. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19, 3 (Thirdquarter 2017), 1628--1656.
[114]
Mugen Peng, Shi Yan, Kecheng Zhang, and Chonggang Wang. 2016. Fog-computing-based radio access networks: Issues and challenges. IEEE Netw. 30, 4 (2016), 46--53.
[115]
Xuhong Peng, Ju Ren, Liang She, Deyu Zhang, Jie Li, and Yaoxue Zhang. 2018. BOAT: A block-streaming app execution scheme for lightweight IoT devices. IEEE IoT J. 5, 3 (2018), 1816--1829.
[116]
Konstantinos Poularakis, George Iosifidis, Vasilis Sourlas, and Leandros Tassiulas. 2014. Multicast-aware caching for small cell networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’14). IEEE, 2300--2305.
[117]
Konstantinos Poularakis, George Iosifidis, and Leandros Tassiulas. 2013. Approximation caching and routing algorithms for massive mobile data delivery. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’13). IEEE, 3534--3539.
[118]
Kuacharoen Pramote, J. Mooney Vincent, and K. Madisetti Vijay. 2003. Identity-based authentication scheme for the Internet of Things. In Proceedings of the Conference on Design, Automation and Test in Europe Conference (DATE’03). IEEE, 912--917.
[119]
Lingjun Pu, Xu Chen, Jingdong Xu, and Xiaoming Fu. 2016. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE J. Sel. Areas Commun. 34, 12 (2016), 3887--3901.
[120]
Praveen Kumar Rajendran. 2015. Hybrid intrusion detection algorithm for private cloud. Ind. J. Sci. Technol. 8, 35 (2015).
[121]
Buvaneswari A. Ramanan, Lawrence M. Drabeck, Mark Haner, Nachi Nithi, Thierry E. Klein, and Chitra Sawkar. 2013. Cacheability analysis of HTTP traffic in an operational LTE network. In Proceedings of the IEEE Wireless Telecommunications Symposium (WTS’13). IEEE, 1--8.
[122]
Ammar Rayes and Salam Samer. 2016. Internet of Things From Hype to Reality: The Road to Digitization. Springer.
[123]
Ju Ren, Hui Guo, Chugui Xu, and Yaoxue Zhang. 2017. Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw. 31, 5 (2017), 96--105.
[124]
Ju Ren, Yundi Guo, Deyu Zhang, Qingqing Liu, and Yaoxue Zhang. 2018. Distributed and efficient object detection in edge computing: Challenges and solutions. IEEE Netw. 32, 6 (2018), 137--143.
[125]
Ju Ren, Yaoxue Zhang, Ruilong Deng, Ning Zhang, Deyu Zhang, and Xuemin Shen. 2016. Joint channel access and sampling rate control in energy harvesting cognitive radio sensor networks. IEEE Trans. Emerg. Top. Comput. 7, 1 (2019), 149--161.
[126]
Morabito Roberto, Cozzolino Vittorio, Ding Aaron Yi, Beijar Nicklas, and Ott Jörg. 2018. Consolidate IoT edge computing with lightweight virtualization. IEEE Netw. 32, 1 (2018), 102--111.
[127]
Tiago Gama Rodrigues, Katsuya Suto, Hiroki Nishiyama, and Nei Kato. 2017. Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control. IEEE Trans. Comput. 66, 5 (2017), 810--819.
[128]
Ola Salman, Sarah Abdallah, Imad H Elhajj, Ali Chehab, and Ayman Kayssi. 2016. Identity-based authentication scheme for the Internet of Things. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC’16). IEEE, 1109--1111.
[129]
Mahadev Satyanarayanan. 2017. The emergence of edge computing. Computer 50, 1 (2017), 30--39.
[130]
Mahadev Satyanarayanan, Paramvir Bahl, Ramón Cáceres, and Nigel Davies. 2009. The case for VM-based cloudlets in mobile computing. IEEE Perv. Comput. 8, 4 (2009), 14--23.
[131]
Mahadev Satyanarayanan, Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Wenlu Hu, and Brandon Amos. 2015. Edge analytics in the Internet of Things. IEEE Perv. Comput. 14, 2 (2015), 24--31.
[132]
Min Sheng, Chao Xu, Junyu Liu, Jiongjiong Song, Xiao Ma, and Jiandong Li. 2016. Enhancement for content delivery with proximity communications in caching enabled wireless networks: Architecture and challenges. IEEE Commun. Mag. 54, 8 (2016), 70--76.
[133]
Adeshina Busari Sherif, Mumtaz Shahid, Al-Rubaye Saba, and Rodriguez Jonathan. 2018. 5G millimeter-wave mobile broadband: Performance and challenges. IEEE Commun. Mag. 56, 6 (2018), 137--143.
[134]
Peng Shu, Fangming Liu, Hai Jin, Min Chen, Feng Wen, Yupeng Qu, and Bo Li. 2013. eTime: Energy-efficient transmission between cloud and mobile devices. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’13). IEEE, 195--199.
[135]
Javad Sohankar, Koosha Sadeghi, Ayan Banerjee, and Sandeep K. S. Gupta. 2015. E-bias: A pervasive eeg-based identification and authentication system. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’15). ACM, 165--172.
[136]
Hong Song, Dacheng Wang, Jiaxin Wang, and Wenhao Zhang. 2017. TC-CCS: A cooperative caching strategy in mobile transparent computing system. In Proceedings of the IEEE IEEE International Conference on Visual Communications and Image Processing (VCIP’17). IEEE, 1--4.
