{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:13:22Z","timestamp":1777043602975,"version":"3.51.4"},"reference-count":133,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,5,7]],"date-time":"2018-05-07T00:00:00Z","timestamp":1525651200000},"content-version":"vor","delay-in-days":126,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472047"],"award-info":[{"award-number":["61472047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>A huge amount of data, generated by Internet of Things (IoT), is growing up exponentially based on nonstop operational states. Those IoT devices are generating an avalanche of information that is disruptive for predictable data processing and analytics functionality, which is perfectly handled by the cloud before explosion growth of IoT. Fog computing structure confronts those disruptions, with powerful complement functionality of cloud framework, based on deployment of micro clouds (fog nodes) at proximity edge of data sources. Particularly big IoT data analytics by fog computing structure is on emerging phase and requires extensive research to produce more proficient knowledge and smart decisions. This survey summarizes the fog challenges and opportunities in the context of big IoT data analytics on fog networking. In addition, it emphasizes that the key characteristics in some proposed research works make the fog computing a suitable platform for new proliferating IoT devices, services, and applications. Most significant fog applications (e.g., health care monitoring, smart cities, connected vehicles, and smart grid) will be discussed here to create a well\u2010organized green computing paradigm to support the next generation of IoT applications.<\/jats:p>","DOI":"10.1155\/2018\/7157192","type":"journal-article","created":{"date-parts":[[2018,5,7]],"date-time":"2018-05-07T23:31:28Z","timestamp":1525735888000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":157,"title":["Fog Computing: An Overview of Big IoT Data Analytics"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1945-6281","authenticated-orcid":false,"given":"Muhammad Rizwan","family":"Anawar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7245-1298","authenticated-orcid":false,"given":"Shangguang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Azam Zia","sequence":"additional","affiliation":[]},{"given":"Ahmer Khan","family":"Jadoon","sequence":"additional","affiliation":[]},{"given":"Umair","family":"Akram","sequence":"additional","affiliation":[]},{"given":"Salman","family":"Raza","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,5,7]]},"reference":[{"key":"e_1_2_11_1_2","unstructured":"I-SCOOP The growing role of fog and edge computing in IoT https:\/\/www.i-scoop.eu\/internet-of-things-guide\/#The_growing_role_of_fog_and_edge_computing_in_IoT."},{"key":"e_1_2_11_2_2","doi-asserted-by":"crossref","unstructured":"BonomiF. MilitoR. ZhuJ. andAddepalliS. Fog computing and its role in the internet of things Proceedings of the 1st ACM Mobile Cloud Computing Workshop MCC 2012 August 2012 Finland 13\u201315 2-s2.0-84866627419 https:\/\/doi.org\/10.1145\/2342509.2342513.","DOI":"10.1145\/2342509.2342513"},{"key":"e_1_2_11_3_2","unstructured":"I-SCOOP Internet of Things Trends for 2017 and Beyond https:\/\/www.i-scoop.eu\/internet-of-things-guide\/#Internet_of_Things_trends_for_2017_and_beyond."},{"key":"e_1_2_11_4_2","first-page":"1","article-title":"The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east","volume":"2007","author":"Gantz J.","year":"2012","journal-title":"IDC iView: IDC Analyze the future"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"HoqueS. BritoM. S. D. WillnerA. KeilO. andMagedanzT. Towards Container Orchestration in Fog Computing Infrastructures Proceedings of the 41st IEEE Annual Computer Software and Applications Conference Workshops COMPSAC 2017 July 2017 Italy 294\u2013299 2-s2.0-85032866807 https:\/\/doi.org\/10.1109\/COMPSAC.2017.248.","DOI":"10.1109\/COMPSAC.2017.248"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2015.2388958"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"CuervoyE. BalasubramanianA. ChoD.