Edge Computing and Cloud Computing for Internet of Things: A Review
Abstract
:1. Introduction
- We analyze both edge and cloud computing in a comprehensive manner, focusing on their advantages and disadvantages, and the possibility of using hybrid architectures.
- We focus on privacy and optimization techniques, to ensure a consistent workflow in IoT ecosystems.
- We discuss the implications of these technologies in different use cases, from resource management to security to healthcare.
2. Related Work
3. Research Methodology
- RQ1
- How has the topic of edge computing developed concerning the interaction with IoT devices in 2022 and 2023?
- RQ2
- What are the research topics developed on the topic of edge computing concerning the interaction with IoT devices?
- RQ3
- What data analysis paradigms has edge computing enabled?
- RQ4
- How has edge computing improved privacy?
- RQ5
- What are the disadvantages of decentralization related to edge computing?
- RQ6
- Which processing architectures are used in the IoT context and in what form?
“edge computing” AND (IoT OR “Internet Of Things”) AND (techniques OR technics) AND (“data analysis” OR privacy).
3.1. Selection Criteria
- Inclusion—publication year: 2022 or 2023;
- Inclusion—publication language: English;
- Inclusion—publication topic: relevance to the topic of the review;
- Exclusion—publication type: secondary work (review, survey, and tutorial);
- Exclusion—inaccessibility: pay-walled articles.
- Identification;
- Screening;
- Inclusion.
3.2. Classification Schema
4. Results
4.1. Organization of the Systematic Review
4.2. Bibliometric Analysis
4.3. Keyword Analysis
4.4. Problems and Use Cases
4.4.1. Security and Safety
4.4.2. Resource Management
4.4.3. Healthcare
4.5. Data Analysis
- Federated learning algorithms allow for distributed training. Each node trains the model using locally available data. No user data are exchanged between the nodes or the cloud; this allows for better privacy control. On top of this implicit privacy benefit, it is also possible to implement specific privacy-preserving techniques, e.g., differential privacy [41]. The overall model is built by merging the parts of the different edge nodes, thus sharing only model weights with the central server [42]. Privacy-preserving techniques (e.g., homomorphic encryption) are also applicable to this part of the process. It is also possible to obtain optimized models for individual edge nodes by appropriately calibrating the parameters of the overall model, which guarantees better results during processing based on the data analyzed by the specific node [43]. The use of federated learning enables the processing of big data while protecting the user’s privacy [44]. It is also applicable to the healthcare sector for facilitating smart and privacy-oriented medical services [45].
- Traditional machine learning techniques are based on centralized processing, which therefore requires transferring data (both training data and the data actually to be analyzed) to the cloud. This introduces concerns for privacy, network load, latency, and separation of processing from the data source [6]. If an edge layer is added to the processing architecture, it is possible to take advantage of the distributed techniques which, at the expense of a lower analysis accuracy (due to the more limited calculation capabilities), limit the aforementioned concerns (since data processing takes place locally) [8]. Possible applications of these distributed techniques are computer vision-related applications, like the ones described in [46,47]. Not only does the utilization phase of a machine learning algorithm change in a distributed environment but also the training phase can differ: Distributed learning splits the model into smaller submodels (with fewer parameters) and trains each submodel in parallel on different nodes, whereas decentralized learning replicates the entire model on each node and trains it with the locally available data [48].
4.6. Privacy
4.7. Computing Architecture
4.7.1. Advantages and Disadvantages of Cloud and Edge
- IaaS (Infrastructure as a Service): This enables the rental of a virtual machine type infrastructure (VPS—Virtual Private Server) useful for installing software such as databases, web servers, and DNS (Domain Name Service) but requires knowledge of system administration.
- SaaS (Software as a Service ): This is one of the most widespread forms of cloud solutions. The provider offers software to carry out a specific activity, and the customer does not have to worry about the implementation or the hardware/software maintenance of the system (including bug fixing and security problems of the environment). To communicate with the SaaS, it is possible to use API (Application Programming Interface), and this allows us to take advantage of software that is very complex to create, reducing development times and costs. In particular, SaaS can often be purchased with pay-as-you-go solutions, which greatly reduce the initial investment [62].
