{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:02:07Z","timestamp":1775066527029,"version":"3.50.1"},"reference-count":152,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology (MOST), Taiwan","doi-asserted-by":"publisher","award":["109-2221-E-011-104-MY3"],"award-info":[{"award-number":["109-2221-E-011-104-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2023.3239579","type":"journal-article","created":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T18:39:09Z","timestamp":1674671949000},"page":"1199-1226","source":"Crossref","is-referenced-by-count":165,"title":["Offloading Using Traditional Optimization and Machine Learning in Federated Cloud\u2013Edge\u2013Fog Systems: A Survey"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0534-6652","authenticated-orcid":false,"given":"Binayak","family":"Kar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2328-0589","authenticated-orcid":false,"given":"Widhi","family":"Yahya","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5226-4396","authenticated-orcid":false,"given":"Ying-Dar","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Yang Ming Chiao Tung University, Hsnchu, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9660-7533","authenticated-orcid":false,"given":"Asad","family":"Ali","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, National Yang Ming Chiao Tung University, Hsinchu, Taiwan"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2338323"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2016.124"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659498"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2472973"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.8233651"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2593486"},{"key":"ref55","first-page":"32","article-title":"Cloud federation","author":"kurze","year":"2011","journal-title":"Proc Cloud Comput"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2168"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2793350"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875915"},{"key":"ref46","first-page":"1","article-title":"Cloud federation","author":"kurze","year":"2011","journal-title":"Proc 2nd Int Conf Cloud Comput GRIDs Virtualization"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2690678"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511465"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.46"},{"key":"ref41","year":"2008","journal-title":"Windows azure offers developers iron-clad lock-in"},{"key":"ref44","article-title":"Above the clouds: A Berkeley view of cloud computing","author":"armbrust","year":"2009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/NCCA.2012.29"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2959410"},{"key":"ref8","article-title":"Fog computing: Focusing on mobile users at the edge","author":"luan","year":"2015","journal-title":"arXiv 1502 01815"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.03.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2014.6778179"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917508"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3027695"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3006922"},{"key":"ref40","year":"2008","journal-title":"Cloud computing is a trap warns GNU founder Richard Stallman"},{"key":"ref35","first-page":"325","article-title":"BEACON: A cloud network federation framework","author":"vozmediano","year":"2015","journal-title":"Proc Eur Conf Service-Oriented Cloud Comput"},{"key":"ref34","year":"2022","journal-title":"Federated edge |On-demand edge cloud services for MSPs"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760478"},{"key":"ref36","year":"2022","journal-title":"kubefed Kubernetes Cluster Federation"},{"key":"ref31","year":"2022","journal-title":"Systems&#x2014;Digitalization with Industry Expertise"},{"key":"ref148","author":"patel","year":"2009","journal-title":"Service Level Agreement in Cloud Computing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496100"},{"key":"ref149","author":"chan","year":"2020","journal-title":"The Cambridge Analytica Whistleblower Explains How the Firm Used Facebook Data to Sway Elections"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5984011"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiia.2019.12.001"},{"key":"ref32","year":"2022","journal-title":"Google Fi&#x2014;A simple wireless phone plan with unlimited data"},{"key":"ref147","article-title":"Cloud computing: A taxonomy of platform and infrastructure-level offerings","author":"hilley","year":"2009"},{"key":"ref39","year":"2008","journal-title":"Cloud computing and vendor lock-in"},{"key":"ref38","first-page":"344","article-title":"Opportunities and challenges of joint edge and fog orchestration","author":"commadi","year":"2018","journal-title":"Proc Wireless Commun Netw Conf Workshops (WCNCW)"},{"key":"ref151","first-page":"320","article-title":"Improving Web sites performance using edge servers in fog computing architecture","author":"zhu","year":"2013","journal-title":"Proc IEEE Int Symp Service Oriented Syst Eng"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2909279"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200937"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2791504"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.057"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3029649"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2878552"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2682318"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102781"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033828"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.64"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107496"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01905-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2373356"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3172367"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2369742"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473628"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.026"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900232"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2816590"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3023936"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-021-00240-y"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-021-01941-3"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000572"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2938660"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2019.00022"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2997832"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5101","DOI":"10.1109\/ACCESS.2018.2799546","article-title":"A survey on mobile data offloading technologies","volume":"6","author":"huan","year":"2018","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2808242"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0368-0"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393496"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3046874"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940295"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2979361"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2670018"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3010861"},{"key":"ref131","year":"2017","journal-title":"OpenFog Reference Architecture for Fog Computing"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149307"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2690902"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903245"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"2633","DOI":"10.1109\/JIOT.2017.2786343","article-title":"Energy-latency tradeoff for energy-aware offloading in mobile edge computing networks","volume":"5","author":"jiao","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969148"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.015"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2934103"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3000871"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2672878"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3120413"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2926979"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2597169"},{"key":"ref135","year":"2022","journal-title":"Amazon EC2 Auto Scaling"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925612"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3101862"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.08.015"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2881191"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/MIUCC52538.2021.9447632"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3008926"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2937342"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875926"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2387752"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2055771"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2946426"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891130"},{"key":"ref108","article-title":"Dynamic offloading design in time-varying mobile edge networks with deep reinforcement learning approach","author":"yu","year":"2021","journal-title":"arXiv 2103 02174"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2843802"},{"key":"ref109","article-title":"An integrated optimization-learning framework for online combinatorial computation offloading in MEC networks","author":"li","year":"2021","journal-title":"arXiv 2104 06619"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2968951"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2990630"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3081694"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2790421"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900200"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3090061"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3066619"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-7744-1_2"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.3390\/e23050613"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2611964"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800510"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541539"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095677"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.024"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2826544"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900406"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2710056"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3024233"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2843365"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3023194"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2599530"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3317572"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2908154"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3021024"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2624118"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.01.003"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.041912.110912"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013596"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566921"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3058995"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.116"},{"key":"ref122","article-title":"Com-DDPG: A multiagent reinforcement learning-based offloading strategy for mobile edge computing","author":"gao","year":"2020","journal-title":"arXiv 2012 05105"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3012509"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2347272"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129399"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891403"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011705"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10130694\/10025811.pdf?arnumber=10025811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:34:45Z","timestamp":1686594885000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10025811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":152,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2023.3239579","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}