-K. WolmanA. SaroiuS. ChandraR. andBahlxP. MAUI: making smartphones last longer with code offload Proceedings of the 8th Annual International Conference on Mobile Systems Applications and Services (MobiSys \u203210) June 2010 New York NY USA 49\u201362 https:\/\/doi.org\/10.1145\/1814433.1814441 2-s2.0-77954993714.","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1496091.1496103"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"LeeK. KimD. HaD. RajputU. andOhH. On security and privacy issues of fog computing supported Internet of Things environment Proceedings of the International Conference on the Network of the Future NOF 2015 October 2015 Canada 2-s2.0-84961877275 https:\/\/doi.org\/10.1109\/NOF.2015.7333287.","DOI":"10.1109\/NOF.2015.7333287"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7224698"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","unstructured":"YiS. LiC. andLiQ. A survey of fog computing: concepts applications and issues Proceedings of the Workshop on Mobile Big Data (Mobidata \u203215) June 2015 Hangzhou China ACM 37\u201342 https:\/\/doi.org\/10.1145\/2757384.2757397.","DOI":"10.1145\/2757384.2757397"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118834404"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2009.5429058"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2444095"},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.009"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"DattaS. K. BonnetC. andHaerriJ. Fog Computing architecture to enable consumer centric Internet of Things services Proceedings of the IEEE International Symposium on Consumer Electronics ISCE 2015 June 2015 Spain 2-s2.0-84953311242 https:\/\/doi.org\/10.1109\/ISCE.2015.7177778.","DOI":"10.1109\/ISCE.2015.7177778"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.15623\/ijret.2015.0406057"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"ZhuJ. ChanD. S. PrabhuM. S. NatarajanP. HuH. andBonomiF. Improving web sites performance using edge servers in fog computing architecture Proceedings of the IEEE 7th International Symposium on Service-Oriented System Engineering (SOSE \u203213) March 2013 San Francisco Calif USA IEEE 320\u2013323 https:\/\/doi.org\/10.1109\/sose.2013.73 2-s2.0-84880905874.","DOI":"10.1109\/SOSE.2013.73"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692960"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2799000"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"KuI. LuY. andGerlaM. Software-defined mobile cloud: architecture services and use cases Proceedings of the 10th International Wireless Communications and Mobile Computing Conference (IWCMC \u203214) August 2014 Nicosia Cyprus https:\/\/doi.org\/10.1109\/iwcmc.2014.6906323 2-s2.0-84908657857.","DOI":"10.1109\/IWCMC.2014.6906323"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"HellerB. SherwoodR. andMcKeownN. The controller placement problem Proceedings of the 1st ACM International Workshop on Hot Topics in Software Defined Networks HotSDN 2012 August 2012 Finland 7\u201312 2-s2.0-84866480420 https:\/\/doi.org\/10.1145\/2342441.2342444.","DOI":"10.1145\/2342441.2342444"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"BastaA. KellererW. HoffmannM. MorperH. J. andHoffmannK. Applying NFV and SDN to LTE mobile core gateways; the functions placement problem Proceedings of the 4th ACM Workshop on All Things Cellular: Operations Applications and Challenges AllThingsCellular 2014 August 2014 usa 33\u201338 2-s2.0-84907407677 https:\/\/doi.org\/10.1145\/2627585.2627592.","DOI":"10.1145\/2627585.2627592"},{"key":"e_1_2_11_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2015.2401568"},{"key":"e_1_2_11_33_2","unstructured":"MartinsJ. AhmedM. RaiciuC. OlteanuV. HondaM. BifulcoR.et al. ClickOS and the art of network function virtualization Proceedings of the USENIX Conference on Networked Systems Design and Implementation 2014 459\u2013473."