0% found this document useful (0 votes)
44 views

Advantages of Using Fog in Iot Applications: International Journal of Information Technology October 2020

This document discusses the advantages of using fog computing in IoT applications. It begins with an introduction to IoT and its reliance on cloud computing. It then discusses some limitations of cloud computing for IoT and introduces fog/edge computing as an alternative model. The document provides a comparison of fog and cloud computing, highlighting attributes of fog that are beneficial for IoT such as low latency and support for location-aware applications. It also proposes using fog to enhance privacy protection for IoT applications.

Uploaded by

parth_iarjun
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

Advantages of Using Fog in Iot Applications: International Journal of Information Technology October 2020

This document discusses the advantages of using fog computing in IoT applications. It begins with an introduction to IoT and its reliance on cloud computing. It then discusses some limitations of cloud computing for IoT and introduces fog/edge computing as an alternative model. The document provides a comparison of fog and cloud computing, highlighting attributes of fog that are beneficial for IoT such as low latency and support for location-aware applications. It also proposes using fog to enhance privacy protection for IoT applications.

Uploaded by

parth_iarjun
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/344781434

Advantages of using fog in IoT applications

Article  in  International Journal of Information Technology · October 2020


DOI: 10.1007/s41870-020-00514-9

CITATIONS READS

65 924

2 authors:

Adnan Ahmed Abi Sen Mohammad Yamin


Islamic Univsity of Al-Maddenah King Abdulaziz University
68 PUBLICATIONS   890 CITATIONS    103 PUBLICATIONS   1,418 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Various View project

Privacy of IOT View project

All content following this page was uploaded by Adnan Ahmed Abi Sen on 21 October 2020.

The user has requested enhancement of the downloaded file.


Int. j. inf. tecnol.
https://doi.org/10.1007/s41870-020-00514-9

ORIGINAL RESEARCH

Advantages of using fog in IoT applications


Adnan A. Abi Sen1 • Mohammad Yamin2

Received: 11 November 2019 / Accepted: 11 September 2020


 Bharati Vidyapeeth’s Institute of Computer Applications and Management 2020

Abstract Edge computing (EC) has emerged as an 1 Introduction


attractive and interesting topic for research. It is an
extension of cloud computing, used for non-centralized Internet of Things (IoT) has matured over with the passage
computing with various new features and solutions. In of time. Now we can see IoT applications in many areas of
particular, edge computing deals with Internet of Things computing and technology. In particular, IoT plays a crit-
(IoT) based applications and services. Fog, which some- ical role in the making of smart cities, which are now
times is also referred as edge, is basically a type of EC implemented on a large scale in the developed economies
model, and its features can support a wide range of on the planet earth. A snapshot of IoT application is shown
applications and services of IoT. In this article, we shall in Fig. 1. Basically, IoT is an information technology
explore importance of Fog in IoT applications. In this infrastructure which consists of sensors, actuators and
paper, we shall provide a comprehensive comparison advanced services for interconnecting physical and virtual
between Fog and cloud. In the process, we shall also pro- world with the help of sophisticated communication tech-
vide practical examples to explain the importance of nologies [1, 2]. Ubiquitous aspects of IoT have been
exploiting each of the properties or attributes of Fog which studied with various perspectives in [3, 4].
play critical role in facilitating new applications. In addi- Most of the IoT based devices such as Smart-phones,
tion, we have proposed some novel applications of Fog for Smart-watches, health monitoring, and drug delivery
protecting the privacy in IOT based applications. wireless devices are of limited power, storage, and com-
puting capabilities. Therefore they rely heavily on the
Keywords Fog  Edge computing  IoT  Cloud  Privacy  cloud data centers to collect huge amounts of sensed data
Security  Smart city  Big data and for analyzing it, in addition, to providing many of
services and features to end user like accessibility, scala-
bility, mobility, providing resources for storage and com-
putation functions with low cost, etc. [5, 6].
With the ongoing research and innovations. Various
weaknesses of the clouds data center have been exploited
by various articles including [7, 8]. This research shows
that the clouds based computing and data centers will not
& Mohammad Yamin satisfy the increasing requirements of smart objects whose
[email protected]
number is expected to exceed 50 billion by 2020. This
Adnan A. Abi Sen explosion in the IoT objects adds to the delay and latency
[email protected]
in applications, which will affect the quality-of-service
1
College of Computing and Information Technology, King (QoS) and the range of supported applications in use. Edge
Abdulaziz University, Jeddah, Saudi Arabia computing concept with several models has been proposed
2
Faculty of Economics and Administration, King Abdulaziz to overcome the limitations of Cloud and to expand the
University, Jeddah, Saudi Arabia scope of services and applications that will be supported