[137]
Hongguang Sun, Matthias Wildemeersch, Min Sheng, and Tony QS Quek. 2015. D2D enhanced heterogeneous cellular networks with dynamic TDD. IEEE Trans. Wireless Commun. 14, 8 (2015), 4204--4218.
[138]
Xiang Sun and Nirwan Ansari. 2017. Latency aware workload offloading in the cloudlet network. IEEE Commun. Lett. 21, 7 (2017), 1481--1484.
[139]
Tarik Taleb, Konstantinos Samdanis, Badr Mada, Hannu Flinck, Sunny Dutta, and Dario Sabella. 2017. On multi-access edge computing: A survey of the emerging 5G network edge architecture 8 orchestration. IEEE Commun. Surv. Tutor. 19, 3 (2017), 1657--1681.
[140]
Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin Sherman Shen. 2019. Flexible and efficient authenticated key agreement scheme for BANs based on physiological features. IEEE Trans. Mobile Comput. 18, 4 (2019), 845--856.
[141]
Yayuan Tang, Kehua Guo, and Biao Tian. 2018. A block-level caching optimization method for mobile transparent computing. Peer-to-Peer Network. Appl. 11, 4 (2018), 711--722.
[142]
Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, and Saverio Niccolini. 2013. Temporal locality in today’s content caching: Why it matters and how to model it. ACM SIGCOMM Comput. Commun. Rev. 43, 5 (2013), 5--12.
[143]
D. Trihinas, A. Tryfonos, M. D. Dikaiakos, and G. Pallis. 2018. DevOps as a service: Pushing the boundaries of microservice adoption. IEEE Internet Comput. 22, 3 (2018), 65--71.
[144]
Luis M. Vaquero and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Comput. Commun. Rev. 44, 5 (2014), 27--32.
[145]
Ricard Vilalta, Raluca Ciungu, Arturo Mayoral, Ramon Casellas, Ricardo Martinez, David Pubill, Jordi Serra, Raul Munoz, and Christos Verikoukis. 2016. Improving security in Internet of Things with software defined networking. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’16). IEEE, 1--6.
[146]
Todd Vollmer and Milos Manic. 2014. Cyber-physical system security with deceptive virtual hosts for industrial control networks. IEEE Trans. Industr. Inf. 10, 2 (2014), 1337--1347.
[147]
Serdar Vural, Ning Wang, Pirabakaran Navaratnam, and Rahim Tafazolli. 2017. Caching transient data in internet content routers. IEEE/ACM Trans. Netw. 25, 2 (2017), 1048--1061.
[148]
Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2017. Anonymous and secure aggregation scheme in fog-based public cloud computing. Fut. Gener. Comput. Syst. 78, 1 (2018), 712--719.
[149]
Rui Wang, Xi Peng, Jun Zhang, and Khaled B. Letaief. 2016. Mobility-aware caching for content-centric wireless networks: Modeling and methodology. IEEE Commun. Mag. 54, 8 (2016), 77--83.
[150]
Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo Yang, and Wenbo Wang. 2017. A survey on mobile edge networks: Convergence of computing, caching and communications. IEEE Access 5, 3 (2017), 6757--6779.
[151]
Xiaofei Wang, Min Chen, Tarik Taleb, Adlen Ksentini, and Victor Leung. 2014. Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Commun. Mag. 52, 2 (2014), 131--139.
[152]
Xiumin Wang, Jin Wang, Xin Wang, and Xiaoming Chen. 2015. Energy and delay tradeoff for application offloading in mobile cloud computing. IEEE Syst. J. 11, 2 (2015), 858--867.
[153]
Yanting Wang, Min Sheng, Xijun Wang, Liang Wang, and Jiandong Li. 2016. Mobile-edge computing: Partial computation offloading using dynamic voltage scaling. IEEE Trans. Commun. 64, 10 (2016), 4268--4282.
[154]
Shinae Woo, Eunyoung Jeong, Shinjo Park, Jongmin Lee, Sunghwan Ihm, and KyoungSoo Park. 2013. Comparison of caching strategies in modern cellular backhaul networks. In Proceedings of the ACM International Conference on Mobile Systems, Applications, and Services (Mobisys’13). ACM, 319--332.
[155]
Huaming Wu, Yi Sun, and Katinka Wolter. 2018. Energy-efficient decision making for mobile cloud offloading. IEEE Trans. Cloud Comput. (2018).
[156]
Changqiao Xu, Tianjiao Liu, Jianfeng Guan, Hongke Zhang, and Gabriel-Miro Muntean. 2013. CMT-QA: Quality-aware adaptive concurrent multipath data transfer in heterogeneous wireless networks. IEEE Trans. Mobile Comput. 12, 11 (2013), 2193--2205.
[157]
George Xylomenos, Christopher N. Ververidis, Vasilios A. Siris, Nikos Fotiou, Christos Tsilopoulos, Xenofon Vasilakos, Konstantinos V. Katsaros, and George C. Polyzos. 2014. A survey of information-centric networking research. IEEE Commun. Surv. Tutor. 16, 2 (2014), 1024--1049.
[158]
Jianxiao Yang, Benoît Geller, and Stéphanie Bay. 2011. Bayesian and hybrid Cramér--Rao bounds for the carrier recovery under dynamic phase uncertain channels. IEEE Trans. Sign. Process. 59, 2 (2011), 667--680.
[159]
