{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:20:53Z","timestamp":1775694053054,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T00:00:00Z","timestamp":1631923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s40860-021-00154-1","type":"journal-article","created":{"date-parts":[[2021,9,18]],"date-time":"2021-09-18T10:03:30Z","timestamp":1631959410000},"page":"227-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["A survey on reliability and availability modeling of edge, fog, and cloud computing"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4021-9069","authenticated-orcid":false,"given":"Paulo","family":"Maciel","sequence":"first","affiliation":[]},{"given":"Jamilson","family":"Dantas","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Melo","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Felipe","family":"Oliveira","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Araujo","sequence":"additional","affiliation":[]},{"given":"Rubens","family":"Matos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,18]]},"reference":[{"issue":"5","key":"154_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TDSC.2013.4","volume":"10","author":"B Addis","year":"2013","unstructured":"Addis B, Ardagna D, Panicucci B, Squillante MS, Zhang L (2013) A hierarchical approach for the resource management of very large cloud platforms. IEEE Trans Dependable Secure Comput 10(5):253\u2013272","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"154_CR2","first-page":"201","volume":"9","author":"M Ahmed","year":"2012","unstructured":"Ahmed M, Chowdhury ASMR, Ahme M, Rafee MMH (2012) An advanced survey on cloud computing and state-of-the-art research issues. Int J Comput Sci Issues (IJCSI) 9(1):201","journal-title":"Int J Comput Sci Issues (IJCSI)"},{"issue":"1","key":"154_CR3","first-page":"1","volume":"29","author":"E Andrade","year":"2020","unstructured":"Andrade E, Nogueira B, de Farias JI, Ara\u00fajo D (2020) Performance and availability trade-offs in fog-cloud iot environments. J Netw Syst Manag 29(1):1\u201327","journal-title":"J Netw Syst Manag"},{"key":"154_CR4","doi-asserted-by":"crossref","unstructured":"Angin P, Bhargava B, Jin Z (2015) A self-cloning agents based model for high-performance mobile-cloud computing. In: 2015 IEEE 8th international conference on cloud computing, IEEE, pp 301\u2013308","DOI":"10.1109\/CLOUD.2015.48"},{"key":"154_CR5","unstructured":"Ataie E, Entezari-Maleki R, Rashidi L, Trivedi KS, Ardagna D, Movaghar A (2017) Hierarchical stochastic models for performance, availability, and power consumption analysis of iaas clouds. IEEE Transactions on Cloud. Computing"},{"key":"154_CR6","unstructured":"Avizienis A, Laprie JC, Randell B (2001) Fundamental concepts of computer system dependability. In: Workshop on robot dependability: technological challenge of dependable robots in human environments, Citeseer, pp 1\u201316"},{"issue":"1","key":"154_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr CE (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Sec Comput 1(1):11\u201333","journal-title":"IEEE Trans Dependable Sec Comput"},{"key":"154_CR8","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp 13\u201316","DOI":"10.1145\/2342509.2342513"},{"key":"154_CR9","doi-asserted-by":"crossref","unstructured":"Boukerche A, Soto V (2020) An efficient mobility-oriented retrieval protocol for computation offloading in vehicular edge multi-access network. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2020.2991376"},{"issue":"4","key":"154_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCOM.2017.7901470","volume":"55","author":"M Chiang","year":"2017","unstructured":"Chiang M, Ha S, Chih-Lin I, Risso F, Zhang T (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Magn 55(4):18\u201320","journal-title":"IEEE Commun Magn"},{"key":"154_CR11","unstructured":"Consortium O et al (2017) Openfog reference architecture for fog computing. Architecture Working Group pp 1\u2013162"},{"key":"154_CR12","doi-asserted-by":"crossref","unstructured":"Dantas J, Matos R, Araujo J, Maciel P (2012) An availability model for eucalyptus platform: An analysis of warm-standy replication mechanism. In: 2012 IEEE international conference on Systems, man, and cybernetics (SMC), IEEE, pp 1664\u20131669","DOI":"10.1109\/ICSMC.2012.6377976"},{"issue":"11","key":"154_CR13","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1007\/s00607-015-0447-8","volume":"97","author":"J Dantas","year":"2015","unstructured":"Dantas J, Matos R, Araujo J, Maciel P (2015) Eucalyptus-based private clouds: availability modeling and comparison to the cost of a public cloud. Computing 97(11):1121\u20131140","journal-title":"Computing"},{"issue":"4","key":"154_CR14","first-page":"466","volume":"22","author":"J Dantas","year":"2020","unstructured":"Dantas J, Araujo E, Maciel P, Matos R, Teixeira J (2020) Estimating capacity-oriented availability in cloud systems. Int J Comput Sci Eng 22(4):466\u2013476","journal-title":"Int J Comput Sci Eng"},{"key":"154_CR15","doi-asserted-by":"crossref","unstructured":"Dastjerdi AV, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: Principles, architectures, and applications. In: Internet of things, Elsevier, pp 61\u201375","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"154_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.micpro.2019.05.011","volume":"70","author":"S Dehnavi","year":"2019","unstructured":"Dehnavi S, Faragardi HR, Kargahi M, Fahringer T (2019) A reliability-aware resource provisioning scheme for real-time industrial applications in a fog-integrated smart factory. Microprocess Microsyst 70:1\u201314","journal-title":"Microprocess Microsyst"},{"key":"154_CR17","doi-asserted-by":"crossref","unstructured":"Di\u00a0Mauro M, Galatro G, Longo M, Postiglione F, Tambasco M (2019) Ip multimedia subsystem in a containerized environment: availability and sensitivity evaluation. In: 2019 IEEE conference on network softwarization (NetSoft), IEEE, pp 42\u201347","DOI":"10.1109\/NETSOFT.2019.8806642"},{"key":"154_CR18","doi-asserted-by":"crossref","unstructured":"d\u2019Oro EC, Colombo S, Gribaudo M, Iacono M, Manca D, Piazzolla P (2019) Modeling and evaluating a complex edge computing based systems: an emergency management support system case study. Internet of Things 6:100054","DOI":"10.1016\/j.iot.2019.100054"},{"key":"154_CR19","unstructured":"Ericson CA, Ll C (1999) Fault tree analysis. System Safety Conference, Orlando, Florida 1:1\u20139"},{"issue":"12","key":"154_CR20","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1007\/s00607-019-00720-9","volume":"101","author":"E Ever","year":"2019","unstructured":"Ever E, Shah P, Mostarda L, Omondi F, Gemikonakli O (2019) On the performance, availability and energy consumption modelling of clustered iot systems. Computing 101(12):1935\u20131970","journal-title":"Computing"},{"issue":"3","key":"154_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s40860-019-00088-9","volume":"5","author":"D Facchinetti","year":"2019","unstructured":"Facchinetti D, Psaila G, Scandurra P (2019) Mobile cloud computing for indoor emergency response: the ipsos assistant case study. J Reliab Intell Environ 5(3):173\u2013191","journal-title":"J Reliab Intell Environ"},{"key":"154_CR22","doi-asserted-by":"publisher","first-page":"49474","DOI":"10.1109\/ACCESS.2019.2910932","volume":"7","author":"A Gamati\u00e9","year":"2019","unstructured":"Gamati\u00e9 A, Devic G, Sassatelli G, Bernabovi S, Naudin P, Chapman M (2019) Towards energy-efficient heterogeneous multicore architectures for edge computing. IEEE Access 7:49474\u201349491","journal-title":"IEEE Access"},{"key":"154_CR23","unstructured":"German R (2000) Performance analysis of communication systems - modelling with non-Markovian stochastic Petri nets. Wiley-Interscience series in systems and optimization, Wiley, Amsterdam"},{"issue":"4","key":"154_CR24","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/TSC.2013.44","volume":"7","author":"R Ghosh","year":"2013","unstructured":"Ghosh