123
Int. j. inf. tecnol.

Fig. 1 Smart city applications

[9, 10]. The most important models are shown in Fig. 2 • Mobile Cloud Computing (MCC) is a model that relied
[11–13], some of whose details are as follows. on the new features and capabilities in the smartphones
to do some processes on the local side, but if there is
• Local/Edge is a small cloud close to the end user in a
need to more power, the phone will send this task to
specific area, which allows them to avoid dealing with a
middle layer (lightweight cloud servers named Cloud-
remote one like in Clouds. This type of system only has
let) between mobile computing (Smartphone) and cloud
distributed overhead on the central cloud to few clouds
computing (the Central Cloud)..
where each one serves in a specific area.
• The last model is the Fog Computing which is different
• Mobile Edge Computing (MEC) depends on servers
and based on the new idea of the dense distribution of
dedicated to the Cellular Devices Stations to provide
several Fog nodes close to end users to do some
some new features and computing services for mobile
computation and storage tasks, and to be a broker
subscribers. This type relies on the radio network.
between central cloud and smart objects.

Fig. 2 Edge and mobile


computing models

123
Int. j. inf. tecnol.

All previous models are found to offload the jobs of the B. Comparison between cloud and Fog
cloud to the edge of the network to enhance the quality of Cloud provides enormous amount resources and ser-
services, lift the performance, decrease the latency, boost vices to a client with low cost through three types/
the connectivity, and support different types of projects levels of services (levels of control) which are [8, 12]:
which are sensitive to the time and critical cases [14].
• Software as a Service (SaaS) allows the user to get
Contributions of this research are:
services from the cloud if it existed e.g. Software
• Provide a brief introduction of Fog computing. applications online, these applications are provided
• Provide realistic cases for using Fog with IoT apps. from the third party and the user only can use this
• Proposed a novel application of Fog for protecting the service as manage your docs online.
privacy of IoT based applications. • Platform as a Service (PaaS) allows user to set and
• Discuss challenges and future trends. run his own application on the cloud to be accessed
from anywhere at any time, as some companies
Rest of this article is divided into five sections. In the
applications will be deployed on the cloud to be
Sect. 2, we discuss the details of Fog including its defini-
available for their employees or customers without
tion, properties, roles, applications in addition to compar-
concern about resources, data security, and back-
ison with the cloud. In Sect. 3, we shall show some real
ups, management, etc.
applications which are enhanced by Fog whereas. In
• Infrastructure as a Service (IaaS) user has control
Sect. 4, we shall focus on challenges in Fog technology
on specific parts of resources as operating system,
and propose a new idea about using Fog for privacy pro-
network, and storage virtually by the Internet, e.g.
tection, and in Sect. 5, we shall provide concluding
some applications need High-Performance Com-
remarks with future possibilities in this area.
puting (HPC) requirement to test their functions on
big data, so they need direct control (Virtual) and
privileges on some part of resource to manage and
2 Fog computing do what they want.