},{"key":"e_1_2_11_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2790081"},{"key":"e_1_2_11_35_2","doi-asserted-by":"crossref","unstructured":"MadsenH. AlbeanuG. BurtschyB. andPopentiu-VladicescuF. Reliability in the utility computing era: Towards reliable fog computing Proceedings of the 2013 20th International Conference on Systems Signals and Image Processing IWSSIP 2013 July 2013 Romania 43\u201346 2-s2.0-84889076773 https:\/\/doi.org\/10.1109\/IWSSIP.2013.6623445.","DOI":"10.1109\/IWSSIP.2013.6623445"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"HongK. LillethunD. RamachandranU. Ottenw\u00e4lderB. andKoldehofeB. Opportunistic spatio-temporal event processing for mobile situation awareness Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems DEBS 2013 July 2013 USA 195\u2013206 2-s2.0-84881122666 https:\/\/doi.org\/10.1145\/2488222.2488266.","DOI":"10.1145\/2488222.2488266"},{"key":"e_1_2_11_37_2","doi-asserted-by":"crossref","unstructured":"Ottenw\u00e4lderB. KoldehofeB. RothermelK. HongK. andRamachandranU. RECEP: Selection-based reuse for distributed complex event processing Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems DEBS 2014 May 2014 India 59\u201370 2-s2.0-84903190116 https:\/\/doi.org\/10.1145\/2611286.2611297.","DOI":"10.1145\/2611286.2611297"},{"key":"e_1_2_11_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.09.014"},{"key":"e_1_2_11_39_2","doi-asserted-by":"crossref","unstructured":"ShengB. LiQ. andMaoW. Data storage placement in sensor networks Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing MOBIHOC 2006 May 2006 ita 344\u2013355 2-s2.0-33748074817.","DOI":"10.1145\/1132905.1132943"},{"key":"e_1_2_11_40_2","doi-asserted-by":"crossref","unstructured":"WangH. TanC. C. andLiQ. Snoogle: A Search Engine for the Physical World Proceedings of the IEEE INFOCOM 2008 - IEEE Conference on Computer Communications April 2008 Phoenix AZ USA 1382\u20131390 https:\/\/doi.org\/10.1109\/INFOCOM.2008.196.","DOI":"10.1109\/INFOCOM.2008.196"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2009.145"},{"key":"e_1_2_11_42_2","doi-asserted-by":"crossref","unstructured":"ZhangY. TanC. andLiQ. CacheKeeper: A system-wide web caching service for smartphones Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing UbiComp 2013 September 2013 Switzerland 265\u2013274 2-s2.0-84885213275 https:\/\/doi.org\/10.1145\/2493432.2493484.","DOI":"10.1145\/2493432.2493484"},{"key":"e_1_2_11_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6736753"},{"key":"e_1_2_11_44_2","doi-asserted-by":"crossref","unstructured":"Md EnzaiN. I.andTangM. A taxonomy of computation offloading in mobile cloud computing Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing Services and Engineering April 2014 Oxford UK 19\u201328 https:\/\/doi.org\/10.1109\/mobilecloud.2014.16.","DOI":"10.1109\/MobileCloud.2014.16"},{"key":"e_1_2_11_45_2","doi-asserted-by":"crossref","unstructured":"ChunB.-G. IhmS. ManiatisP. NaikM. andPattiA. CloneCloud: elastic execution between mobile device and cloud Proceedings of the 6th ACM EuroSys Conference on Computer Systems (EuroSys \u203211) April 2011 ACM 301\u2013314 https:\/\/doi.org\/10.1145\/1966445.1966473 2-s2.0-79955951954.","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_2_11_46_2","doi-asserted-by":"crossref","unstructured":"KostaS. AucinasA. HuiP. MortierR. andZhangX. Thinkair: dynamic resource allocation and parallel execution in the cloud for mobile code offloading Proceedings of the IEEE INFOCOM March 2012 945\u2013953 https:\/\/doi.org\/10.1109\/infcom.2012.6195845 2-s2.0-84861596582.","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"e_1_2_11_47_2","first-page":"93","volume-title":"OSDI","author":"Gordon M. S.","year":"2012"},{"key":"e_1_2_11_48_2","doi-asserted-by":"crossref","unstructured":"Ottenw\u00e4lderB. KoldehofeB. RothermelK. andRamachandranU. MigCEP: Operator migration for mobility driven distributed complex event processing Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems DEBS 2013 July 2013 USA 183\u2013194 2-s2.0-84881119458 https:\/\/doi.org\/10.1145\/2488222.2488265.","DOI":"10.1145\/2488222.2488265"},{"key":"e_1_2_11_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.006"},{"key":"e_1_2_11_50_2","doi-asserted-by":"crossref","unstructured":"NishioT. ShinkumaR. TakahashiT. andMandayamN. B. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud Proceedings of the 1st International Workshop on Mobile Cloud Computing and Networking MobileCloud 2013 July 2013 ind 19\u201326 2-s2.0-84882953034 https:\/\/doi.org\/10.1145\/2492348.2492354.","DOI":"10.1145\/2492348.2492354"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2016.7582312"},{"key":"e_1_2_11_52_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.01.001"},{"key":"e_1_2_11_53_2","doi-asserted-by":"crossref","unstructured":"ShiY. AbhilashS. andHwangK. Cloudlet mesh for securing mobile clouds from intrusions and network attacks Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing Services and Engineering MobileCloud 2015 April 2015 San Francisco Calif USA 109\u2013118 https:\/\/doi.org\/10.1109\/MobileCloud.2015.15 2-s2.0-84939506714.","DOI":"10.1109\/MobileCloud.2015.15"},{"key":"e_1_2_11_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.122"},{"key":"e_1_2_11_55_2","doi-asserted-by":"crossref","unstructured":"WangY. UeharaT. andSasakiR. Fog computing: Issues and challenges in security and forensics Proceedings of the 39th IEEE Annual Computer Software and Applications Conference Workshops COMPSACW 2015 July 2015 Taichung Taiwan 53\u201359 https:\/\/doi.org\/10.1109\/COMPSAC.2015.173 2-s2.0-84962076525.","DOI":"10.1109\/COMPSAC.2015.173"},{"key":"e_1_2_11_56_2","doi-asserted-by":"crossref","unstructured":"StojmenovicI.andWenS. The fog computing paradigm: scenarios and security issues Proceedings of the Federated Conference on Computer Science and Information Systems (FedCSIS \u203214) September 2014 Warsaw Poland IEEE 1\u20138 https:\/\/doi.org\/10.15439\/2014f503 2-s2.0-84912130127.","DOI":"10.15439\/2014F503"},{"key":"e_1_2_11_57_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"e_1_2_11_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6400436"},{"key":"e_1_2_11_59_2","doi-asserted-by":"crossref","unstructured":"YiS. QinZ. andLiQ. Security and privacy issues of fog computing: A survey Proceedings of the Springer Conference on Wireless Algorithms Systems 2015 685\u2013695.","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"e_1_2_11_60_2","doi-asserted-by":"crossref","unstructured":"StolfoS. J. SalemM. B. andKeromytisA. D. Fog computing: Mitigating insider data theft attacks in the cloud Proceedings of the 1st IEEE Security and Privacy Workshops SPW 2012 May 2012 San Francisco Calif USA 125\u2013128 https:\/\/doi.org\/10.1109\/SPW.2012.19 2-s2.0-84864275237.","DOI":"10.1109\/SPW.2012.19"},{"key":"e_1_2_11_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.028"},{"key":"e_1_2_11_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2015.84"},{"key":"e_1_2_11_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.14"},{"key":"e_1_2_11_64_2","article-title":"Challenges in dealing with politically exposed persons","author":"Choo K.-K. R.","year":"2010","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"e_1_2_11_65_2","doi-asserted-by":"crossref","unstructured":"ZhouM. ZhangR. XieW. QianW. andZhouA. Security and privacy in cloud computing: a survey Proceedings of the 6th International Conference on Semantics Knowledge and Grid (SKG \u203210) November 2010 Beijing China 105\u2013112 https:\/\/doi.org\/10.1109\/skg.2010.19 2-s2.0-84880192224.","DOI":"10.1109\/SKG.2010.19"},{"key":"e_1_2_11_66_2","doi-asserted-by":"crossref","unstructured":"DongM. OtaK. andLiuA. Preserving source-location privacy through redundant fog loop for wireless sensor networks Proceedings of the 15th IEEE International Conference on Computer and Information Technology CIT 2015 14th IEEE International Conference on Ubiquitous Computing and Communications IUCC 2015 13th IEEE International Conference on Dependable Autonomic and Secure Computing DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing PICom 2015 October 2015 UK 1835\u20131842 2-s2.0-84964299970 https:\/\/doi.org\/10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.274.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.274"},{"key":"e_1_2_11_67_2","doi-asserted-by":"crossref","unstructured":"KulkarniS. SahaS. andHockenburyR. Preserving privacy in sensor-fog networks Proceedings of the 2014 9th International Conference for Internet Technology and Secured Transactions ICITST 2014 December 2014 UK 96\u201399 2-s2.0-84949922231 https:\/\/doi.org\/10.1109\/ICITST.2014.7038785.","DOI":"10.1109\/ICITST.2014.7038785"},{"key":"e_1_2_11_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"e_1_2_11_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.86"},{"key":"e_1_2_11_70_2","doi-asserted-by":"crossref","unstructured":"HaK. ChenZ. HuW. RichterW. PillaiP. andSatyanarayananM. Towards