- NaaS (Network as a Service): This allows the network to be rented flexibly based on user needs. NaaS offers significantly extended transmission bandwidth but has above-average latency.
- +
- Processing closer to the data source;
- +
- Greater attention to privacy: Edge nodes can act as an intermediary layer between IoT devices and the cloud. This positioning allows for data filtering and anonymization at the edge, potentially improving data privacy;
- +
- Low network load: By processing data locally, edge computing reduces the amount of information that needs to be transmitted over the network. This translates to lower bandwidth consumption;
- +
- Reduced network latency: By processing data closer to the source, edge computing significantly reduces network latency. This translates to quicker response times and real-time decision-making capabilities, crucial for applications like autonomous vehicles or industrial automation;
- -
- Higher costs: Depending on the deployment model, edge computing can involve higher initial costs compared to traditional cloud-based solutions. On-premise deployments, for example, require investment in hardware, software licenses, and additional IT staff for maintenance;
- -
- Limited computing capabilities: Edge devices typically have less processing power compared to large cloud data centers;
- -
- Worse machine learning model execution: Their limited computing capabilities make them less suitable for tasks requiring significant computational resources, such as training large machine learning models;
- -
- Difficult scalability: Scaling edge computing infrastructure can be more complex compared to cloud deployments. Adding new devices or increasing processing demands might require additional hardware installations, which can be time-consuming and resource-intensive.
- +
- More Power: cloud servers typically have more processing power compared to edge devices;
- +
- Scalability: cloud providers offer on-demand resources, allowing users to easily scale their computing power and memory up or down as needed;
- +
- Maintenance paid by the provider;
- +
- Lower initial investments: cloud computing typically requires lower upfront investments compared to on-premise solutions. Users pay only for the resources they use;
- -
- Higher network Latency: by processing data further to the source, cloud computing increases network latency;
- -
- Reduced Privacy: Data security is a significant concern for some users, as data reside on servers managed by a third-party provider. However, there are several options to help maintain the privacy of the user like encryption and access controls;
- -
- Limited to a few big players;
- -
- Restricted to Internet access: unlike edge computing, which can be hosted on-premises, cloud computing relies on a stable Internet connection. Disruptions or outages can impact accessibility and application performance.
4.7.2. Hybrid Architectures
5. Discussion
- RQ1
- How did the topic of edge computing develop concerning the interaction with IoT devices in 2022 and 2023?The publication distribution was substantially uniform throughout the considered time period. In 2023, compared to 2022, we observed an increase in papers related to the following topics: healthcare, fog computing, and blockchain. At the same time, we observed a decrease in studies related to homomorphic encryption.
- RQ2
- What are the research topics developed on the topic of edge computing concerning the interaction with IoT devices?The most notable topics related to edge computing and IoT in the analyzed papers are security and safety, optimization, energy, and healthcare. These topics were analyzed through different perspectives: data analysis, privacy, and computing architecture.
- RQ3
- What data analysis paradigms has edge computing enabled?The adoption of hybrid cloud–edge architectures has contributed to the development of innovative data analysis paradigms that move processing from the cloud to the local device architecture: federated learning, distributed learning, and decentralized learning.
- RQ4
- How has edge computing improved privacy?Edge computing improves user privacy in several ways. Firstly, it reduces data transmission by processing data locally on edge devices. Fewer data need to be sent to the cloud, minimizing the risk of interception or unauthorized access. Secondly, edge computing enables on-device processing, allowing sensitive information to be filtered or anonymized before transmission, and protecting user privacy. Additionally, edge computing facilitates decentralized data storage, thus reducing reliance on centralized cloud storage systems that might be more susceptible to large-scale data breaches.
