Emerging Trends of Fog Computing in Internet of Things Applications

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (20 September 2020) | Viewed by 14906

Special Issue Editors


E-Mail Website
Guest Editor
University of Southampton, School of Electronics and Computer Science, Southampton, UK
Interests: Internet of Things; blockchain; security; data protection; cloud computing
Special Issues, Collections and Topics in MDPI journals
School of Electronic and Computer Science, University of Southampton, University Road, Highfield Campus, Southampton SO17 1BJ, UK
Interests: internet of things (IoT); IoT security; IoT privacy; blockchain; digital forensics; information retrieval; big data; artificial intelligence with security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
University of Southampton, Southampton SO17 1BJ, United Kingdom
Interests: parallel computing; digital forensics; cloud forensics; cloud security; Internet of Things (IoT) forensics; IoT security, blockchain and big data
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is one of the spotlight innovations which has the potential to provide unlimited benefits to our society. With the rapid growth of IoT applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices by providing data processing capabilities and storage locally on fog nodes instead of sending them to the cloud. The integration of fog computing with the IoT creates a new opportunity for various applications and services. The fog supports real-time interactions between IoT devices to reduce latency, especially for time-sensitive IoT applications. In addition, one of the important features of fog computing is the ability to support large-scale sensor networks, which is a big problem with the ever-growing number of IoT devices. The purpose of this special issue is to provide the academic and industrial communities with an excellent venue covering all aspects of current work on emerging trends of fog computing in IoT applications.

Potential topics include but are not limited to the following:

  • New computing technologies related to Fog-based IoT applications
  • Fog-based case studies on IoT applications
  • Network architecture of fog computing in IoT applications
  • Integrated communication and computing design for fog computing-based IoT
  • Theoretical foundation and models for fog/edge computing-based IoT
  • Data analytics for fog computing-based IoT
  • Big data for fog computing-based IoT
  • Security and privacy in fog computing-based IoT
  • Machine learning for fog computing-based IoT
  • Communication protocols for fog computing-based IoT
  • Vehicular fog computing
  • Fog computing as an enabler for 5G
  • Artificial Intelligence with Fog in IoT
  • Fog-enabled social networks of IoT devices
  • Energy efficient solutions for fog computing

Prof. Dr. Gary Wills
Dr. Hany Atlam
Dr. Ahmed Alenezi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Fog Computing
  • Internet of Thing
  • Security of IoT
  • Edge Computing
  • Computing Technologies
  • Fog Computing with IoT
  • Fog as a Service (FaaS)

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Review

28 pages, 9493 KiB  
Review
Fog Computing for Smart Cities’ Big Data Management and Analytics: A Review
by Elarbi Badidi, Zineb Mahrez and Essaid Sabir
Future Internet 2020, 12(11), 190; https://doi.org/10.3390/fi12110190 - 31 Oct 2020
Cited by 53 | Viewed by 6923
Abstract
Demographic growth in urban areas means that modern cities face challenges in ensuring a steady supply of water and electricity, smart transport, livable space, better health services, and citizens’ safety. Advances in sensing, communication, and digital technologies promise to mitigate these challenges. Hence, [...] Read more.
Demographic growth in urban areas means that modern cities face challenges in ensuring a steady supply of water and electricity, smart transport, livable space, better health services, and citizens’ safety. Advances in sensing, communication, and digital technologies promise to mitigate these challenges. Hence, many smart cities have taken a new step in moving away from internal information technology (IT) infrastructure to utility-supplied IT delivered over the Internet. The benefit of this move is to manage the vast amounts of data generated by the various city systems, including water and electricity systems, the waste management system, transportation system, public space management systems, health and education systems, and many more. Furthermore, many smart city applications are time-sensitive and need to quickly analyze data to react promptly to the various events occurring in a city. The new and emerging paradigms of edge and fog computing promise to address big data storage and analysis in the field of smart cities. Here, we review existing service delivery models in smart cities and present our perspective on adopting these two emerging paradigms. We specifically describe the design of a fog-based data pipeline to address the issues of latency and network bandwidth required by time-sensitive smart city applications. Full article
(This article belongs to the Special Issue Emerging Trends of Fog Computing in Internet of Things Applications)
Show Figures

Figure 1

24 pages, 2385 KiB  
Review
Risk-Based Access Control Model: A Systematic Literature Review
by Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi and Ahmed Alenezi
Future Internet 2020, 12(6), 103; https://doi.org/10.3390/fi12060103 - 11 Jun 2020
Cited by 28 | Viewed by 6910
Abstract
Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic systems such as the Internet of Things [...] Read more.
Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic systems such as the Internet of Things (IoT) with billions of things that are distributed everywhere, these access control models are obsolete. Hence, dynamic access control models are required. These models utilize not only access policies but also contextual and real-time information to determine the access decision. One of these dynamic models is the risk-based access control model. This model estimates the security risk value related to the access request dynamically to determine the access decision. Recently, the risk-based access control model has attracted the attention of several organizations and researchers to provide more flexibility in accessing system resources. Therefore, this paper provides a systematic review and examination of the state-of-the-art of the risk-based access control model to provide a detailed understanding of the topic. Based on the selected search strategy, 44 articles (of 1044 articles) were chosen for a closer examination. Out of these articles, the contributions of the selected articles were summarized. In addition, the risk factors used to build the risk-based access control model were extracted and analyzed. Besides, the risk estimation techniques used to evaluate the risks of access control operations were identified. Full article
(This article belongs to the Special Issue Emerging Trends of Fog Computing in Internet of Things Applications)
Show Figures

Figure 1

Back to TopTop