wearable cognitive assistance Proceedings of the 12th Annual International Conference on Mobile Systems Applications and Services MobiSys 2014 June 2014 USA 68\u201381 2-s2.0-84903125253 https:\/\/doi.org\/10.1145\/2594368.2594383.","DOI":"10.1145\/2594368.2594383"},{"key":"e_1_2_11_71_2","doi-asserted-by":"crossref","unstructured":"SatyanarayananM. ChenZ. HaK. HuW. RichterW. andPillaiP. Cloudlets: At the leading edge of mobile-cloud convergence Proceedings of the 2014 6th International Conference on Mobile Computing Applications and Services MobiCASE 2014 November 2014 USA 1\u20139 2-s2.0-84924366561 https:\/\/doi.org\/10.4108\/icst.mobicase.2014.257757.","DOI":"10.4108\/icst.mobicase.2014.257757"},{"key":"e_1_2_11_72_2","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"e_1_2_11_73_2","doi-asserted-by":"crossref","unstructured":"TruongN. B. LeeG. M. andGhamri-DoudaneY. Software defined networking-based vehicular Adhoc Network with Fog Computing Proceedings of the 14th IFIP\/IEEE International Symposium on Integrated Network Management (IM \u203215) May 2015 Ottawa Canada 1202\u20131207 https:\/\/doi.org\/10.1109\/inm.2015.7140467 2-s2.0-84942636228.","DOI":"10.1109\/INM.2015.7140467"},{"key":"e_1_2_11_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7321981"},{"key":"e_1_2_11_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2371999"},{"key":"e_1_2_11_76_2","doi-asserted-by":"publisher","DOI":"10.1002\/0470099747"},{"key":"e_1_2_11_77_2","doi-asserted-by":"crossref","unstructured":"TangB. ChenZ. HeffermanG. WeiT. HeH. andYangQ. A hierarchical distributed fog computing architecture for big data analysis in smart cities Proceedings of the ASE BigData SocialInformatics 2015.","DOI":"10.1145\/2818869.2818898"},{"key":"e_1_2_11_78_2","doi-asserted-by":"crossref","unstructured":"ShiY. DingG. WangH. Eduardo RomanH. andLuS. The fog computing service for healthcare Proceedings of the 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare Ubi-HealthTech 2015 May 2015 China 70\u201374 2-s2.0-84954148130 https:\/\/doi.org\/10.1109\/Ubi-HealthTech.2015.7203325.","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"e_1_2_11_79_2","doi-asserted-by":"crossref","unstructured":"WillisD. DasguptaA. andBanerjeeS. ParaDrop: A multi-tenant platform to dynamically install third party services on wireless gateways Proceedings of the 9th ACM MobiCom Workshop on Mobility in the Evolving Internet Architecture MobiArch 2014 September 2014 USA 43\u201348 2-s2.0-84911922940 https:\/\/doi.org\/10.1145\/2645892.2645901.","DOI":"10.1145\/2645892.2645901"},{"key":"e_1_2_11_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.016"},{"key":"e_1_2_11_81_2","doi-asserted-by":"crossref","unstructured":"HongK. LillethunD. RamachandranU. Ottenw\u00e4lderB. andKoldehofeB. Mobile fog: a programming model for large-scale applications on the internet of things Proceedings of the 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing (MCC \u203213) August 2013 Hong Kong China 15\u201320 https:\/\/doi.org\/10.1145\/2491266.2491270 2-s2.0-84883732282.","DOI":"10.1145\/2491266.2491270"},{"key":"e_1_2_11_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2485206"},{"key":"e_1_2_11_83_2","doi-asserted-by":"crossref","unstructured":"AazamM.andHuhE.-N. Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT Proceedings of the IEEE 29th International Conference on Advanced Information Networking and Applications (AINA \u203215) March 2015 Gwangiu South Korea IEEE 687\u2013694 https:\/\/doi.org\/10.1109\/aina.2015.254 2-s2.0-84946201873.","DOI":"10.1109\/AINA.2015.254"},{"key":"e_1_2_11_84_2","volume-title":"Unleash the power of the Internet of Things","author":"Solutions C. F. C.","year":"2015"},{"key":"e_1_2_11_85_2","doi-asserted-by":"crossref","unstructured":"DsouzaC. AhnG.