- RQ5
- What are the disadvantages of decentralization related to edge computing?Decentralization in edge computing brings several challenges. Firstly, edge devices have less computational power compared to the cloud, which makes it more difficult to train and run complex machine learning models locally. Secondly, deploying and managing a large number of geographically dispersed edge devices can incur higher initial costs and ongoing maintenance compared to cloud computing. Finally, the distributed nature of edge computing can make it challenging to scale resources as processing demands increase.
- RQ6
- Which processing architectures are used in the IoT context and in what form?The Internet of Things (IoT) relies on different processing architectures to handle data, each suited for specific application needs. Cloud architectures are used when it is necessary to analyze a large volume of data from far locations. Conversely, edge computing brings processing closer to the data source, enabling real-time analytics, reduced latency, and improved privacy, making it suitable for applications requiring fast responses and having access to limited Internet connectivity. Hybrid architectures are the most used systems because they allow the user to take advantage of both cloud and edge features. For example, fog computing is an architecture that extends cloud services to the edge of the network. This is achieved by utilizing edge computers to aggregate, pre-process, and analyze data from connected devices before sending them to the cloud for more complex elaborations.
Limitations of the Approach
6. Conclusions
- Edge computing is essential for low-latency, privacy-sensitive applications but requires further optimization for large-scale deployment, particularly in load balancing and resource management.
- Cloud computing remains valuable for its scalability and lower initial costs, though privacy concerns persist due to the need for full data transmission to third-party servers.
- Hybrid architectures represent a promising future direction for IoT applications, combining the computational power of the cloud with the privacy and low-latency benefits of edge computing. These architectures are particularly effective in sectors like healthcare and security, where privacy and real-time processing are critical.
Author Contributions
Funding
Conflicts of Interest
Abbreviations
IoT | Internet of Things |
PRISMA | Preferred Reporting Items for Systematic Reviews and Meta-Analyses |
PICO | Population, Intervention, Comparison, Outcome |
References
- Luu, S.; Ravindran, A.; Pazho, A.D.; Tabkhi, H. VEI: A multicloud edge gateway for computer vision in IoT. In Proceedings of the 1st Workshop on Middleware for the Edge, Quebec, QC, Canada, 7 November 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 6–11. [Google Scholar] [CrossRef]
- Mahmoud, M.; Ashraf Ateya, A.; Muthanna, A.; Zaghloul, A.; Kirichek, R.; Koucheryavy, A. Distributed Edge Computing to Assist LPWAN: Fog-MEC Model. In Proceedings of the the 5th International Conference on Future Networks & Distributed Systems, Dubai, United Arab Emirates, 15–16 December 2021; Association for Computing Machinery: New York, NY, USA, 2022; pp. 587–594. [Google Scholar] [CrossRef]
- Serena, L.; Zichichi, M.; D’Angelo, G.; Ferretti, S. Simulation of hybrid edge computing architectures. In Proceedings of the 2021 IEEE/ACM 25th International Symposium on Distributed Simulation and Real Time Applications, Valencia, Spain, 27–28 September 2021; IEEE Press: Piscataway, NJ, USA, 2022; pp. 1–8. [Google Scholar] [CrossRef]
