{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:26:26Z","timestamp":1778084786184,"version":"3.51.4"},"reference-count":108,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research of King Saud University through the Research Group","doi-asserted-by":"publisher","award":["RG-1439-036"],"award-info":[{"award-number":["RG-1439-036"]}],"id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3059072","type":"journal-article","created":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T02:46:38Z","timestamp":1613184398000},"page":"29609-29622","source":"Crossref","is-referenced-by-count":67,"title":["Cloudlet Computing: Recent Advances, Taxonomy, and Challenges"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-0148","authenticated-orcid":false,"given":"Mohammad","family":"Babar","sequence":"first","affiliation":[{"name":"Department of Computer Software Engineering, University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3622-9010","authenticated-orcid":false,"given":"Muhammad Sohail","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Software Engineering, University of Engineering and Technology Mardan, Mardan, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9420-1588","authenticated-orcid":false,"given":"Farman","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Software, Sejong University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6946-2591","authenticated-orcid":false,"given":"Muhammad","family":"Imran","sequence":"additional","affiliation":[{"name":"College of Applied Computer Science, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0051-6803","authenticated-orcid":false,"given":"Muhammad","family":"Shoaib","sequence":"additional","affiliation":[{"name":"College of Computer and Information Science, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378666"},{"key":"ref38","first-page":"225","article-title":"Efficient mobile cloud computing through computation offloading","volume":"10","author":"biswas","year":"2019","journal-title":"Int J Adv Technol"},{"key":"ref33","first-page":"54","article-title":"Effects of cloudlets on interactive applications in mobile cloud computing environments","volume":"4","author":"shim","year":"2015","journal-title":"Int J Adv Comput Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199858"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2013.77"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2118\/191756-MS"},{"key":"ref36","first-page":"20","article-title":"Overview of cloudlet, fog computing, edge computing, and dew computing","author":"pan","year":"2018","journal-title":"Proc 3rd Int Workshop Dew Comput"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2907491"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.090512.00043"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3213344.3213348"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3241738"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.07.051"},{"key":"ref20","first-page":"93","article-title":"$COMET$\n: Code offload by migrating execution transparently","author":"gordon","year":"2012","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.future.2019.09.003","article-title":"An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets","volume":"102","author":"chamola","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CCBD.2015.54"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3366614.3368102"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3362031"},{"key":"ref101","first-page":"1213","article-title":"Healthedge: Task scheduling for edge computing with health emergency and human behavior consideration in smart homes","author":"wang","year":"2017","journal-title":"Proc Int Conf Netw Archit Storage (NAS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.002"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54436-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2973993"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2019.8671621"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91563-0_13"},{"key":"ref58","first-page":"1","article-title":"Fog computing and mobile edge cloud gain momentum open fog consortium, ETSI MEC and cloudlets","volume":"1","author":"klas","year":"2015","journal-title":"Google Scholar"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2011.5931325"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800083"},{"key":"ref54","first-page":"1","article-title":"Mobile edge computing&#x2014;A key technology towards 5G","volume":"11","author":"hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref53","first-page":"59","article-title":"Cuckoo: A computation offloading framework for smartphones","author":"kemp","year":"2010","journal-title":"Proc Int Conf Mobile Comput Appl Services"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8213-9.ch003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591119"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.3991\/ijim.v14i12.14407","article-title":"Client aware scalable cloudlet to augment edge computing with mobile cloud migration service","volume":"14","author":"tamilselvan","year":"2020","journal-title":"Int J Interact Mob Technol"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"165","DOI":"10.3991\/ijim.v14i12.14407","article-title":"Client aware scalable cloudlet to augment edge computing with mobile cloud migration service","volume":"14","author":"uma","year":"2020","journal-title":"Int J Interact Mob Technol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC48092.2020.ICCMC-0009"},{"key":"ref5","article-title":"Client aware scalable cloudlet to augment edge computing with mobile cloud migration service","author":"uma","year":"2020","journal-title":"Int J Interact Mob Technol"},{"key":"ref8","first-page":"8","article-title":"Are cloudlets necessary?","author":"gao","year":"2015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2505906.2505910"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2014.03.045"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.009"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470948"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2002.1035395"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917628"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2690678"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.016"},{"key":"ref41","author":"mitchell","year":"2014","journal-title":"Wireless