-J. andTaguinodM. Policy-driven security management for fog computing: preliminary framework and a case study Proceedings of the 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI \u203214) August 2014 16\u201323 https:\/\/doi.org\/10.1109\/iri.2014.7051866 2-s2.0-84941286216.","DOI":"10.1109\/IRI.2014.7051866"},{"key":"e_1_2_11_86_2","doi-asserted-by":"crossref","unstructured":"MukherjeeA. PaulH. S. DeyS. andBanerjeeA. ANGELS for distributed analytics in IoT Proceedings of the 2014 IEEE World Forum on Internet of Things WF-IoT 2014 March 2014 Republic of Korea 565\u2013570 2-s2.0-84900394590 https:\/\/doi.org\/10.1109\/WF-IoT.2014.6803230.","DOI":"10.1109\/WF-IoT.2014.6803230"},{"key":"e_1_2_11_87_2","doi-asserted-by":"crossref","unstructured":"CaoY. HouP. BrownD. WangJ. andChenS. Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing Proceedings of the ACM Workshop on Mobile Big Data Mobidata 2015 China 43\u201348 2-s2.0-84950986038 https:\/\/doi.org\/10.1145\/2757384.2757398.","DOI":"10.1145\/2757384.2757398"},{"key":"e_1_2_11_88_2","doi-asserted-by":"crossref","unstructured":"LaineT. H. LeeC. andSukH. Mobile gateway for ubiquitous health care system using ZigBee and Bluetooth Proceedings of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2014 July 2014 UK 139\u2013145 2-s2.0-84938677693 https:\/\/doi.org\/10.1109\/IMIS.2014.17.","DOI":"10.1109\/IMIS.2014.17"},{"key":"e_1_2_11_89_2","doi-asserted-by":"crossref","unstructured":"GazisV. LeonardiA. MathioudakisK. SasloglouK. KikirasP. andSudhaakarR. Components of fog computing in an industrial internet of things context Proceedings of the 12th Annual IEEE International Conference on Sensing Communication and Networking - Workshops SECON Workshops 2015 June 2015 USA 37\u201342 2-s2.0-84964077704 https:\/\/doi.org\/10.1109\/SECONW.2015.7328144.","DOI":"10.1109\/SECONW.2015.7328144"},{"key":"e_1_2_11_90_2","doi-asserted-by":"crossref","unstructured":"HabakK. AmmarM. HarrasK. A. andZeguraE. Femto clouds: leveraging mobile devices to provide cloud service at the edge Proceedings of the 8th IEEE International Conference on Cloud Computing (CLOUD \u203215) July 2015 9\u201316 https:\/\/doi.org\/10.1109\/CLOUD.2015.12 2-s2.0-84960153004.","DOI":"10.1109\/CLOUD.2015.12"},{"key":"e_1_2_11_91_2","doi-asserted-by":"crossref","unstructured":"YanY.andSuW. A fog computing solution for advanced metering infrastructure Proceedings of the 2016 IEEE\/PES Transmission and Distribution Conference and Exposition T and D 2016 May 2016 USA 2-s2.0-84991383543 https:\/\/doi.org\/10.1109\/TDC.2016.7519890.","DOI":"10.1109\/TDC.2016.7519890"},{"key":"e_1_2_11_92_2","unstructured":"LuanT. H. GaoL. LiZ. XiangY. WeiG. andSunL. Fog computing: Focusing on mobile users at the edge https:\/\/arxiv.org\/abs\/1502.01815."},{"key":"e_1_2_11_93_2","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716665500"},{"key":"e_1_2_11_94_2","unstructured":"DastjerdiA. V. GuptaH. CalheirosR. N. GhoshS. K. andBuyyaR. Fog computing: Principles architectures and applications https:\/\/arxiv.org\/abs\/1601.02752."},{"key":"e_1_2_11_95_2","doi-asserted-by":"crossref","unstructured":"GiaT. N. JiangM. RahmaniA.-M. WesterlundT. LiljebergP. andTenhunenH. Fog computing in healthcare Internet of Things: A case study on ECG feature extraction Proceedings of the 15th IEEE International Conference on Computer and Information Technology CIT 2015 14th IEEE International Conference on Ubiquitous Computing and Communications IUCC 2015 13th IEEE International Conference on Dependable Autonomic and Secure Computing DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing PICom 2015 October 2015 UK 356\u2013363 2-s2.0-84964284114 https:\/\/doi.org\/10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.51"},{"key":"e_1_2_11_96_2","doi-asserted-by":"publisher","DOI":"10.5120\/21679-4773"},{"key":"e_1_2_11_97_2","unstructured":"MagurawalageC. S. YangK. andWangK. Aqua computing: Coupling computing and communications https:\/\/arxiv.org\/abs\/1510.07250."},{"key":"e_1_2_11_98_2","article-title":"Improving video performance with edge servers in the fog computing architecture","volume":"19","author":"Zhu X.","year":"2015","journal-title":"Intel Technology Journal"},{"key":"e_1_2_11_99_2","article-title":"Towards realizing video aware wireless networks","volume":"19","author":"Foerster J.","year":"2015","journal-title":"Intel Technology Journal"},{"key":"e_1_2_11_100_2","doi-asserted-by":"crossref","unstructured":"CaoY. ChenS. HouP. andBrownD. FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation Proceedings of the 10th IEEE International Conference on Networking Architecture and Storage NAS 2015 August 2015 USA 2\u201311 2-s2.0-84960857858 https:\/\/doi.org\/10.1109\/NAS.2015.7255196.","DOI":"10.1109\/NAS.2015.7255196"},{"key":"e_1_2_11_101_2","unstructured":"GiaT. N. JiangM. RahmaniA.-M. WesterlundT. MankodiyaK. LiljebergP.et al. Fog computing in body sensor networks: An energy efficient approach Proceedings of the Inernatinal Conference onIEEE International Body Sensor Networks 2015 1\u20137."},{"key":"e_1_2_11_102_2","doi-asserted-by":"crossref","unstructured":"AazamM.andHuhE.-N. E-HAMC: Leveraging Fog computing for emergency alert service Proceedings of the 13th IEEE International Conference on Pervasive Computing and Communication PerCom Workshops 2015 March 2015 USA 518\u2013523 2-s2.0-84946029667 https:\/\/doi.org\/10.1109\/PERCOMW.2015.7134091.","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"e_1_2_11_103_2","doi-asserted-by":"crossref","unstructured":"DubeyH. YangJ. ConstantN. AmiriA. M. YangQ. andMakodiyaK. Fog data: Enhancing telehealth big data through fog computing Proceedings of the ACM conference on ASE BigData &amp; SocialInformatics 2015 2015 https:\/\/doi.org\/10.1145\/2818869.2818889 2-s2.0-84960118857.","DOI":"10.1145\/2818869.2818889"},{"key":"e_1_2_11_104_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1634-x"},{"key":"e_1_2_11_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/2331675.2331679"},{"key":"e_1_2_11_106_2","doi-asserted-by":"crossref","unstructured":"ZhaoZ. HwangK. andVilletaJ. Game cloud design with virtualized CPU\/GPU servers and initial performance results Proceedings of the 2012 3rd ACM Workshop on Scientific Cloud Computing ScienceCloud \u203212 June 2012 Netherlands 23\u201330 2-s2.0-84863894546 https:\/\/doi.org\/10.1145\/2287036.2287042.","DOI":"10.1145\/2287036.2287042"},{"key":"e_1_2_11_107_2","doi-asserted-by":"crossref","unstructured":"LeeY.-T. ChenK.-T. Han-I Su andLeiC.-L. Are all games equally cloud-gaming-friendly? An electromyographic approach Proceedings of the 2012 11th Annual Workshop on Network and Systems Support for Games NetGames 2012 November 2012 Italy 2-s2.0-84873450694 https:\/\/doi.org\/10.1109\/NetGames.2012.6404025.","DOI":"10.1109\/NetGames.2012.6404025"},{"key":"e_1_2_11_108_2","unstructured":"ChoyS. WongB. SimonG. andRosenbergC. Edgecloud: A new hybrid platform for on-demand gaming 2012 University of Waterloo Edgecloud."},{"key":"e_1_2_11_109_2","doi-asserted-by":"crossref","unstructured":"LinY.andShenH. Cloud fog: Towards high quality of experience in cloud gaming Proceedings of the 44th International Conference on Parallel Processing ICPP 2015 September 2015 chn 500\u2013509 2-s2.0-84976504012 https:\/\/doi.org\/10.1109\/ICPP.2015.59.","DOI":"10.1109\/ICPP.2015.59"},{"key":"e_1_2_11_110_2","first-page":"75","article-title":"Clouds, big data, and smart assets: Ten tech-enabled business trends to watch","volume":"56","author":"Bughin J.","year":"2010","journal-title":"McKinsey Quarterly"},{"key":"e_1_2_11_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2682640"},{"key":"e_1_2_11_112_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10933-6_15"},{"key":"e_1_2_11_113_2","unstructured":"I-SCOOP From Cloud Computing to Fog Computing https:\/\/www.i-scoop.eu\/internet-of-things-guide\/#From_the_cloud_to_the_fog_in_IoT."},{"key":"e_1_2_11_114_2","doi-asserted-by":"crossref","unstructured":"ChakrabortyA. NavdaV. PadmanabhanV. N. andRamjeeR. Coordinating cellular background transfers using loadsense Proceedings of the 19th Annual International Conference on Mobile Computing and Networking MobiCom 2013 October 2013 usa 63\u201374 2-s2.0-84887095298 https:\/\/doi.org\/10.1145\/2500423.2500447.","DOI":"10.1145\/2500423.2500447"},{"key":"e_1_2_11_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377723"},{"key":"e_1_2_11_116_2","doi-asserted-by":"crossref","unstructured":"AryafarE. Keshavarz-HaddadA. WangM. andChiangM. RAT selection games in HetNets Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM \u203213) April 2013 Turin Italy 998\u20131006 https:\/\/doi.org\/10.1109\/infcom.2013.6566889 2-s2.0-84883102293.","DOI":"10.1109\/INFCOM.2013.6566889"},{"key":"e_1_2_11_117_2","doi-asserted-by":"crossref","unstructured":"ChungJ. Y. Joe-WongC. HaS. HongJ. W.-K. andChiangM. CYRUS: Towards client-defined cloud storage Proceedings of the 10th European Conference on Computer Systems EuroSys 2015 April 2015 France 2-s2.0-84929576282 https:\/\/doi.org\/10.1145\/2741948.2741951.","DOI":"10.1145\/2741948.2741951"},{"key":"e_1_2_11_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7293299"},{"key":"e_1_2_11_119_2","doi-asserted-by":"crossref","unstructured":"ChenX. ProulxB. GongX. andZhangJ. Social trust and social reciprocity based cooperative D2D communications Proceedings of the 14th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u203213) August 2013 Bangalore India ACM 187\u2013196 https:\/\/doi.org\/10.1145\/2491288.2491302 2-s2.0-84883029780.","DOI":"10.1145\/2491288.2491302"},{"key":"e_1_2_11_120_2","unstructured":"WongF. M. F. Joe-WongC. HaS. LiuZ. andChiangM. Mind your own bandwidth: An edge solution to peak-hour broadband congestion https:\/\/arxiv.org\/abs\/1312.7844."},{"key":"e_1_2_11_121_2","doi-asserted-by":"crossref","unstructured":"WongF. M. F. Joe-WongC. HaS. LiuZ. andChiangM. Improving user QoE for residential broadband: Adaptive traffic management at the network edge Proceedings of the 23rd IEEE International Symposium on Quality of Service IWQoS 2015 June 2015 USA 105\u2013114 2-s2.0-84963959993 https:\/\/doi.org\/10.1109\/IWQoS.2015.7404720.","DOI":"10.1109\/IWQoS.2015.7404720"},{"key":"e_1_2_11_122_2","doi-asserted-by":"crossref","unstructured":"DuY. AryafarE. CampJ. andChiangM. IBeam: Intelligent client-side multi-user beamforming in wireless networks Proceedings of the 33rd IEEE Conference on Computer Communications IEEE INFOCOM 2014 May 2014 Canada 817\u2013825 2-s2.0-84904437902 https:\/\/doi.org\/10.1109\/INFOCOM.2014.6848009.","DOI":"10.1109\/INFOCOM.2014.6848009"},{"key":"e_1_2_11_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2011.2109670"},{"key":"e_1_2_11_124_2","doi-asserted-by":"crossref","unstructured":"VatanparvarK.andFaruqueM. A. A. Demo abstract: Energy management as a service over fog computing platform Proceedings of the 6th ACM\/IEEE International Conference on Cyber-Physical Systems ICCPS 2015 April 2015 USA 248\u2013249 2-s2.0-84954125536 https:\/\/doi.org\/10.1145\/2735960.2735986.","DOI":"10.1145\/2735960.2735986"},{"key":"e_1_2_11_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2015.2471260"},{"key":"e_1_2_11_126_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2325071"},{"key":"e_1_2_11_127_2","doi-asserted-by":"crossref","unstructured":"YiS. HaoZ. QinZ. andLiQ. Fog computing: Platform and applications Proceedings of the 3rd Workshop on Hot Topics in Web Systems and Technologies HotWeb 2015 November 2015 USA 73\u201378 2-s2.0-84969509112 https:\/\/doi.org\/10.1109\/HotWeb.2015.22.","DOI":"10.1109\/HotWeb.2015.22"},{"key":"e_1_2_11_128_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10708-013-9516-8"},{"key":"e_1_2_11_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/2822875"},{"key":"e_1_2_11_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2808937"},{"key":"e_1_2_11_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2014.2327587"},{"key":"e_1_2_11_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2532863"},{"key":"e_1_2_11_133_2","doi-asserted-by":"crossref","unstructured":"KimO. T. T. Dang TriN. NguyenV. D. TranN. H. andHongC. S. A shared parking model in vehicular network using fog and cloud environment Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium APNOMS 2015 August 2015 Republic of Korea 321\u2013326 2-s2.0-84957600748 https:\/\/doi.org\/10.1109\/APNOMS.2015.7275447.","DOI":"10.1109\/APNOMS.2015.7275447"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7157192.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7157192.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/7157192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:06:21Z","timestamp":1723014381000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/7157192"}},"subtitle":[],"editor":[{"given":"Xuyun","family":"Zhang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":133,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/7157192"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7157192","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-02-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7157192"}}