- Tianqing, Z.; Zhou, W.; Ye, D.; Cheng, Z.; Li, J. Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning. IEEE Internet Things J. 2022, 9, 1414–1426. [Google Scholar] [CrossRef]
- Qian, W.; Coutinho, R.W.L. Performance Evaluation of Edge Computing-Aided IoT Augmented Reality Systems. In Proceedings of the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada, 24–28 October 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 79–86. [Google Scholar] [CrossRef]
- Gutierrez-Torre, A.; Bahadori, K.; Baig, S.U.R.; Iqbal, W.; Vardanega, T.; Berral, J.L.; Carrera, D. Automatic Distributed Deep Learning Using Resource-Constrained Edge Devices. IEEE Internet Things J. 2022, 9, 15018–15029. [Google Scholar] [CrossRef]
- Shin, H.; Koo, D.; Hur, J. Secure and Efficient Hybrid Data Deduplication in Edge Computing. ACM Trans. Internet Technol. 2022, 22, 80:1–80:25. [Google Scholar] [CrossRef]
- Gómez-Carmona, O.; Casado-Mansilla, D.; López-de Ipiña, D.; García-Zubia, J. Optimizing Computational Resources for Edge Intelligence Through Model Cascade Strategies. IEEE Internet Things J. 2022, 9, 7404–7417. [Google Scholar] [CrossRef]
- Raghavendar, K.; Batra, I.; Malik, A. A robust resource allocation model for optimizing data skew and consumption rate in cloud-based IoT environments. Decis. Anal. J. 2023, 7, 100200. [Google Scholar] [CrossRef]
- Foko Sindjoung, M.L.; Velempini, M.; Tayou Djamegni, C. A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network. Array 2023, 19, 100304. [Google Scholar] [CrossRef]
- Zhou, J.; Kondo, M. An Edge-Cloud Collaboration Framework for Graph Processing in Smart Society. IEEE Trans. Emerg. Top. Comput. 2023, 11, 985–1001. [Google Scholar] [CrossRef]
- Ali, O.; Ishak, M.K.; Bhatti, M.K.L.; Khan, I.; Kim, K.I. A Comprehensive Review of Internet of Things: Technology Stack, Middlewares, and Fog/Edge Computing Interface. Sensors 2022, 22, 995. [Google Scholar] [CrossRef] [PubMed]
- Apat, H.K.; Nayak, R.; Sahoo, B. A comprehensive review on Internet of Things application placement in Fog computing environment. Internet Things 2023, 23, 100866. [Google Scholar] [CrossRef]
- Sabireen, H.; Neelanarayanan, V. A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ICT Express 2021, 7, 162–176. [Google Scholar] [CrossRef]
- Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutor. 2020, 22, 2489–2520. [Google Scholar] [CrossRef]
- Iftikhar, S.; Gill, S.S.; Song, C.; Xu, M.; Aslanpour, M.S.; Toosi, A.N.; Du, J.; Wu, H.; Ghosh, S.; Chowdhury, D.; et al. AI-based fog and edge computing: A systematic review, taxonomy and future directions. Internet Things 2023, 21, 100674. [Google Scholar] [CrossRef]
- Lu, S.; Lu, J.; An, K.; Wang, X.; He, Q. Edge Computing on IoT for Machine Signal Processing and Fault Diagnosis: A Review. IEEE Internet Things J. 2023, 10, 11093–11116. [Google Scholar] [CrossRef]
- Amin, S.U.; Hossain, M.S. Edge Intelligence and Internet of Things in Healthcare: A Survey. IEEE Access 2021, 9, 45–59. [Google Scholar] [CrossRef]
- Hamdan, S.; Ayyash, M.; Almajali, S. Edge-Computing Architectures for Internet of Things Applications: A Survey. Sensors 2020, 20, 6441. [Google Scholar] [CrossRef]
- Srirama, S.N. A decade of research in fog computing: Relevance, challenges, and future directions. Softw. Pract. Exp. 2024, 54, 3–23. [Google Scholar] [CrossRef]