A. Definitions However, all these service levels worked on raw data


Fog is a recent distributed computing model, it was after it reaches to cloud, and this data is very big, so that
introduced by Cisco in 2012 as assistant to the cloud will adversely affect the link capacity, bandwidth, perfor-
computing to enhance QoS and to develop different mance, etc.
kinds of supported applications in IoT [8]. The For previously mentioned reasons, the Fog computing as
meaning of Fog word explains the nature of this term, edge model provided many methods to address these issues
where the clouds are far in the sky, the Fog comes and contribute to enhance the quality of cloud and expand
down on the ground close to people [15]. the range of services that can be introduced to end user
Actually, there are many definitions for Fog focused on [18, 19].
the same ideas, [8] said, Fog is new computing para- The main key features of Fog computing are:
digm could be seen as an extension to cloud computing • Dense deployment for Fog nodes in the edge of
near network edge to reduce the burden on the cloud. network near to user enabled them to do some
Whereas the researchers in [11] defined Fog as a new preprocessing on data (filtering, removing repetition,
computing model found to exceed the cloud problems, dealing conflict, aggregating, classifying) to convert it
and in [7] defined Fog as an extension to cloud com- from raw data to smart data, that reduces the size of
puting and services proximity to the user in the edge. data and that will move on the link and offload the
In [10], Fog is a term coined to distribute data pro- burden for cloud and provide location awareness [20].
cessing to the edge. • Fog can take speed decision in the emergency cases
Briefly, the Fog computing is a small cloud in the edge before the data sent to the cloud and without delay or
of network near to end user to do some preprocessing latency [21].
of data, applying some roles and policies, filtering • The Fog nodes can contribute to providing more
some things, performing some issue, or caching some mobility and availability of service even in the
info before sending to the cloud to store it and make scenarios where an Internet connection is down [22].
full analyzes. This neutrality for Fog has allowed it to • Fog can apply the specific policy to data or encrypt data
provide new features and solve many limitations before sending to cloud, this is done to increase the
comparing to the cloud computing [16, 17]. security [23].

123
Int. j. inf. tecnol.

• Fog can support new types of applications such as next section to explain these differences, features, and
virtual reality and real-time applications [17]. properties [29].
We proposed new dimension of Fog which is related to
its role in the privacy protection (more details will follow)
3 Cases and examples of Fog usage
[3, 24]. The structure of Fog and cloud is depicted in the
Fig. 3.
A. E-health system
Generally, Fog computing consume less power than cen-
It is one of the most important applications in the smart
tral computing in clouds. However, the main advantages of
city. It tries to provide more high standards of
Fog, as shown in Table 1, is it’s with integration with cloud.
healthcare and in emergency conditions using IoT
By this cooperation, we save a lot of energy consumption
infrastructure. This system asks the patient to wear
[25, 26]. There are many companies, for example IBM,
special clothes or gadgets with sensors that monitor the
Google, Samsung, Intel, ARM, AWS, Azure IoT, which
heart rate, blood pressure, sugar rate, level of pollution
provide platforms for IoT applications and services. However
in the air, temperature, etc.[30].
the most of these platforms are cloud-based. Recently, most
All these information have to send to the cloud (server
of them have also started to consider the fog as the dominant
provider) to be collected and analyzed to detect any
element in the platforms like Google, Microsoft, Amazon,
potential danger in advance. If there is any abnormal
IBM, and Cisco. The reason for doing this is to facilitate more
case, or health emergency is predicted, the patient will
services, reduce the cost of communication, and reduce the
be notified in advance. Even some emergency calls
delay in response. The main services of all these platform are
will be done by calling family or ambulance.
to manage devices and connectivity, data and storage, anal-
However, this system is very sensitive or latency,
ysis and visualization, etc. At the same time the main appli-
because it is related to people lives. Unfortunately, the
cations are remote control facility and provide PaaS
cloud can’t achieve this requirement due to the
applications, ubiquity services, IB, and healthcare, and
scheduling of a huge number of functions which come
environment system [27, 28].
to cloud in short period of time. For this, the Fog
Further comparison between both (Fogs vs. Cloud) is
computing and serve an unlimited number of patients
also presented in Table 1. Examples are provided in the