Lei Yang, Jiannong Cao, Hui Cheng, and Yusheng Ji. 2015. Multi-user computation partitioning for latency sensitive mobile cloud applications. IEEE Trans. Comput. 64, 8 (2015), 2253--2266.
[160]
M. Yannuzzi, R. Milito, R. Serral-Gracia, D. Montero, and M. Nemirovsky. 2014. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing. In Proceedings of the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD’14). 325--329.
[161]
Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 ACM Workshop on Mobile Big Data (Mobidata’15). ACM, 37--42.
[162]
Changsheng You and Kaibin Huang. 2016. Multiuser resource allocation for mobile-edge computation offloading. arXiv preprint arXiv:1604.02519 (2016).
[163]
Changsheng You, Kaibin Huang, Hyukjin Chae, and Byoung-Hoon Kim. 2017. Energy-efficient resource allocation for mobile-edge computation offloading. IEEE Trans. Wireless Commun. 16, 3 (2017), 1397--1411.
[164]
Engin Zeydan, Ejder Bastug, Mehdi Bennis, Manhal Abdel Kader, Ilyas Alper Karatepe, Ahmet Salih Er, and Mérouane Debbah. 2016. Big data caching for networking: Moving from cloud to edge. IEEE Commun. Mag. 54, 9 (2016), 36--42.
[165]
Guanglin Zhang, Wenqian. Zhang, Yu. Cao, Demin Li, and Lin Wang. 2018. Energy-delay tradeoff for dynamic offloading in mobile-edge computing system with energy harvesting devices. IEEE Trans. Industr. Inf. 14, 10 (2018), 4642--4655.
[166]
Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Cooperative content caching in 5G networks with mobile edge computing. IEEE Wireless Commun. 25, 3 (2018), 80--87.
[167]
Ke Zhang, Supeng Leng, Yejun He, Sabita Maharjan, and Yan Zhang. 2018. Mobile edge computing and networking for green and low-latency Internet of Things. IEEE Commun. Mag. 56, 5 (2018), 39--45.
[168]
Ke Zhang, Yuming Mao, Supeng Leng, Yejun He, and Yan Zhang. 2017. Mobile-edge computing for vehicular networks: A promising network paradigm with predictive off-loading. IEEE Vehic. Technol. Mag. 12, 2 (2017), 36--44.
[169]
Ke Zhang, Yuming Mao, Supeng Leng, Quanxin Zhao, Longjiang Li, Xin Peng, Li Pan, Sabita Maharjan, and Yan Zhang. 2016. Energy-efficient offloading for mobile edge computing in 5G heterogeneous networks. IEEE Access 4, 8 (2016), 5896--5907.
[170]
Meng Zhang, Hongbin Luo, and Hongke Zhang. 2015. A survey of caching mechanisms in information-centric networking. IEEE Commun. Surv. Tutor. 17, 3 (2015), 1473--1499.
[171]
Weiwen Zhang, Yonggang Wen, and Dapeng Oliver Wu. 2015. Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Trans. Wireless Commun. 14, 1 (2015), 81--93.
[172]
Yaoxue Zhang. 2004. Transparence computing: Concept, architecture and example. Chin. J. Electr. 32, S1, Article 169 (2004), 5 pages.
[173]
Yaoxue Zhang, Kehua Guo, Ju Ren, Yuezhi Zhou, Jianxin Wang, and Jianer Chen. 2017. Transparent computing: A promising network computing paradigm. Comput. Sci. Eng. 1, 2 (2017), 7--20.
[174]
Yaoxue Zhang, Ju Ren, Jiagang Liu, Chugui Xu, Hui Guo, and Yaping Liu. 2017. A survey on emerging computing paradigms for big data. Chin. J. Electr. 26, 1 (2017), 1--12.
[175]
Yaoxue Zhang, Laurencetianruo Yan, Yuezhi Zhou, and Wenyuan Kuang. 2013. Information security underlying transparent computing: Impacts, visions and challenges. Web Intell. Agent Syst. 8, 2 (2013), 203--217.
[176]
Yaoxue Zhang and Yuezhi Zhou. 2006. Transparent computing: A new paradigm for pervasive computing. In Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing (UIC’06). Springer-Verlag, Berlin, 1--11.
[177]
Yaoxue Zhang and Yuezhi Zhou. 2007. 4VP: A novel meta OS approach for streaming programs in ubiquitous computing. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA’07). IEEE, 394--403.
[178]
Yaoxue Zhang and Yuezhi Zhou. 2013. Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services. Tsing. Sci. Technol. 18, 1 (Feb. 2013), 10--21.
[179]
Tianchu Zhao, Sheng Zhou, Xueying Guo, Yun Zhao, and Zhisheng Niu. 2015. A cooperative scheduling scheme of local cloud and internet cloud for delay-aware mobile cloud computing. In Proceedings of the IEEE GLOBECOM Workshops. IEEE, 1--6.
[180]
Yun Zhao, Sheng Zhou, Tianchu Zhao, and Zhisheng Niu. 2015. Energy-efficient task offloading for multiuser mobile cloud computing. In Proceedings of the IEEE International Conference on Cognitive Computing (ICCC’15). IEEE, 1--5.
[181]
Zhongyuan Zhao, Mugen Peng, Zhiguo Ding, Wenbo Wang, and H Vincent Poor. 2016. Cluster content caching: An energy-efficient approach to improve quality of service in cloud radio access networks. IEEE J. Select. Areas Commun. 34, 5 (2016), 1207--1221.
[182]
Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, and Min Ji. 2018. CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78, 1 (2018), 730--738.