R, Longo F, Xia R, Naik VK, Trivedi KS (2013) Stochastic model driven capacity planning for an infrastructure-as-a-service cloud. IEEE Trans Serv Comput 7(4):667\u2013680","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"154_CR25","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/TCC.2014.2310737","volume":"2","author":"R Ghosh","year":"2014","unstructured":"Ghosh R, Longo F, Frattini F, Russo S, Trivedi KS (2014) Scalable analytics for iaas cloud availability. IEEE Trans Cloud Comput 2(1):57\u201370","journal-title":"IEEE Trans Cloud Comput"},{"key":"154_CR26","doi-asserted-by":"publisher","first-page":"102412","DOI":"10.1016\/j.jnca.2019.102412","volume":"146","author":"A Gorbenko","year":"2019","unstructured":"Gorbenko A, Romanovsky A, Tarasyuk O (2019) Fault tolerant internet computing: Benchmarking and modelling trade-offs between availability, latency and consistency. J Netw Comput Appl 146:102412","journal-title":"J Netw Comput Appl"},{"issue":"6","key":"154_CR27","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1147\/rd.316.0651","volume":"31","author":"A Goyal","year":"1987","unstructured":"Goyal A, Lavenberg SS (1987) Modeling and analysis of computer system availability. IBM J Res Dev 31(6):651\u2013664","journal-title":"IBM J Res Dev"},{"key":"154_CR28","doi-asserted-by":"crossref","unstructured":"Guan S, De\u00a0Grande RE, Boukerche A (2016) A novel energy efficient platform based model to enable mobile cloud applications. In: 2016 IEEE Symposium on Computers and Communication (ISCC), IEEE, pp 914\u2013919","DOI":"10.1109\/ISCC.2016.7543853"},{"key":"154_CR29","doi-asserted-by":"crossref","unstructured":"Ha K, Chen Z, Hu W, Richter W, Pillai P, Satyanarayanan M (2014) Towards wearable cognitive assistance. In: Proceedings of the 12th annual international conference on Mobile systems, applications, and services, pp 68\u201381","DOI":"10.1145\/2594368.2594383"},{"key":"154_CR30","unstructured":"Hardesty L (2017) Fog computing group publishes reference architecture"},{"key":"154_CR31","doi-asserted-by":"crossref","unstructured":"Hayes B (2008) Cloud computing","DOI":"10.1145\/1364782.1364786"},{"key":"154_CR32","doi-asserted-by":"publisher","first-page":"106492","DOI":"10.1016\/j.cie.2020.106492","volume":"147","author":"CF Huang","year":"2020","unstructured":"Huang CF, Huang DH, Lin YK (2020a) Network reliability evaluation for a distributed network with edge computing. Comput Ind Eng 147:106492","journal-title":"Comput Ind Eng"},{"key":"154_CR33","doi-asserted-by":"publisher","first-page":"50355","DOI":"10.1109\/ACCESS.2020.2979970","volume":"8","author":"J Huang","year":"2020","unstructured":"Huang J, Liang J, Ali S (2020b) A simulation-based optimization approach for reliability-aware service composition in edge computing. IEEE Access 8:50355\u201350366","journal-title":"IEEE Access"},{"key":"154_CR34","doi-asserted-by":"crossref","unstructured":"Jammal M, Kanso A, Shami A (2015) Chase: component high availability-aware scheduler in cloud computing environment. In: 2015 IEEE 8th international conference on cloud computing, IEEE, pp 477\u2013484","DOI":"10.1109\/CLOUD.2015.70"},{"key":"154_CR35","doi-asserted-by":"crossref","unstructured":"Jayashree L, Selvakumar G (2020) Edge computing in iot. In: Getting started with enterprise internet of things: design approaches and software architecture models, Springer, pp 49\u201369","DOI":"10.1007\/978-3-030-30945-9_3"},{"key":"154_CR36","doi-asserted-by":"crossref","unstructured":"Jia C, Lin K, Deng J (2020) A multi-property method to evaluate trust of edge computing based on data driven capsule network. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 616\u2013621","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163069"},{"key":"154_CR37","doi-asserted-by":"crossref","unstructured":"Laprie JC (1992) Dependability: Basic concepts and terminology. In: Dependability: basic concepts and terminology, Springer, pp 3\u2013245","DOI":"10.1007\/978-3-7091-9170-5_1"},{"key":"154_CR38","doi-asserted-by":"publisher","first-page":"101082","DOI":"10.1016\/j.pmcj.2019.101082","volume":"60","author":"L Jw","year":"2019","unstructured":"Jw L, Jang G, Jung H, Lee JG, Lee U (2019) Maximizing mapreduce job speed and reliability in the mobile cloud by optimizing task allocation. Pervasive Mob Comput 60:101082","journal-title":"Pervasive Mob Comput"},{"key":"154_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2019.07.013","volume":"146","author":"C Li","year":"2019","unstructured":"Li C, Wang Y, Tang H, Zhang Y, Xin Y, Luo Y (2019) Flexible replica placement for enhancing the availability in edge computing environment. Comput Commun 146:1\u201314","journal-title":"Comput Commun"},{"key":"154_CR40","doi-asserted-by":"crossref","unstructured":"Li J, Zhang T, Jin J, Yang Y, Yuan D, Gao L (2017) Latency estimation for fog-based internet of things. In: 2017 27th International telecommunication networks and applications conference (ITNAC), IEEE, pp 1\u20136","DOI":"10.1109\/ATNAC.2017.8215403"},{"key":"154_CR41","doi-asserted-by":"crossref","unstructured":"Li S, Huang J (2017) Gspn-based reliability-aware performance evaluation of iot services. In: 2017 IEEE international conference on services computing (SCC), IEEE, pp 483\u2013486","DOI":"10.1109\/SCC.2017.70"},{"key":"154_CR42","doi-asserted-by":"crossref","unstructured":"Liang W, Ma Y, Xu W, Jia X, Chau SCK (2020) Reliability augmentation of requests with service function chain requirements in mobile edge-cloud networks. In: 49th International Conference on Parallel Processing - ICPP, Association for Computing Machinery, New York, NY, USA, ICPP \u201920","DOI":"10.1145\/3404397.3404452"},{"key":"154_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2017.12.062","volume":"83","author":"B Liu","year":"2018","unstructured":"Liu B, Chang X, Han Z, Trivedi K, Rodr\u00edguez RJ (2018) Model-based sensitivity analysis of iaas cloud availability. Fut Gen Comput Syst 83:1\u201313","journal-title":"Fut Gen Comput Syst"},{"key":"154_CR44","doi-asserted-by":"publisher","first-page":"79810","DOI":"10.1109\/ACCESS.2019.2923592","volume":"7","author":"Y Liu","year":"2019","unstructured":"Liu Y, Wang K, Ge L, Ye L, Cheng J (2019) Adaptive evaluation of virtual machine placement and migration scheduling algorithms using stochastic petri nets. IEEE Access 7:79810\u201379824","journal-title":"IEEE Access"},{"key":"154_CR45","doi-asserted-by":"crossref","unstructured":"Longo F, Ghosh R, Naik VK, Trivedi KS (2011) A scalable availability model for infrastructure-as-a-service cloud. In: 2011 IEEE\/IFIP 41st international conference on dependable systems & networks (DSN), IEEE, pp 335\u2013346","DOI":"10.1109\/DSN.2011.5958247"},{"key":"154_CR46","doi-asserted-by":"crossref","unstructured":"Machida F, Andrade E, Kim DS, Trivedi KS (2011) Candy: Component-based availability modeling framework for cloud service management using sysml. In: 2011 IEEE 30th international symposium on reliable distributed systems, IEEE, pp 209\u2013218","DOI":"10.1109\/SRDS.2011.33"},{"key":"154_CR47","volume-title":"Performance and dependability in service computing: concepts, techniques and research directions","author":"P Maciel","year":"2011","unstructured":"Maciel P, Trivedi KS, Matias R, Kim DS (2011) Dependability modeling. Performance and dependability in service computing: concepts, techniques and research directions. IGI Global, Hershey"},{"key":"154_CR48","doi-asserted-by":"crossref","unstructured":"Mahmood Z, Ramachandran M (2018) Fog computing: concepts, principles and related paradigms. In: Fog Computing, Springer, pp 3\u201321","DOI":"10.1007\/978-3-319-94890-4_1"},{"issue":"3","key":"154_CR49","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/24.326452","volume":"43","author":"M Malhotra","year":"1994","unstructured":"Malhotra M, Trivedi KS (1994) Power-hierarchy of dependability-model types. IEEE Trans Reliab 43(3):493\u2013502","journal-title":"IEEE Trans Reliab"},{"key":"154_CR50","doi-asserted-by":"crossref","unstructured":"Mao K, Zhu Y, Chen Z, Tao X, Xue Q, Wu H, Mao Y, Hou J (2017) A visual model-based evaluation framework of cloud-based prognostics and health management. In: 2017 IEEE international conference on smart cloud (SmartCloud), IEEE, pp 33\u201340","DOI":"10.1109\/SmartCloud.2017.12"},{"key":"154_CR51","volume-title":"Modelling with generalized stochastic petri nets","author":"MA Marsan","year":"1994","unstructured":"Marsan MA, Balbo G, Conte G, Donatelli S, Franceschinis G (1994) Modelling with generalized stochastic petri nets. Wiley, New York"},{"key":"154_CR52","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.simpat.2014.04.003","volume":"50","author":"R Matos","year":"2015","unstructured":"Matos R, Araujo J, Oliveira D, Maciel P, Trivedi K (2015) Sensitivity analysis of a hierarchical model of mobile cloud computing. Simul Model Pract Theory 50:151\u2013164","journal-title":"Simul Model Pract Theory"},{"issue":"1","key":"154_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-016-9381-z","volume":"15","author":"R Matos","year":"2017","unstructured":"Matos R, Dantas J, Araujo J, Trivedi KS, Maciel P (2017) Redundant eucalyptus private clouds: availability modeling and sensitivity analysis. J Grid Comput 15(1):1\u201322","journal-title":"J Grid Comput"},{"key":"154_CR54","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145","volume-title":"The nist definition of cloud computing","author":"P Mell","year":"2011","unstructured":"Mell P, Grance T et al (2011) The nist definition of cloud computing. Computer Security Division, Information Technology Laboratory, National"},{"key":"154_CR55","doi-asserted-by":"crossref","unstructured":"Melo C, Dantas J, Oliveira D, F\u00e9 I, Matos R, Dantas R, Maciel R, Maciel P (2018) Dependability evaluation of a blockchain-as-a-service environment. In: 2018 IEEE symposium on computers and communications (ISCC), IEEE, pp 00909\u201300914","DOI":"10.1109\/ISCC.2018.8538752"},{"issue":"3","key":"154_CR56","doi-asserted-by":"publisher","first-page":"65","DOI":"10.22456\/2175-2745.91814","volume":"26","author":"C Melo","year":"2019","unstructured":"Melo C, Dantas J, Maciel R, Silva P, Maciel P (2019) Models to evaluate service provisioning over cloud computing environments-a blockchain-as-a-service case study. Revista de Inform\u00e1tica Te\u00f3rica e Aplicada 26(3):65\u201374","journal-title":"Revista de Inform\u00e1tica Te\u00f3rica e Aplicada"},{"issue":"2","key":"154_CR57","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1504\/IJGUC.2020.105533","volume":"11","author":"C Melo","year":"2020","unstructured":"Melo C, Dantas J, Maciel P, Oliveira DM, Araujo J, Matos R, F\u00e9 I (2020) Models for hyper-converged cloud computing infrastructures planning. Int J Grid Util Comput 11(2):196\u2013208","journal-title":"Int J Grid Util Comput"},{"key":"154_CR58","volume-title":"Performance by design: computer capacity planning by example","author":"DA Menasc\u00e9","year":"2004","unstructured":"Menasc\u00e9 DA, Almeida VA, Dowdy LW (2004) Performance by design: computer capacity planning by example. Prentice Hall PTR, New York"},{"key":"154_CR59","unstructured":"Molloy MK (1982) On the integration of delay and throughput measures in distributed processing models"},{"issue":"9","key":"154_CR60","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/TC.1982.1676110","volume":"31","author":"MK Molloy","year":"1982","unstructured":"Molloy MK (1982) Performance analysis using stochastic petri nets. IEEE Trans Comput 31(9):913\u2013917. https:\/\/doi.org\/10.1109\/TC.1982.1676110","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"154_CR61","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata T (1989) Petri nets: properties, analysis and applications. Proc IEEE 77(4):541\u2013580","journal-title":"Proc IEEE"},{"key":"154_CR62","doi-asserted-by":"publisher","first-page":"47980","DOI":"10.1109\/ACCESS.2018.2866491","volume":"6","author":"RK Naha","year":"2018","unstructured":"Naha RK, Garg S, Georgakopoulos D, Jayaraman