Fig. 3 Example of a
figure caption

123
Int. j. inf. tecnol.

Table 1 Fog vs. cloud


Factor Fog Cloud

Main component Nodes which can be used as an access point, box, server, router, switch, Set of servers
smartphone, smart car, or any other device has a processor, network,
and memory
Nodes Number Large number of nodes, which can cooperate in different forms Few clustered servers
(Cluster, P2P, and Master–Slave)
Resources The fog resources (Processor, storage) are small comparing to the Unlimited resources (storage and processing
(processing and cloud, but they are big if compared to IoT object such as a power)
memory) smartphone, weather monitoring sensors etc
Fog enables some required tasks such as encrypting data or applying
policy, classifying information, aggregating, etc. Therefore it will
reduce the overhead on a cloud and boost the performance
Storage type Caching data for few hours Permanent storage on hard
Cooperation Mostly cooperatively (hierarchically), but it can work independently Mostly independently, but it can cooperate with
another cloud
Connection Wireless, it supports many protocols (Wimax, 3/4/5 G, Zigbee, etc.) Internet connection with TCP/IP
Location Basically, it is the edge of the network (local) close to the user. This Far from users (Internet)
makes it possible to process and filter data in the edge before
transferring it to cloud, the response for critical cases directly without
latency. So it decreased the overload and cost on the link and on the
cloud. All this eventually improves the performance
Awareness It is supported and reorganized because the user knows where his data Not supported, all data will be stored in one far
location will be processed. For that, there isn’t any problem with a policy and place (mostly in another country)
ethical issues related to the type of data and the place
Distribution Dense presence and it supports distributed computing Central
Deployment plan Needs a power plan for deployment of many nodes to cover selected Easer, because it central (one place)
area, and how these nodes will cooperate with themselves
User control level The user can have full control of the Fog nodes, or only can use the Three levels exist here: SaaS, PaaS, and IaaS
services which are provided by Fog nodes
Application type Supports new types of applications which that need high processing Support applications need to power in computing
speed, real-time interactive, continuous queries supported, emergence and analyzing on big data that stored on it,
cases dealing, working with big data, applying security policy, etc permanently
Real Time Strong Supported Weak supported
Working as Can play this role between IoT objects and cloud It is the main party
broker
Mobility Strong Supported (details presented in section III) Weak supported
Collecting data Fog makes the collecting data easier and faster Ineffective and costly without Fog
Latency duration It is low, because it is near to user with wireless connection (as a local There is high latency
network), so it is able to support a new type of applications
Delay jitter It is very low for same previous reason Large delay
Work with Big Increases efficiency of dealing with big data and reduces cost, because Analyzing and storing big data
Data it filters and classifies data before sending it to cloud
Data flow and Less and smaller Large and huge
size
Data It filters, manipulates, classifies, removes redundancy Will be raw without Fog
Security issue There is more threat on security, and Fog nodes are vulnerable from More security, but it is a goal for attackers also, so
attackers because they are deployed near the users. However, it can it is considered one of the open issues for many
apply security functions as encryption on data before sending data, researchers in cloud and Fog also
where these functions aren’t possible by sensors themselves
Accountability Weak, but that increase the privacy of user’s identity Strong, but more threat to privacy
Apply policy Do that instead of smart objects which don’t have enough resources It cannot apply policy in advance
Thread on Supported. We consider a Fog as a tool for enhancing the privacy There is a big and real threat to the privacy of user
privacy protection in IoT applications on the link and from server provider itself
Scalability High Average
Supported even if there isn’t connected to the Internet

