This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
FIGURE 7: Fog Computing Architecture.
shown in Figure 7. The authors of [122] have considered
the fog computing architecture theoretically and mathemat-
ically while comparing the performance of fog computing
paradigm with traditional cloud computing framework based
on service latency and energy consumption. Fog computing
reduces the data traffic between cloud and network edge by
90% and average response time for a user by 20% when
compared with cloud-only model [123]. Authors in [124]
have discussed the definition and concept of fog computing
in-depth, comparing it with similar concepts such as mobile-
edge computing (MEC) and mobile cloud computing (MCC).
Authors in [124] have also introduced some applications like
real-time video analytics and augmented reality (AR), mobile
big data analytics, and content delivery and caching for fog
computing.
Chia sẻ với bạn bè của bạn: