Article
Chemistry, Analytical
Jakub Jalowiczor, Jan Rozhon, Miroslav Voznak
Summary: IoT technologies are increasingly affecting daily life, with a growing demand for speed and data volume. Fog computing paradigm addresses cloud computing inefficiencies by providing data processing closer to end devices. This paper proposes three network architectures adopting fog computing for LoRaWAN and compares them through simulations to select the optimal form.
Article
Automation & Control Systems
Abid Khan, Sadia Din, Gwanggil Jeon, Francesco Piccialli
Summary: The article discusses the importance of cloud storage reliability in the Industrial Internet of Things and the effectiveness of using a multi-agent approach to address the geolocation assurance problem of outsourced data.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Theory & Methods
Elias Del-Pozo-Punal, Felix Garcia-Carballeira, Diego Camarmas-Alonso
Summary: In recent years, the number and complexity of IoT devices have increased as different layers of network computing have emerged. To build these infrastructures and reduce cost, simulation platforms are needed to model and analyze their behavior beforehand. ENIGMA is a scalable simulator that efficiently simulates Edge, Fog, and Cloud computing infrastructures and analyzes various characteristics.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Review
Computer Science, Information Systems
Mohammed Laroui, Boubakr Nour, Hassine Moungla, Moussa A. Cherif, Hossam Afifi, Mohsen Guizani
Summary: The Internet of Things (IoT) enables communication between devices and digital assets over a network without human intervention. Traditional cloud computing is not efficient in analyzing large amounts of data quickly, prompting the proposal of edge computing to decentralize data processing to solve this issue. Edge computing supports IoT applications requiring quick response times, leading to improved energy consumption and resource utilization.
COMPUTER COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Yongqiang Zhang, Hongchang Yu, Wanzhen Zhou, Menghua Man
Summary: Edge computing is deployed at the edge of the network to provide intelligent services for IoT application scenarios, with low bandwidth consumption, low latency, and high security. An IoT edge computing reference architecture is proposed, consisting of the end edge, network edge, and cloud edge layers. The key technologies of applying AI in the EC-IoT reference architecture are analyzed. Platforms for different edge locations are classified, and solutions for IIoT, IoV, and smart home based on the EC-IoT reference architecture are proposed. Finally, the trends and challenges of EC-IoT are examined, showing promising applications for the EC-IoT architecture.
Article
Computer Science, Information Systems
Hanlin Zhang, Le Tong, Jia Yu, Jie Lin
Summary: Bilinear pairing is a fundamental operation in cryptographic algorithms, but the existing secure outsourcing algorithms for bilinear pairing may not be suitable for resource-constrained IoT devices due to storage burden. The proposed algorithm in this article does not require precomputations, significantly improves efficiency, ensures privacy, and utilizes the Ethereum blockchain for fair payments. Theoretical analysis and experimental results demonstrate the efficiency and security of the proposed algorithm.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Theory & Methods
Yaru Liu, Jia Yu, Ming Yang, Wenqiang Hou, Huaqun Wang
Summary: With the deep integration of cloud computing and Internet of Things, privacy preserving keyword search techniques have gained importance. Forward security and verifiability are two important security properties for privacy preserving keyword search. This study proposes a scheme that simultaneously achieves forward security and full verification in protecting privacy for keyword search.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Artificial Intelligence
Vu Khanh Quy, Nguyen Van Hau, Dang Van Anh, Le Anh Ngoc
Summary: This article discusses the importance of healthcare applications in driving technological development, and explores the use of cloud, edge, and fog computing technologies in healthcare. Research findings indicate significant potential for Fog-based Healthcare IoT applications, presenting important implications for future development.
COMPLEX & INTELLIGENT SYSTEMS
(2022)
Article
Telecommunications
Muhammad Ali Naeem, Yousaf Bin Zikria, Rashid Ali, Usman Tariq, Yahui Meng, Ali Kashif Bashir
Summary: This paper comprehensively discusses fog computing, Internet of Things (IoTs), and the issues of data security and dissemination in fog computing. Various caching schemes are proposed to address the problems in fog computing, and machine learning-based approaches for cache security and management are explored, as well as potential future research directions.
DIGITAL COMMUNICATIONS AND NETWORKS
(2023)
Article
Computer Science, Information Systems
Bongjun Kim, Seonyeong Heo, Jaeho Lee, Shinnung Jeong, Yongwoo Lee, Hanjun Kim
Summary: SelectiveCrypt is a compiler-assisted semantic-aware encryption scheme that applies different cryptographic primitives based on data item operations to reduce computation and communication overhead for privacy data processing. Unlike homomorphic encryption, SelectiveCrypt automatically selects an appropriate encryption method based on data item operations, effectively reducing response time and communication overhead.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
David F. Parks, Kateryna Voitiuk, Jinghui Geng, Matthew A. T. Elliott, Matthew G. Keefe, Erik A. Jung, Ash Robbins, Pierre Baudin, Victoria T. Ly, Nico Hawthorne, Dylan Yong, Sebastian E. Sanso, Nick Rezaee, Jess L. Seveston, Spencer T. Seiler, Rob Currie, Alex A. Pollen, Keith B. Hengen, Tomasz J. Nowakowski, Mohammed A. Mostajo-Radji, Sofie R. Salama, Mircea Teodorescu, David Haussler
Summary: The Internet of Things (IoT) is widely used in technology companies but rarely in biology experiments. However, it can greatly benefit cloud biology research through alarm notifications, automation, and real-time monitoring of experiments.
INTERNET OF THINGS
(2022)
Review
Computer Science, Theory & Methods
Abdelghani Alidra, Hugo Bruneliere, Thomas Ledoux
Summary: This paper provides a detailed overview of the current state-of-the-art in terms of Fog modeling languages and proposes a corresponding set of open research challenges in this area. The work is expected to be helpful to both current and future researchers or engineers working on/with Fog systems, as well as to anybody genuinely interested in Fog Computing or more generally in distributed systems.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Artificial Intelligence
Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras
Summary: Cloud computing, edge computing, and Internet-of-Things have significantly impacted people's lives, but their security should not be taken for granted. These paradigms are constantly under attack, and the potential breaches can have severe consequences. This systematic review aims to analyze the overlap of attacks in cloud, edge, and IoT and provide solutions and countermeasures to enhance their security. It fills the gap by constructing a concise threat catalogue and offering a more universal approach to ensure the safety of the entire ecosystem.
Review
Computer Science, Interdisciplinary Applications
Rohit Kumar, Neha Agrawal
Summary: Cloud computing is transforming traditional computing methods through various forms and architectural types, such as Edge and Fog computing. These extensions of the basic cloud computing model promise improved network performance. Industrial applications rely on cloud resources to process a large volume of power-sensitive Industrial IoT (IIoT) data, which requires careful analysis to enhance system performance. This paper explores the Edge-Fog-Cloud architectural frameworks, compares their advantages and disadvantages, and delves into the scientific side of multi-dimensional IIoT data. It also highlights the current state-of-the-art and implementation challenges.
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION
(2023)
Article
Computer Science, Hardware & Architecture
Lionel Nkenyereye, JaeYoung Hwang, Quoc-Viet Pham, JaeSeung Song
Summary: The Internet of Things (IoT) has introduced advanced vertical use cases in many sectors managed by a cloud-based IoT service layer platform. To support latency-critical IoT services, an interworking architecture between the IoT service layer platform and Multi-Access Edge Computing (MEC) at the network edge is proposed, virtualizing required functions to edge nodes close to IoT devices. This architecture is designed based on global standards and aims to support interoperability of IoT platform and network functions on top of MEC-based systems.
Article
Computer Science, Interdisciplinary Applications
Andras Markus, Attila Kertesz
SIMULATION MODELLING PRACTICE AND THEORY
(2020)
Article
Computer Science, Information Systems
Hamza Baniata, Ahmad Anaqreh, Attila Kertesz
Summary: Cloud Computing (CC) deployment has become popular across various fields, and task scheduling in complex scenarios like smart cities is challenging, where Blockchain and Ant Colony Optimization can improve efficiency. Fog Computing further enhances task execution, while ensuring privacy of system components.
INFORMATION PROCESSING & MANAGEMENT
(2021)
Article
Computer Science, Artificial Intelligence
Hamza Baniata, Sami Mahmood, Attila Kertesz
Summary: The global average temperature increase is mainly due to greenhouse gas emissions, but waste heat emissions from cloud computing data centers are another contributing factor. Europe is particularly affected by the waste heat emissions. Future trends suggest that waste heat emissions from public cloud data centers are expected to further increase.
PEERJ COMPUTER SCIENCE
(2021)
Article
Computer Science, Artificial Intelligence
Hamza Baniata, Attila Kertesz
Summary: Developing successful Blockchain applications requires a lot of hard work and years of research. Although not yet standardized, Blockchain technology has shown potential for enhancing security, decentralization, and reliability. The integration of Blockchain and Fog computing technologies has great research and development potential, with organizations like Linux, IBM, Google, and Microsoft contributing to this field.
PEERJ COMPUTER SCIENCE
(2021)
Article
Energy & Fuels
Biswajeeban Mishra, Biswaranjan Mishra, Attila Kertesz
Summary: IoT protocols are crucial for M2M communication, with MQTT being a widely used low-resource-consuming messaging solution. This paper evaluated six MQTT broker implementations and found that Mosquitto performed the best in most metrics. ActiveMQ showed high scalability due to its multi-threaded implementation, while Bevywise had promising results for resource-constrained scenarios.
Editorial Material
Chemistry, Analytical
Peter Brida, Ondrej Krejcar, Ali Selamat, Attila Kertesz
Article
Computer Science, Artificial Intelligence
Andras Markus, Mate Biro, Gabor Kecskemeti, Attila Kertesz
Summary: The IoT-Fog-Cloud systems combine IoT, Cloud Computing, and Fog Computing, involving billions of smart devices, sensors, and actuators generating massive data requiring cloud and fog services for processing. An extension of the DISSECT-CF-Fog simulator has been developed to analyze the behavioral changes and mobility capabilities of IoT devices, evaluated through logistics and healthcare scenarios, showing successful modeling of IoMT systems and actuator behavior in IoT-Fog-Cloud systems.
PEERJ COMPUTER SCIENCE
(2021)
Article
Computer Science, Theory & Methods
Hamza Baniata, Ahmad Anaqreh, Attila Kertesz
Summary: This paper proposes a dynamic and optimized NS protocol called DONS, and addresses some issues with existing methods by using a privacy-aware leader election method called AnoLE. Experimental results show that the proposed protocol outperforms other methods in terms of NS solutions for public blockchains.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Chemistry, Multidisciplinary
Andras Markus, Mate Biro, Karolj Skala, Zorislav Sojat, Attila Kertesz
Summary: Fog computing extends the functionality of the cloud to limited computing units closer to user devices, providing effective solutions. This study introduces a Dew computing model into the DISSECT-CF-Fog simulator, enabling cost-effective simulation of IoT-Dew-Fog systems, with a focus on service migration options for mobile devices and cases with temporary internet access limitations.
APPLIED SCIENCES-BASEL
(2022)
Article
Chemistry, Analytical
Andras Markus, Ali Al-Haboobi, Gabor Kecskemeti, Attila Kertesz
Summary: This paper introduces a novel simulator extension of the DISSECT-CF-Fog simulator, which leverages the workflow scheduling and execution capabilities to model real-life IoT use cases. It also highlights that existing simulators often overlook the IoT factor in scientific workflow evaluation, hence conducting a scalability study focusing on scientific workflows and the interoperability of scientific and IoT workflows in DISSECT-CF-Fog.
Article
Computer Science, Information Systems
Hamza Baniata, Attila Kertesz
Summary: Blockchain technology was established in 2009 by Nakamoto, using Proof-of-Work for consensus in public permissionless networks. Despite alternative solutions with lower energy consumption and higher scalability, Nakamoto's model remains the most trusted due to its ability to tolerate a minority of malicious network control. This paper investigates Nakamoto's tolerance claim and reviews various approaches to undermine PoW-based blockchains, even with a minority of dishonest miners.
Article
Computer Science, Information Systems
Tamas Pflanzner, Hamza Baniata, Attila Kertesz
Summary: This research provides a detailed latency analysis of a permissioned blockchain system built with Indy and Aries. The experimental results show that the local Indy ledger performs reads and writes 30-50% and 65-85% faster than the Indy ledger running on the Google Cloud Platform, respectively.
Proceedings Paper
Computer Science, Theory & Methods
Attila Kertesz, Hamza Baniata
Summary: This paper addresses the reliability of fog-enhanced blockchain systems and proposes a reliable distributed ledger consistency assessment. By analyzing the forking phenomenon under different conditions, an inconsistency formula is derived to quantitatively describe the consistency of the distributed ledger in a blockchain system.
EURO-PAR 2021: PARALLEL PROCESSING WORKSHOPS
(2022)
Proceedings Paper
Computer Science, Artificial Intelligence
Andras Markus, Jozsef Daniel Dombi, Attila Kertesz
Summary: This study enhances and optimizes the simulation environment to provide a more detailed fog model for higher quality of service. By developing different task allocation strategies and using a fuzzy logic algorithm, it brings higher efficiency and flexibility to IoT-Fog-Cloud environments, effectively addressing changes in multiple system parameters.
2021 29TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2021)
(2021)
Proceedings Paper
Computer Science, Information Systems
Hamza Baniata., Wesam Almobaideen, Attila Kertesz
2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC)
(2020)