Cited By

View all

Index Terms

  1. A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 52, Issue 6
      November 2020
      806 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/3368196
      • Editor:
      • Sartaj Sahni
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 October 2019
      Accepted: 01 September 2019
      Revised: 01 July 2019
      Received: 01 January 2019
      Published in CSUR Volume 52, Issue 6

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. End-edge-cloud orchestration
      2. cloudlet
      3. fog computing
      4. mobile edge computing
      5. network computing
      6. transparent computing

      Qualifiers

      • Survey
      • Research
      • Refereed

      Funding Sources

      • 111 Project
      • International Science & Technology Cooperation Program of China
      • Huxiang Young Talents Plan of Hunan Province
      • China Hunan Provincial Science & Technology Program
      • National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)608
      • Downloads (Last 6 weeks)51
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Qubit optical-cavity interaction and quantum synchronization of two qubits inside an optical latticeMaterials Science and Engineering: B10.1016/j.mseb.2024.117819311(117819)Online publication date: Jan-2025
      • (2025)A survey on Deep Learning in Edge–Cloud CollaborationKnowledge-Based Systems10.1016/j.knosys.2025.112965310:COnline publication date: 15-Feb-2025
      • (2025)Federated and edge learning for large language modelsInformation Fusion10.1016/j.inffus.2024.102840117:COnline publication date: 1-May-2025
      • (2025)Fault tolerant & priority basis task offloading and scheduling model for IoT logisticsAlexandria Engineering Journal10.1016/j.aej.2024.10.018110(400-419)Online publication date: Jan-2025
      • (2025)Joint resource autoscaling and request scheduling for serverless edge computingCluster Computing10.1007/s10586-024-04870-028:3Online publication date: 21-Jan-2025
      • (2025)From Field to Cloud: IoT and Machine Learning Innovations in High-Throughput PhenotypingMachine Learning for Social Transformation10.1007/978-981-97-7532-3_10(125-137)Online publication date: 3-Jan-2025
      • (2024)Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet SystemInternational Journal of Cloud Applications and Computing10.4018/IJCAC.33989114:1(1-24)Online publication date: 9-Apr-2024
      • (2024)From Theory to PracticeAdvanced Applications in Osmotic Computing10.4018/979-8-3693-1694-8.ch005(73-89)Online publication date: 29-Mar-2024
      • (2024)Edge Computing Empowering Distributed Computing at the EdgeEmerging Trends in Cloud Computing Analytics, Scalability, and Service Models10.4018/979-8-3693-0900-1.ch003(67-83)Online publication date: 22-Mar-2024
      • (2024)Analyzing Threats and Attacks in Edge Data Analytics within IoT EnvironmentsIoT10.3390/iot50100075:1(123-154)Online publication date: 5-Mar-2024
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media