PP, Gao L, Xiang Y, Ranjan R (2018) Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6:47980\u201348009","journal-title":"IEEE Access"},{"key":"154_CR63","unstructured":"Natkin SO (1980) Les Reseaux de petri stochastiques et leur application de l\u2019evaluation des systemes informatiques"},{"issue":"1","key":"154_CR64","doi-asserted-by":"publisher","first-page":"155","DOI":"10.3390\/electronics9010155","volume":"9","author":"TA Nguyen","year":"2020","unstructured":"Nguyen TA, Min D, Choi E (2020) A hierarchical modeling and analysis framework for availability and security quantification of iot infrastructures. Electronics 9(1):155","journal-title":"Electronics"},{"key":"154_CR65","unstructured":"Patel P, Ranabahu AH, Sheth AP (2009) Service level agreement in cloud computing"},{"key":"154_CR66","doi-asserted-by":"crossref","unstructured":"Pereira P, Araujo J, Maciel P (2019) A hybrid mechanism of horizontal auto-scaling based on thresholds and time series. In: 2019 IEEE International Conference on Systems. Man and Cybernetics (SMC), IEEE, pp 2065\u20132070","DOI":"10.1109\/SMC.2019.8914522"},{"key":"154_CR67","doi-asserted-by":"crossref","unstructured":"Pereira P, Araujo J, Torquato M, Dantas J, Melo C, Maciel P (2020) Stochastic performance model for web server capacity planning in fog computing. J Supercomput pp 1\u201325","DOI":"10.1007\/s11227-020-03218-w"},{"key":"154_CR68","volume-title":"Failure-tolerant computer design","author":"WH Pierce","year":"2014","unstructured":"Pierce WH (2014) Failure-tolerant computer design. Academic Press, New York"},{"key":"154_CR69","unstructured":"Qiu X, Dai Y, Xiang Y, Xing L (2017) Correlation modeling and resource optimization for cloud service with fault recovery. IEEE Trans Cloud Comput"},{"issue":"1","key":"154_CR70","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13677-018-0118-3","volume":"7","author":"GL Santos","year":"2018","unstructured":"Santos GL, Endo PT, da Silva Lisboa MFF, da Silva LGF, Sadok D, Kelner J, Lynn T et al (2018) Analyzing the availability and performance of an e-health system integrated with edge, fog and cloud infrastructures. J Cloud Comput 7(1):16","journal-title":"J Cloud Comput"},{"key":"154_CR71","doi-asserted-by":"publisher","first-page":"67830","DOI":"10.1109\/ACCESS.2018.2878640","volume":"6","author":"S Sanyal","year":"2018","unstructured":"Sanyal S, Zhang P (2018) Improving quality of data: Iot data aggregation using device to device communications. IEEE Access 6:67830\u201367840","journal-title":"IEEE Access"},{"issue":"1","key":"154_CR72","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30\u201339","journal-title":"Computer"},{"key":"154_CR73","doi-asserted-by":"crossref","unstructured":"Sharkh MA, Kalil M (2018) A quest for optimizing the data processing decision for cloud-fog hybrid environments. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, pp 1\u20136","DOI":"10.1109\/ICCW.2018.8403743"},{"key":"154_CR74","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","volume":"6","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Chen MY, Park JH (2017) A software defined fog node based distributed blockchain cloud architecture for iot. Ieee Access 6:115\u2013124","journal-title":"Ieee Access"},{"issue":"5","key":"154_CR75","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Int Things J 3(5):637\u2013646","journal-title":"IEEE Int Things J"},{"key":"154_CR76","unstructured":"Singh C, Billinton R (1977) System reliability, modelling and evaluation, vol 769. Hutchinson London"},{"issue":"4","key":"154_CR77","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1109\/JIOT.2017.2782745","volume":"5","author":"W Sun","year":"2017","unstructured":"Sun W, Liu J (2017) Coordinated multipoint-based uplink transmission in internet of things powered by energy harvesting. IEEE Int Things J 5(4):2585\u20132595","journal-title":"IEEE Int Things J"},{"key":"154_CR78","unstructured":"Symons FJW (1989) Modelling and analysis of communication protocols using numerical petri