- Al-Shareeda, M.A.; Alsadhan, A.A.; Qasim, H.H.; Manickam, S. The fog computing for internet of things: Review, characteristics and challenges, and open issues. Bull. Electr. Eng. Inform. 2024, 13, 1080–1089. [Google Scholar] [CrossRef]
- Sharma, M.; Tomar, A.; Hazra, A. Edge computing for industry 5.0: Fundamental, applications and research challenges. IEEE Internet Things J. 2024, 99, 19070–19093. [Google Scholar] [CrossRef]
- Primya, T.; Swetha, M.; Ramya, V.; Taanusri, S.R.; Ridhanya, G.; Sekar, R.A. Data sharing in Cloud-Assisted IoT. In Proceedings of the 2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM), Chennai, India, 6–7 April 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Yang, X.; Yi, X.; Khalil, I.; Luo, J.; Bertino, E.; Nepal, S.; Huang, X. Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 2022, 9, 12563–12572. [Google Scholar] [CrossRef]
- Datiri, D.D.; Li, M. A Cluster enabled Blockchain-based Data management for IoT systems. In Proceedings of the 2023 24th International Carpathian Control Conference (ICCC), Miskolc-Szilvasvarad, Hungary, 12–14 June 2023; pp. 88–92. [Google Scholar] [CrossRef]
- Salama, A.; Stergioulis, A.; Zaidi, S.A.R.; McLernon, D. Decentralized Federated Learning on the Edge Over Wireless Mesh Networks. IEEE Access 2023, 11, 124709–124724. [Google Scholar] [CrossRef]
- Huang, J.; Wang, M.; Wu, Y.; Chen, Y.; Shen, X. Distributed Offloading in Overlapping Areas of Mobile-Edge Computing for Internet of Things. IEEE Internet Things J. 2022, 9, 13837–13847. [Google Scholar] [CrossRef]
- Hu, H.; Zhou, X.; Wang, Q.; Hu, R.Q. Online computation offloading and trajectory scheduling for UAV-enabled wireless powered mobile edge computing. China Commun. 2022, 19, 257–273. [Google Scholar] [CrossRef]
- Irtija, N.; Anagnostopoulos, I.; Zervakis, G.; Tsiropoulou, E.E.; Amrouch, H.; Henkel, J. Energy Efficient Edge Computing Enabled by Satisfaction Games and Approximate Computing. IEEE Trans. Green Commun. Netw. 2022, 6, 281–294. [Google Scholar] [CrossRef]
- Tang, J.; Wu, G.; Jalalzai, M.M.; Wang, L.; Zhang, B.; Zhou, Y. Energy-optimal DNN model placement in UAV-enabled edge computing networks. Digit. Commun. Netw. 2023, 10, 827–836. [Google Scholar] [CrossRef]
- Li, J.; Yang, Z.; Wang, X.; Xia, Y.; Ni, S. Task offloading mechanism based on federated reinforcement learning in mobile edge computing. Digit. Commun. Netw. 2023, 9, 492–504. [Google Scholar] [CrossRef]
- Sahoo, S.; Sahoo, K.S.; Sahoo, B.; Gandomi, A.H. A learning automata based edge resource allocation approach for IoT-enabled smart cities. Digit. Commun. Netw. 2023, in press. [Google Scholar] [CrossRef]
- Feng, H.; Qiao, L.; Lv, Z. Innovative soft computing-enabled cloud optimization for next-generation IoT in digital twins. Appl. Soft Comput. 2023, 136, 110082. [Google Scholar] [CrossRef]
- Moparthi, N.R.; Balakrishna, G.; Chithaluru, P.; Kolla, M.; Kumar, M. An improved energy-efficient cloud-optimized load-balancing for IoT frameworks. Heliyon 2023, 9, e21947. [Google Scholar] [CrossRef] [PubMed]
- Ahmed, M.; Alshahrani, H.M.; Alruwais, N.; Asiri, M.M.; Duhayyim, M.A.; Khan, W.U.; Khurshaid, T.; Nauman, A. Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 101646. [Google Scholar] [CrossRef]
- Panda, S.K.; Lin, M.; Zhou, T. Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing. IEEE Internet Things J. 2023, 10, 6611–6621. [Google Scholar] [CrossRef]
- Truong, V.T.; Ha, D.B.; Nayyar, A.; Bilal, M.; Kwak, D. Performance analysis and optimization of multiple IIoT devices radio frequency energy harvesting NOMA mobile edge computing networks. Alex. Eng. J. 2023, 79, 1–20. [Google Scholar] [CrossRef]