123
Int. j. inf. tecnol.

Table 1 continued
Factor Fog Cloud
Connectivity and Supported, but it will be lost if the connection to
availability the Internet down
Management Difficult (decentralized) Easier (central)
programming Challenge, especially if user wants to use many Fog nodes together Easier, no worry about structure
Virtualized Can support but it is difficult if dealing with a lot of Fog nodes Supported
Heterogeneous Supports heterogeneous devices, platforms, and data because there Supports Heterogeneous data only
Platforms isn’t a standardized framework
Ownership Small or large party Large party
Fog can’t be instead of the cloud, but it integrates with it to enhance services quality and broadens scopes of applications

at the same time without affecting the latency. system will be inactive without Fog nodes, which can
Fog nodes will be distributed densely in the city (smart be set in the traffic light or in the smart cars. The cars
city) and the patient can connect to any nearest node will send the signals continuously to the nearest traffic
locally by wireless connection, and all this sensed data light (Fog node) [34].
will send to Fog which will aggregate this data and This node will calculate the objects number, and then it
classify it [31]. will send this value to the cloud which aggregates all
Then it will collect statistical values for all cached data values, takes a decision and resends notifications to
and then it will send only the aggregated values to the Fog nodes. Finally, Fog nodes pass them to vehicles.
cloud to save permanently for historical analyses Another scenario in similar systems is, the smart
instead of sending huge details of data. This will save vehicles can cooperate together to perform the same
the bandwidth and capacity of the link, and enhance goal [3].
the performance; moreover, if there is an emergency C. Energy control system
case, the Fog can detect it directly without delay and In the smart home, all devices send a signal in every
take the right decision without the need to contact to few seconds to the server provider (cloud) to calculate
the central cloud. the rate of consumption of energy, but that causes
congestion on the networks and enables cloud to
aggregate very specific information about the lifestyle
3.1 Face recognition system
of users to give him reports about his devices and their
usage energy [5, 35].
Some companies use this system which relies on the cloud
which contains all data about their employees to do the Fog node also can be used here to cache data and finding
computation functions, return the result and record atten- the average amount of consuming for each device and then
dance instead of buying their own system. So each send it to the cloud without sending all values with specific
employee will send his image to the cloud to process it and times which isn’t required and maybe reveal sensitive
which will apply an algorithm and then return the result information about the user. That will enhance the perfor-
[32]. mance and save the network and cloud resources.
However, if there are a big number of employees and Actually, there are many other applications that Fog can
each one will send his image on a link that will cause a lot have positive effects and make them more sophisticated as
of latency and overhead on the network and cloud itself. Mobile-Learning [36, 37], Decision-Making [38], E-gov-
Using Fog will solve this problem by performing some ernment [39], Shopping [40], Management in Crowded
functions on the image before sending. Fog node will do a Event [41], etc.
features extraction task on the image and then send these
few values to the cloud instead of the whole image. That
will save the resources of the network and offload the tasks 4 Fog computing, challenges and opportunities
from the cloud. Similar ideas can be used in video con-
ference systems, virtual reality, e-learning, etc.[33]. A. Challenges
Actually, there are many of challenges inherited from
B. Traffic organization system
the cloud computing and other related to nature of Fog
These systems need speed response and tools to collect
itself [8, 20, 23, 42]. Some of the main challenges are:
data and calculate traffic in each street quickly and
then notify the automobiles about the best path. That • Security challenge.

123
Int. j. inf. tecnol.

• How to protect the Fog node from an outside the quality of system as (C- traffic system), here each two
attacker, or from malicious Fog node. Fog nodes can exchange the locations of two users and then
• Heterogeneity of devices that connect to Fog send it to cloud which will collect false information about
created a real challenge on it. each user without changing the total number of vehicle in
• Creating a standard framework and protocols to each area [47, 48].
manage the Fogs and IoT objects. Fourth technique depended on the caching property in
• Managing the collaboration between Fog nodes Fog node, so it is can store some of the users’ query
themselves. answers to use them in answering future queries without
• Programming Fog and finding standard program- connecting to server provider [49, 50]. Finally, the last idea
ming language to enable the developer to achieve can integrate with any of other previous ideas to form new
their tasks easily. effective methods.
• Privacy of users and objects data, where the most
of researches considered Fog as a reason for
violation privacy, while we proposed many sce- 5 Conclusion and future trends
narios employed Fog properties to protect privacy
as a new dimension of using Fog computing. In this paper, we have presented an overview of IoT and
The concept of privacy is different from security computing models especially the Fog computing, its
and it is more complex, the security concerns about properties and features. We have also provided a compar-
protecting data on the link between two sides user ison between cloud computing and Fog in some important
and server provider, or protect user and server applications. Our discussion of cases of applications using
provider themselves, while in the privacy, user Fog clearly demonstrates benefits of Fog in IoT based
sends his data to server provider and at the same applications.
time he doesn’t trust the server provider, so wants Finally, we have listed and discussed most of the limi-
to protect his sensitive data from it [3]. tations of Fog computing with a focus on privacy. In
Many traditional approaches have been provided in addition, we have floated some ideas of using Fog to
this domain as K-Anonymity, Obfuscation, Dum- enhance new methods of preserving privacy.
mies, Cooperation, etc. but these approaches had In summary, some of the future trends in Fog computing
some open problems until now in performance, the can listed as:
accuracy of results, and need to trust in a third
• Create a standard framework to manage IoT objects,
party. In addition, they are not suitable for many of
Fog nodes, Cloud, and relations among them.
smart city applications [24, 43].
• Find uniform protocol for connecting between users
B. Opportunities and objects, and Fog nodes.
As we mentioned in the previous sections, the Fog has • Develop new approaches to enhance security and
to integrate with the cloud to enhance the provided privacy protection which is considered the biggest
services, and to pave the road for creating new services challenge faced by IoT based applications.
in various major areas. Also, we proposed a novel idea • Enhance the resources of Fog nodes and employing
of using Fog computing to find new techniques to them in new applications.
protect privacy. • Find simulation tool, and Fog dedicated programming
language to deal with Fog nodes and manage the
First technique can be used in case of E-Healthcare
cooperation between these nodes.
systems [44, 45]. It is dependent on the Fog’s capability to
be a blind broker between users and cloud to hide user’s
identity. Where user encrypts his data plus his random key
and sends it to Fog to hidden his identity from the cloud
without disclosing his information, also the response will References
be encrypted by using a random key.
1. Da Xu L, He W, Li S (2014) Internet of things in industries: a
Second technique depended on the capability of Fog to survey. IEEE Trans Ind Inf 10(4):2233–2243
perform some processing as (B- face reorganization sys- 2. Bandyopadhyay D, Sen J (2011) Internet of things: applications
tem), where Fog calculates the features of the image and and challenges in technology and standardization.
sends them instead of the original image that means pre- WirelPersCommun 58(1):49–69
3. Abi Sen A, Albouraey F, Jambi KA (2017) Preserving privacy of
serving personal information from the cloud [45, 46]. smart cities based on the fog computing. Smart societies infras-
Third technique depended on the cooperation between tructure technologies and applications (SCITA). Springer, Berlin
Fogs themselves to protect user location without affecting