nets"},{"key":"154_CR79","doi-asserted-by":"publisher","first-page":"110524","DOI":"10.1016\/j.jss.2020.110524","volume":"163","author":"Y Tian","year":"2020","unstructured":"Tian Y, Tian J, Li N (2020) Cloud reliability and efficiency improvement via failure risk based proactive actions. J Syst Softw 163:110524","journal-title":"J Syst Softw"},{"key":"154_CR80","unstructured":"Trivedi KS, Hunter S, Garg S, Fricks R (1996) Reliability analysis techniques explored through a communication network example. North Carolina State University. Center for Advanced Computing and Communication Tech. rep"},{"key":"154_CR81","doi-asserted-by":"crossref","unstructured":"Vahid\u00a0Dastjerdi A, Gupta H, Calheiros RN, Ghosh SK, Buyya R (2016) Fog computing: principles, architectures, and applications. pp 1601","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"154_CR82","doi-asserted-by":"crossref","unstructured":"Wang F, Wang X, Zhang C, He Q, Yang Y (2020) Fault tolerating multi-tenant service-based systems with dynamic quality. Knowl-Based Syst p 105715","DOI":"10.1016\/j.knosys.2020.105715"},{"key":"154_CR83","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.ins.2016.06.031","volume":"379","author":"T Wang","year":"2017","unstructured":"Wang T, Peng Z, Wen S, Lai Y, Jia W, Cai Y, Tian H, Chen Y (2017) Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf Sci 379:160\u2013176","journal-title":"Inf Sci"},{"issue":"4","key":"154_CR84","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s40860-019-00081-2","volume":"5","author":"J Yakubu","year":"2019","unstructured":"Yakubu J, Christopher HA, Chiroma H, Abdullahi M et al (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ 5(4):209\u2013233","journal-title":"J Reliab Intell Environ"},{"key":"154_CR85","doi-asserted-by":"crossref","unstructured":"Yi S, Hao Z, Qin Z, Li Q (2015) Fog computing: Platform and applications. In: 2015 Third IEEE workshop on hot topics in web systems and technologies (HotWeb), IEEE, pp 73\u201378","DOI":"10.1109\/HotWeb.2015.22"},{"key":"154_CR86","doi-asserted-by":"crossref","unstructured":"Yousefpour A, Devic S, Nguyen BQ, Kreidieh A, Liao A, Bayen AM, Jue JP (2019) Guardians of the deep fog: failure-resilient dnn inference from edge to cloud. In: Proceedings of the first international workshop on challenges in artificial intelligence and machine learning for internet of things, association for computing machinery, New York, NY, USA, AIChallengeIoT\u201919, p 25\u201331","DOI":"10.1145\/3363347.3363366"},{"key":"154_CR87","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms: A complete survey. J Syst Architect 98:289\u2013330","journal-title":"J Syst Architect"},{"key":"154_CR88","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.cose.2019.04.017","volume":"85","author":"L Zhou","year":"2019","unstructured":"Zhou L, Guo H, Deng G (2019) A fog computing based approach to ddos mitigation in iiot systems. Comput Secur 85:51\u201362","journal-title":"Comput Secur"},{"key":"154_CR89","doi-asserted-by":"crossref","unstructured":"Zilic J, Aral A, Brandic I (2019) Efpo: Energy efficient and failure predictive edge offloading. In: Proceedings of the 12th IEEE\/ACM international conference on utility and cloud computing, association for computing machinery, New York, NY, USA, UCC\u201919, pp 165\u2013175","DOI":"10.1145\/3344341.3368818"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00154-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00154-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00154-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T12:21:48Z","timestamp":1659615708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00154-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,18]]},"references-count":89,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["154"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00154-1","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,18]]},"assertion":[{"value":"20 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}