- Gupta, P.; Chouhan, A.V.; Wajeed, M.A.; Tiwari, S.; Bist, A.S.; Puri, S.C. Prediction of health monitoring with deep learning using edge computing. Meas. Sensors 2023, 25, 100604. [Google Scholar] [CrossRef]
- Li, H.; Shou, G.; Hu, Y.; Guo, Z. Mobile edge computing: Progress and challenges. In Proceedings of the 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 29 March–1 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 83–84. [Google Scholar]
- Gupta, D.; Rani, S.; Raza, S.; Faseeh Qureshi, N.M.; Mansour, R.F.; Ragab, M. Security paradigm for remote health monitoring edge devices in internet of things. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101478. [Google Scholar] [CrossRef]
- Wang, B.; Chen, Y.; Jiang, H.; Zhao, Z. PPeFL: Privacy-Preserving Edge Federated Learning With Local Differential Privacy. IEEE Internet Things J. 2023, 10, 15488–15500. [Google Scholar] [CrossRef]
- García Santaclara, P.; Fernández Vilas, A.; Díaz Redondo, R.P. Prototype of deployment of Federated Learning with IoT devices. In Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks, Montréal, QC, Canada, 24–28 October 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 9–16. [Google Scholar] [CrossRef]
- Zhou, X.; Jia, Q.; Xie, R. NestFL: Efficient federated learning through progressive model pruning in heterogeneous edge computing. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, Sydney, Australia 17–21 October 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 817–819. [Google Scholar] [CrossRef]
- Zhang, J.; Liu, Y.; Wu, D.; Lou, S.; Chen, B.; Yu, S. VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems. Digit. Commun. Netw. 2023, 9, 981–989. [Google Scholar] [CrossRef]
- Rajagopal, S.M.; Supriya, M.; Buyya, R. FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge–Fog–Cloud computing environments. Internet Things 2023, 22, 100784. [Google Scholar] [CrossRef]
- Carro-Lagoa, Á.; Barral, V.; González-López, M.; Escudero, C.J.; Castedo, L. Multicamera edge-computing system for persons indoor location and tracking. Internet Things 2023, 24, 100940. [Google Scholar] [CrossRef]
- Zhang, L.; Xin, Y.; Zhang, L. Pedestrian recognition method based on Jetson nano. In Proceedings of the 2023 7th International Conference on Big Data and Internet of Things, Beijing, China, 11–13 August 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 93–97. [Google Scholar] [CrossRef]
- Banabilah, S.; Aloqaily, M.; Alsayed, E.; Malik, N.; Jararweh, Y. Federated learning review: Fundamentals, enabling technologies, and future applications. Inf. Process. Manag. 2022, 59, 103061. [Google Scholar] [CrossRef]
- Zheng, X.; Tian, L.; Hui, B.; Liu, X. Distributed and Privacy Preserving Graph Data Collection in Internet of Thing Systems. IEEE Internet Things J. 2022, 9, 9301–9309. [Google Scholar] [CrossRef]
- Du, X.; Tang, S.; Lu, Z.; Gai, K.; Wu, J.; Hung, P.C.K. Scientific Workflows in IoT Environments: A Data Placement Strategy Based on Heterogeneous Edge-Cloud Computing. ACM Trans. Manag. Inf. Syst. 2022, 13, 42:1–42:26. [Google Scholar] [CrossRef]
- Yang, L.; Liao, Y.; Cheng, X.; Xia, M.; Xie, G. Efficient Edge Data Management Framework for IIoT via Prediction-Based Data Reduction. IEEE Trans. Parallel Distrib. Syst. 2023, 34, 3309–3322. [Google Scholar] [CrossRef]
- Shi, T.; Cai, Z.; Li, Y. Query Recombination: To Process a Large Number of Concurrent Top-k Queries towards IoT Data on an Edge Server. In Proceedings of the 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), Bologna, Italy, 10–13 July 2022; pp. 559–569. [Google Scholar] [CrossRef]
