• editor@ijmra.in
  • ISSN[Online] : 2643-9875  ||  ISSN[Print] : 2643-9840

VOLUME 06 ISSUE 04 APRIL 2023

An Approach from Internet of Things to Cloud of Things using Fog Computing
1Assist Professor. Roheed Khaliqyar,2Associate Prof. Amir Kror Shahidzay,3Assistant. Prof Sebghatullah Aslamza
1Faculty of computer science, Department of software engineering, Kabul University
2Lecturer & Dean of Computer Science Faculty, Kabul University
3Lecturer & Deputy Dean of Computer Science Faculty, Kabul University
DOI : https://doi.org/10.47191/ijmra/v6-i4-53

Google Scholar Download Pdf
ABSTRACT:

With the proliferation of Internet of Things (IoT) devices, there is an increasing demand for real-time data processing and analysis. However, the traditional cloud computing architecture is not well-suited for IoT applications due to its inherent limitations such as high latency, limited bandwidth, and high-power consumption. Fog computing has emerged as a promising solution that brings computation and storage capabilities closer to the edge of the network. This paper explores the transition from IoT to Cloud of Things (CoT) using Fog computing. We discuss the benefits and challenges of Fog computing and analyse its architecture and components. Additionally, we examine various use cases of Fog computing and discuss their advantages and limitations. We conclude by highlighting the potential of Fog computing to enable the transition from IoT to CoT

KEYWORDS:

Internet of thing, cloud of thing, fog computing, connected cars, smart grids, fog application

REFERENCES

1) Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the 1st edn. of the MCC workshop on Mobile cloud computing (2012)

2) Pao, L., Johnson, K.: A tutorial on the dynamics and control of wind turbines and wind farms. In: American Control Conference (2009)

3) Botterud, A., Wang, J.: Wind power forecasting and electricity market operations. In: International Conference of 32nd International Association for Energy Economics (IAEE), San Francisco, CA (2009)

4) Cristea, V., Dobre, C., Pop, F.: Context-aware environ internet of things. Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence Studies in Computational Intelligence, vol. 460, pp. 25–49 (2013)

5) Haak, D.: Achieving high performance in smart grid data management. White paper from Accenture (2010).

6) S. Agarwal, J. Dunagan, N. Jain, S. Saroiu, A. Wolman, and H. Bhogan. Volley: Automated data placement for geodistributed cloud services. In NSDI, 2010.

7) A. Basta, W. Kellerer, M. Hoffmann, H. J. Morper, and K. Hoffmann. Applying nfv and sdn to lte mobile core gateways, the functions placement problem. In workshop on All things cellular. ACM, 2014.

8) F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. In workshop on Mobile cloud computing. ACM, 2012.

9) N. Cao, C. Wang, M. Li, K. Ren, and W. Lou. Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS, 2014.

10) C. Chen, H. Raj, S. Saroiu, and A. Wolman. ctpm: a cloud tpm for cross-device trusted applications. In NSDI, 2014.

11) B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Eurosys. ACM, 2011.

12) Cisco. Iox overview. http://goo.gl/n2mfiw, 2014.

13) E. Cuervo, A. Balasubramanian, D.-k. Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In Mobisys. ACM, 2010.

14) H. T. Dinh, C. Lee, D. Niyato, and P. Wang. A survey of mobile cloud computing: architecture, applications, and approaches. WCMC, 2013.

15) C. Dsouza, G.-J. Ahn, and M. Taguinod. Policy-driven security management for fog computing: Preliminary framework and a case study. In IRI. IEEE, 2014.

16) C. Dwork. Differential privacy. In Encyclopedia of Cryptography and Security. 2011.

17) N. I. M. Enzai and M. Tang. A taxonomy of computation offloading in mobile cloud computing. In MobileCloud. IEEE, 2014.

18) ETSI. Mobile-edge computing. http://goo.gl/7NwTLE, 2014.

19) Gil Press. Idc: Top 10 technolog

VOLUME 06 ISSUE 04 APRIL 2023

There is an Open Access article, distributed under the term of the Creative Commons Attribution – Non Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting and building upon the work for non-commercial use, provided the original work is properly cited.


Our Services and Policies

Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected.

The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.

International Journal of Multidisciplinary Research and Analysis will publish 12 monthly online issues per year,IJMRA publishes articles as soon as the final copy-edited version is approved. IJMRA publishes articles and review papers of all subjects area.

Open access is a mechanism by which research outputs are distributed online, Hybrid open access journals, contain a mixture of open access articles and closed access articles.

International Journal of Multidisciplinary Research and Analysis initiate a call for research paper for Volume 07 Issue 12 (December 2024).

PUBLICATION DATES:
1) Last Date of Submission : 26 December 2024 .
2) Article published within a week.
3) Submit Article : editor@ijmra.in or Online

Why with us

International Journal of Multidisciplinary Research and Analysis is better then other journals because:-
1 : IJMRA only accepts original and high quality research and technical papers.
2 : Paper will publish immediately in current issue after registration.
3 : Authors can download their full papers at any time with digital certificate.

The Editors reserve the right to reject papers without sending them out for review.

Authors should prepare their manuscripts according to the instructions given in the authors' guidelines. Manuscripts which do not conform to the format and style of the Journal may be returned to the authors for revision or rejected. The Journal reserves the right to make any further formal changes and language corrections necessary in a manuscript accepted for publication so that it conforms to the formatting requirements of the Journal.

Indexed In
Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar Avatar