Standards-802 11 b 802 11 a 802 11 g and 802 11 n"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375213"},{"key":"ref43","first-page":"300","article-title":"Caching for delay-sensitive application in IoT\/edge network","author":"kyung","year":"2019","journal-title":"J Korean Inst Commun Sci"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00285"},{"key":"ref72","first-page":"126","article-title":"Internet of sensors","volume":"67","author":"curioni","year":"2017","journal-title":"The New World of Science"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879143"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"ref77","first-page":"1","article-title":"NaaS: Network-as-a-service in the cloud","author":"costa","year":"2012","journal-title":"Proc 2nd USENIX Workshop Hot Topics Manage Internet Cloud Enterprise Netw Services"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.671.677"},{"key":"ref75","first-page":"25","article-title":"Data as a service (DaaS) in cloud computing","volume":"12","author":"rajesh","year":"2012","journal-title":"Global J Comput Sci Technol"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0616-1"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01242-6"},{"key":"ref60","first-page":"23","article-title":"In search of a better, faster, stronger Web","author":"mayer","year":"2009","journal-title":"Proc Velocity"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8580978"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/35.841844"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4035-4"},{"key":"ref64","article-title":"Feasibility of fog computing","author":"varghese","year":"2017","journal-title":"arXiv 1701 05451"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/10771.001.0001"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2018.8603627"},{"key":"ref67","first-page":"1","article-title":"$POMAC$\n: Properly offloading mobile applications to clouds","author":"hassan","year":"2014","journal-title":"Proc 6th USENIX Workshop Hot Topics Cloud Comput"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.07.012"},{"key":"ref2","first-page":"165","article-title":"Mobile cloud computing: A survey on challenges and issues","volume":"14","author":"raj","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref1","first-page":"190","article-title":"Investigation of smartphone use addiction in generation Y","author":"salab?ir","year":"2020","journal-title":"Recent Advances in Digital Media Impacts on Identity Sexuality and Relationships"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.petlm.2018.11.001"},{"key":"ref108","first-page":"80","article-title":"Fog computing security and privacy issues: A survey","volume":"3","author":"hafeez","year":"2019","journal-title":"International Journal of Research in Engineering Science & Technology"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7158084"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1108\/JHTT-12-2018-0120"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1610-4_54"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.08.023"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2012.6249269"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.09.015"},{"key":"ref91","article-title":"Impact of different cloud deployments on real-time video applications for mobile video cloud users","volume":"9400","author":"khan","year":"2015","journal-title":"Proc SPIE"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2014.7076905"},{"key":"ref90","article-title":"Cloudpad-a cloud-based documentation and archiving tool for mixed reality artworks","author":"giannachi","year":"2011"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800624"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobicase.2014.257768"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2684812"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1500293NM"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.2118\/197670-MS"},{"key":"ref97","first-page":"43","article-title":"Users&#x2019; perceptions of data as a service (DaaS)","volume":"6","author":"s\u00f8ilen","year":"2016","journal-title":"J Intelligence Studies in Business"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2811808"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.238"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobicase.2014.257757"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848036"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016911471"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7224704"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2721914.2721921"},{"key":"ref82","first-page":"1","article-title":"Securing smart homes with openflow","volume":"1","author":"frank","year":"2019","journal-title":"Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2899093"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000000"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3345768.3362038"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.104"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2922699"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MWC.2013.6549279","article-title":"Gearing resource-poor mobile devices with powerful clouds: Architectures, challenges, and applications","volume":"20","author":"liu","year":"2013","journal-title":"IEEE Wireless Commun"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.046"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-015-0881-6"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940972"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09353485.pdf?arnumber=9353485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T20:23:24Z","timestamp":1662668604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9353485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":108,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3059072","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}