- Zhou, L.; Liu, J. IOT Data Storage Solution Based on Hybrid Blockchain Edge Architecture. In Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, 24–26 September 2021; Association for Computing Machinery: New York, NY, USA, 2022; pp. 466–471. [Google Scholar] [CrossRef]
- Tan, H. An efficient IoT group association and data sharing mechanism in edge computing paradigm. Cyber Secur. Appl. 2023, 1, 100003. [Google Scholar] [CrossRef]
- Tlemçani, K.; Jai Andaloussi, S.; Azbeg, K.; Ouchetto, O.; Fetjah, L. An Advanced IoT-Based Architecture for Healthcare Systems: A Focus on Blockchain-based Edge Computing for Diabetes Management. In Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache, Morocco, 24–26 May 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 1–7. [Google Scholar] [CrossRef]
- Xu, X.; Liu, W.; Zhang, Y.; Zhang, X.; Dou, W.; Qi, L.; Bhuiyan, M.Z.A. PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing. ACM Trans. Intell. Syst. Technol. 2022, 13, 70:1–70:22. [Google Scholar] [CrossRef]
- Peng, C.; Luo, M.; Wang, H.; Khan, M.K.; He, D. An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 2022, 9, 589–600. [Google Scholar] [CrossRef]
- Sun, Y.; Yang, Y. Gradient Privacy-Preserving In Federated Learning via Proxy Re-Encryption. In Proceedings of the 2022 the 5th International Conference on Information Science and Systems, Beijing, China, 26–28 August 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 100–106. [Google Scholar] [CrossRef]
- Aloufi, R.; Haddadi, H.; Boyle, D. Paralinguistic Privacy Protection at the Edge. ACM Trans. Priv. Secur. 2022, 26, 1–27. [Google Scholar] [CrossRef]
- Acostsa, L.H.; Reinhardt, D. Multi-User Privacy with Voice-Controlled Digital Assistants. In Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Virtual, 21–25 March 2022; pp. 30–33. [Google Scholar] [CrossRef]
- Rawat, P.; Kumar, P. Blockchain based Federated Deep Learning Framework for Malware Attacks Detection in IoT Devices. In Proceedings of the 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–10, ISSN: 2473-7674. [Google Scholar] [CrossRef]
- Zakarya, M.; Gillam, L.; Ali, H.; Rahman, I.U.; Salah, K.; Khan, R.; Rana, O.; Buyya, R. epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing. IEEE Trans. Serv. Comput. 2022, 15, 1634–1648. [Google Scholar] [CrossRef]
- Carlini, E.; Kavalionak, H.; Dazzi, P.; Ferrucci, L.; Coppola, M.; Mordacchini, M. Network Measurements with Function-as-a-Service for Distributed Low-latency Edge Applications. In Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, Minneapolis, MN, USA, 1 July 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 25–28. [Google Scholar] [CrossRef]
- Majjari, S.; Anne, K.R.; George, J. Deep Reinforcement Learning (DRL) based data analytics framework for Edge based IoT devices latency and resource optimization. In Proceedings of the 2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), Ernakulam, India, 18–20 May 2023; pp. 137–142. [Google Scholar] [CrossRef]
- Ma, H.; Huang, P.; Zhou, Z.; Zhang, X.; Chen, X. GreenEdge: Joint Green Energy Scheduling and Dynamic Task Offloading in Multi-Tier Edge Computing Systems. IEEE Trans. Veh. Technol. 2022, 71, 4322–4335. [Google Scholar] [CrossRef]
