Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Fog computing for sustainable smart cities: a survey
Perera C., Qin Y., Estrella J., Reiff-Marganiec S., Vasilakos A.  ACM Computing Surveys 50 (3): 1-43, 2017. Type: Article
Date Reviewed: Oct 5 2017

Fog computing attempts to bring the computational capabilities of clouds closer to the variety of devices that make up the Internet of Things (IoT) by creating local mini-clouds. It appears to be a very promising way to support large clusters of smart devices, as is the case in so-called “smart cities.” The authors survey the use of fog computing for sustainable smart cities with the idea of determining which features and requirements are needed for this purpose. The authors indicate that this is the first fog survey focusing on platform developers and end user perspectives. The paper provides eight fog use scenarios, with descriptions of the advantages and disadvantages of using fogs to handle them. Those scenarios guide the discussion of the needed fog features to support them.

The paper combines devices with fogs. In most of the literature, fogs are mini-clouds, with their own architecture, leading to a three-layer architecture; here, typical devices such as smartphones or complex sensors can become fogs. The three-layer architectures of [1,2] are not even mentioned; in fact, there is even a pattern describing a fog architecture [3], also not mentioned. Security is, for them, mostly about the protection of communications using cryptography. Authorization, logging, and intrusion detection are not even mentioned; those interested in fog security should look at [4]. Surprisingly, Cisco is not mentioned, although they introduced the concept of fog computing. Configuration should be related to architecture and governance, but these connections are not considered.

The survey has many references (a strong point) and discusses aspects such as performance, energy efficiency, cost, network protocols, and the like. At times, the paper becomes more of a tutorial than a survey. However, aspects of interest to developers such as architecture, safety, governance, compliance, virtualization, and reliability are not discussed at all. The survey can be valuable to those studying the lower architectural levels of fog-based systems, but certainly not for system developers.

Reviewer:  E. B. Fernandez Review #: CR145574 (1712-0824)
1) Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the Internet of Things. In Proceedings of the First ACM Mobile Cloud Computing Workshop ACM, 2012, 13–16.
2) Stojmenovic, I.; Wen, S. The fog computing paradigm: scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems IEEE, 2014, 1–8.
3) Syed, M. H.; Fernandez , E. B.; Ilyas, M. A pattern for fog computing. In Proceedings of the 10th International Conference on Pattern Languages of Programs ACM, 2016, 1–10.
4) Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Generation Computer Systems In Press, (2016), 1–30.
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
General (I.2.0 )
Cloud Computing (C.2.4 ... )
Would you recommend this review?
Other reviews under "General": Date
Minimally sufficient conditions for the evolution of social learning and the emergence of non-genetic evolutionary systems
Gonzalez M., Watson R., Bullock S.  Artificial Life 23(4): 493-517, 2017. Type: Article
May 17 2018
Beginning artificial intelligence with the Raspberry Pi
Norris D.,  Apress, New York, NY, 2017. 369 pp. Type: Book (978-1-484227-42-8)
May 11 2018
 Representation and reality in humans, other living organisms and intelligent machines
Dodig-Crnkovic G., Giovagnoli R.,  Springer International Publishing, New York, NY, 2017. 378 pp. Type: Book (978-3-319437-82-8)
Apr 6 2018

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2018 ThinkLoud, Inc.
Terms of Use
| Privacy Policy