123
Int. j. inf. tecnol.

4. Alam F, Mehmood R, Katib I, Albogami N, Albeshri A (2017) 25. Jalali F, Hinton K, Ayre R, Alpcan T, Tucker RS (2016) Fog
Data fusion and IoT for smart ubiquitous environments: a sur- computing may help to save energy in cloud computing. IEEE J
vey. IEEE Access Sel Areas Commun 34(5):1728–1739
5. Deshmukh UA, More SA (2016) Fog computing: a new approach 26. Albouq SS, Abi Sen AA, Namoun A, Bahbouh NM, Alkhodre
in the world of cloud computing. Instructional Technology, New AB, Alshanqiti A (2020) A double obfuscation approach for
York, p 49 protecting the privacy of IoT location based applications. IEEE
6. Aazam M, Huh EN (2016) Fog computing: the cloud-IoT\/ioe Access 8:129415–129431
middleware paradigm. IEEE Potentials 35(3):40–44 27. Asemani M, Abdollahei F, Jabbari F (2019) Understanding IoT
7. Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, platforms: towards a comprehensive definition and main char-
applications and issues. In: Proceedings of the 2015 workshop on acteristic description. In: 2019 5th international conference on
mobile big data, ACM. pp. 37–42 web research (ICWR) IEEE. pp. 172–177
8. Saharan KP, Kumar A (2015) Fog in comparison to cloud: a 28. Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog
survey. Int J Comput Appl 122(3):1 computing for the internet of things: a survey. ACM Trans
9. Roman R, Lopez J, Mambo M (2016) Mobile edge computing, Internet Technol (TOIT) 19(2):1–41
fog et al: a survey and analysis of security threats and challenges. 29. Tang B, Chen Z, Hefferman G, Wei T, He H, Yang Q (2015) A
FuturGener Comput Syst 78:680–698 hierarchical distributed fog computing architecture for big data
10. Gonzalez NM, Goya WA, de Fatima Pereira R, Langona K, Silva analysis in smart cities. In: Proceedings of the ASE bigdata and
EA, de BritoCarvalho TCM, Sefidcon A (2016) Fog computing: socialinformatics ACM. p 28
data analytics and cloud distributed processing on the network 30. Sun L, Yamin M, Mushi C, Liu K, Alsaigh M, Chen F (2014)
edges. In: Computer Science Society (SCCC), 2016 35th inter- Information analytics for healthcare service discovery. J Healthc
national conference of the Chilean, IEEE. pp. 1–9 Eng 5(4):457–478
11. Yi S, Hao Z, Qin Z, Li Q (2015) Fog computing: platform and 31. Chakraborty S, Bhowmick S, Talaga P, Agrawal DP (2016) Fog
applications. In: Hot topics in web systems and technologies networks in healthcare application. In: Mobile Ad Hoc and sensor
(HotWeb), 2015 3rd IEEE workshop on IEEE. pp. 73–78 systems (MASS), IEEE 13th international conference on IEEE.
12. Firdhous M, Ghazali O, Hassan S (2014) Fog computing: will it pp 386–387
be the future of cloud computing?. The third international con- 32. Chetty G, Yamin M (2015) Intelligent human activity recognition
ference on informatics and applications (ICIA2014). scheme for ehealth applications. Malays J Comput Sci
13. Sun X, Ansari N (2016) EdgeIoT: mobile edge computing for the 28(1):59–69
internet of things. IEEE Commun Mag 54(12):22–29 33. Hu P, Ning H, Qiu T, Zhang Y, Luo X (2017) Fog computing-
14. Suryawanshi R, Mandlik GANESH (2015) Focusing on mobile based face identification and resolution scheme in internet of
users at edge and Internet of Things using fog computing. Int J things IEEE. Trans Ind Inf 13(4):1910–1920
Sci Eng Technol Res 4(17):3225–3231 34. Al-Doghman F, Chaczko Z, Ajayan AR, Klempous R (2016) A
15. Tordera EM, Masip-Bruin X, Garcia-Alminana J, Jukan A, review on Fog computing technology. In: Systems, man, and
RenGJ, Zhu J, Farre J (2016) What is a fog node a tutorial on cybernetics (SMC), 2016 IEEE international conference on IEEE.
current concepts towards a common definition. arXiv preprint. pp 001525–001530