- Zhou, R.; Zhang, R.; Wang, Y.; Tan, H.; He, K. Online incentive mechanism for task offloading with privacy-preserving in UAV-assisted mobile edge computing. In Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, 17–20 October 2022; Association for Computing Machinery: New York, NY, USA, 2022; pp. 211–220. [Google Scholar] [CrossRef]
- Jeyaraj, R.; Balasubramaniam, A.; Kumara, A.; Guizani, N.; Paul, A. Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications. ACM Comput. Surv. 2023, 55, 242:1–242:37. [Google Scholar] [CrossRef]
- Gushev, M. Dew computing architecture for cyber-physical systems and IoT. Internet Things 2020, 11, 100186. [Google Scholar] [CrossRef]
- Ageed, Z.S.; Zeebaree, S.R.; Sadeeq, M.A.; Ibrahim, R.K.; Shukur, H.M.; Alkhayyat, A. Comprehensive study of moving from grid and cloud computing through fog and edge computing towards dew computing. In Proceedings of the 2021 IEEE 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA), Najaf, Iraq, 21–22 September 2021; pp. 68–74. [Google Scholar]
- Gusev, M. What makes Dew computing more than Edge computing for Internet of Things. In Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Virtual, 12–16 July 2021; pp. 1795–1800. [Google Scholar]
Ref. | Pub Year | Edge Computing | Cloud Computing | Hybrid Architecture | Privacy | Optimization |
---|---|---|---|---|---|---|
[12] | 2022 | ✓ | ✓ | ✓ | ||
[13] | 2023 | ✓ | ✓ | ✓ | ||
[14] | 2021 | ✓ | ✓ | ✓ | ✓ | |
[15] | 2020 | ✓ | ✓ | |||
[16] | 2023 | ✓ | ✓ | ✓ | ✓ | |
[17] | 2023 | ✓ | ✓ | ✓ | ✓ | |
[18] | 2021 | ✓ | ✓ | |||
[19] | 2020 | ✓ | ✓ | ✓ | ✓ | |
[20] | 2024 | ✓ | ✓ | |||
[21] | 2024 | ✓ | ✓ | ✓ | ✓ | |
[22] | 2024 | ✓ | ✓ | ✓ | ||
Our work | 2024 | ✓ | ✓ | ✓ | ✓ | ✓ |
Data | Description | RQ |
---|---|---|
Scope | Where has edge computing been applied? | RQ1 and RQ2 |
Analysis algorithms | How are IoT sensor data processed? | RQ3 |
Privacy | How is privacy protected? | RQ4 |
Cost analysis/benefits (edge computing) | Are the benefits of centralized computing greater than the costs? | RQ5 |
Other technologies | Which technologies are used alternatively? | RQ5 |
Cloud computing | When is it preferred in the IoT field? | RQ6 |
Advantages | Disadvantages |
---|---|
Processing closer to the data source | Higher costs |
Greater attention to privacy | Limited computing capabilities |
Low network load | Difficult scalability |
Reduced network latency | Worse machine learning model execution |
Hybrid cloud–edge solutions |
Advantages | Disadvantages |
---|---|
More Power | High Latency |
Scalability | Reduced Privacy |
Maintenance paid by the provider | Limited to a few big players |
Lower initial investments | Restricted to Internet access |
Hybrid cloud–edge solutions |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Andriulo, F.C.; Fiore, M.; Mongiello, M.; Traversa, E.; Zizzo, V. Edge Computing and Cloud Computing for Internet of Things: A Review. Informatics 2024, 11, 71. https://doi.org/10.3390/informatics11040071
Andriulo FC, Fiore M, Mongiello M, Traversa E, Zizzo V. Edge Computing and Cloud Computing for Internet of Things: A Review. Informatics. 2024; 11(4):71. https://doi.org/10.3390/informatics11040071
Chicago/Turabian StyleAndriulo, Francesco Cosimo, Marco Fiore, Marina Mongiello, Emanuele Traversa, and Vera Zizzo. 2024. "Edge Computing and Cloud Computing for Internet of Things: A Review" Informatics 11, no. 4: 71. https://doi.org/10.3390/informatics11040071
APA StyleAndriulo, F. C., Fiore, M., Mongiello, M., Traversa, E., & Zizzo, V. (2024). Edge Computing and Cloud Computing for Internet of Things: A Review. Informatics, 11(4), 71. https://doi.org/10.3390/informatics11040071