arXiv:1611.09193 35. Yamin M, Al Amri AS (2016) Mobile applications and customers
16. Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R satisfaction in saudi electricity company. Int MultilingAcad J
(2016) Fog computing: principles, architectures, and applica- 2(1):1
tions. arXiv preprint. arXiv:1601.02752 36. Al-Ismail M, Gedeon T, Yamin M (2017) Effects of personality
17. Singh M, Kaur R (2016) Integration of IoT and fog: need of the traits and preferences on M-learning. Int J InfTechnol 9(1):77–86
hour. Int J Adv Res Comput Sci 7(6):1 37. Mehmood R, Alam F, Albogami NN, Katib I, Albeshri A,
18. Hosseinpour F, Plosila J, Tenhunen H (2016) An approach for Altowaijri SM (2017) UTiLearn: a personalised ubiquitous
smart management of big data in the fog computing context. In: teaching and learning system for smart societies. IEEE Access
Cloud computing technology and science (CloudCom), 2016 5:2615–2635
IEEE international conference on IEEE. pp. 468–471 38. Mohammadian M, Yamin M (2017) Intelligent decision making
19. Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a and analysis using fuzzy cognitive maps for disaster recovery
platform for internet of things and analytics. Big data and Internet planning. Int J InfTechnol 9(3):225–238
of Things: a roadmap for smart environments. Springer, Berlin, 39. Basahel A, Yamin M (2017) Measuring success of e-government
pp 169–186 of Saudi Arabia. Int J InfTechnol 9(3):287–293
20. Mahmud R, Kotagiri R, Buyya R (2018) Fog computing: a tax- 40. Yamin M, Al Harbi O (2016) Online shopping adoption in
onomy, survey and future directions. Internet of everything. saudiarabia: an empirical research. Int MultilingAcad J 2(1):1
Springer, Singapore, pp 103–130 41. Yamin M (2015) Health management in crowded events: Hajj
21. Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing and Kumbh. BIJIT-BVICAM’s. Int J InfTechnol 7(1):791–794
for the Internet of Things: security and privacy issues. IEEE 42. Aazam M, Huh EN (2014) Fog computing and smart gateway
Internet Comput 21(2):34–42 based communication for cloud of things. In: Future internet of
22. Chiang M, Zhang T (2016) Fog and IoT: an overview of research things and cloud (FiCloud), 2014 international conference
opportunities. IEEE Internet Things J 3(6):854–864 on IEEE. pp 464–470
23. Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and 43. Alrahhal MS, Ashraf MU, Abesen A, Arif S (2017) AES-route
privacy issues of fog computing supported Internet of Things server model for location based services in road networks.
environment. In: Network of the future (NOF), 2015 6th inter- IJACSA 8:8
national conference on the IEEE. pp. 1–3 44. Fouz F, Sen AA (2016) Performance and scheduling of HPC
24. Yamin M, Sen AAA (2018) Improving privacy and security of applications in cloud. J Theor Appl Inf Technol 85(3)
user data in location based services. Int J Ambient Comput Intell 45. Yamin M, Basahel AA, Abi Sen AA (2018) Managing crowds
(IJACI) 9(1):19–42 with wireless and mobile technologies. Wirel Commun Mob
Comput

123
Int. j. inf. tecnol.

46. Al-Rahal MS, Abi Sen ADNAN, Basuhil AA (2016) High level 49. Sen AAA, Eassa FA, Jambi K, Yamin M (2018) Preserving
security based steganoraphy in image and audio files. J Theor privacy in internet of things: a survey. Int J Inf Technol
Appl Inf Technol 87(1) 10(2):189–200
47. Basahel AM, Sen AAA, Yamin M, Alqahtani S (2019) Bartering 50. Sen AAA, Eassa FB, Yamin M, Jambi K (2018) Double cache
method for improving privacy of LBS. IJCSNS 19(2):207 approach with wireless technology for preserving user privacy.
48. Yamin M, Alsaawy Y, Alkhodre BA, Sen A, Ahmed A (2019) An Wirel Commun Mob Comput
innovative method for preserving privacy in Internet of Things.
Sensors 19(15):3355

123

View publication stats

You might also like