A Systematic Mapping Study of Cloud, Fog, and EdgeMobile Devices Management, Hierarchy Models and Business Models 2019
A Systematic Mapping Study of Cloud, Fog, and EdgeMobile Devices Management, Hierarchy Models and Business Models 2019
2, 91-101 (2019)
ASTESJ
www.astesj.com
ISSN: 2415-6698
Special Issue on Advancement in Engineering and Computer Science
A Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models
and Business Models
Isaac Odun-Ayo1,*, Rowland Goddy-Worlu1, Victor Geteloma 1, Emanuel Grant2
1
Department of Computer and Information Sciences, Covenant University, 112233, Nigeria
2
School of Electrical Engineering & Computer Science, University of North Dakota, 58202, USA.
1. Introduction custom-built applications for users on the internet, hence the user
do not need to bother about installation and license. In PaaS, the
The Cloud is a parallel and appropriated computing system user develops and deploys his application through the
comprising of interconnected and virtualized computers that are infrastructure made available by the CSP. In IaaS, the user utilized
powerfully displayed as a unified computing resource, which is resources on the CSP infrastructure on a pay as you go basis. The
dependent on service level approvals set up through dealings CSPs have massive data centers with state of the art system; hence,
between service providers and users [1]. Cloud computing is the user can start up without the cost of infrastructure. Although
basically interconnected computers and applications used to the CSPs strive in providing effective and trustworthy services on
deliver services over the Internet. When systems are connected in the cloud, there are also issues of trust [2]. The effectiveness of
this manner, device management also becomes paramount. Cloud cloud computing becomes very evident as services improve and
computing is presently delivering services at all layers hence, there expand regularly, due to the fundamental applications running on
is everything as a service, but there are three primary services in the cloud [3,4]. In addition, there are four cloud computing models
the cloud which are Software-as-a-Service (SaaS), Platform-as-a- namely the private, public, community and hybrid models. Private
Service (PaaS) and Infrastructure-as-a-Service (IaaS). In SaaS, clouds provide organizations infrastructures that are hosted on
major cloud service provider (CSP) like Salesforce.com offer premises or off premises making use of in house staff. Private
*
Corresponding Author: Isaac Odun-Ayo, Contact No. +234 802 88 29456, clouds are considered more secure. Public clouds provide massive
Email: [email protected] elastic, on-demand pool of resources to the users through the CSP
www.astesj.com 91
https://dx.doi.org/10.25046/aj040212
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
infrastructure. Community cloud make services available to on trending researches and subsequent expectations, and utilizing
institutions that share infrastructure but operate independently. the requirements for conducting a systematic review, all within the
Hybrid clouds provide the potential to host core applications on interval of July 2013 to October 2014.
private cloud and auxiliary applications on public clouds.
The authors in [15] analyzed the utilization of concept maps in
However, due to the process of virtualization and multitenancy on
Computer Science, which resulted in a systematic map focused on
the cloud, there are concerns about security [5,6].
gathering and analyzing previous articles on concept maps. This
Fog and edge computers carry out storage and processing at the resulted in a thorough examination of concept maps, with
edge of the cloud. This saves bandwidth and makes usage simple. emphasis on learning and teaching supports. Also, the searching
However, there are technologies that must be used to monitor these process involved the utilization of backward snowballing and
applications data and services operating within and at the edge of manual methods, and search strings applied on SCOPUS,
cloud computing. Edge computing is characterized by proximity ScienceDirect, Compedex, ACM DL, and IEEExplore digital
to end users, zone geographical distribution, and support for high libraries.
mobility and value addition for customer IoT services [7]. Mobile
edge computing aims at reducing both network latency and In [16], the researchers examined how games related methods
resource demand by shifting computing and storage capacities are implemented in software engineering, and how these methods
from the Internet cloud to the mobile edge [8]. In [9], the cloud assist specified software engineering knowledge domains. Based
system is described with a 3-layer hierarchy, the cloud computing on publications from 1974 to 2016, the authors utilized 156
infrastructure layer, the edge computing or mobile clouds, which primary studies, which were centered on using and evaluating
are utilized in vertically integrated applications where a part of the games in software engineering education. The mapping procedure
processing and analytics happens on the edge device while the was done in line with the guidelines provided in [12].
cloud is used for coordination and data retrieval [10]. The service In [17], the authors did a mapping of power system model by
measurement index framework discussed in [11] is a business providing a summary of power system models and its subsequent
model that provides an understanding of CSP rankings, and has 7 usage by European organizations in terms of analysis of their
major characteristics namely: accountability, agility, assurance, modeling features and identification of modeling gaps. 228
financial, performance, security and privacy and usability [11]. surveys were sent out to power experts for data extraction, while
Systematic mapping studies provides a platform for 82 questionnaires were eventually completed and utilized for the
categorizing research using a scheme and structure indicating the mapping.
frequency of research in such an area and the results are presented In [18], a mapping study of domain-specific languages was
visually on a map. Systematic mapping requires less effort: yet conducted with a primary interest in the type of contribution and
provides a more coarse-grained overview in the area of study [12]. research, and the area of focus. By exploring reputable articles
This enables the coverage of the research field to be determined. from 2006 to 2012, a mapping study was conducted by defining
The systematic process in this work was accomplished using three research questions, conducting the search, and extracting the data.
facets: the topic, contribution and research facets. The topic facet
extracts key consideration from the scope of study. The In [19], the authors focused on searching studies on “legal
contribution facet deals with method or mode of the work, while theory” and “legal concepts”. The selected studies were grouped
the research facet considers the nature of research such as on contributions in terms of language, tool, method, and model.
evaluation or opinion. While the goal of this study is to conduct a The other steps include identification of the used legal theories in
systematic mapping study, the rest of the paper is organized as legal core ontologies building process, identification of focus with
follows: Section II examines the related work. Section III a clear recommendation on the use of two ontologies, and
examines the materials and methods, Section IV presents the analyzing each highlighted research for conclusive findings about
results and discussion and Section V is the conclusion and legal and ontological research.
suggestion for future work.
In [20], the researchers gave a summary of an empirical
2. Related Work research in software cloud-based testing in the process of building
a classification scheme. The authors examined functional and non-
In [13], the authors explored the developing stage of a
functional testing techniques, their applications, and their
systematic mapping study by identifying the software designs
peculiarities. Sixty-nine (69) primary studies out of seventy-five
present at the requirement engineering stage of the project, and
(75) research articles were utilized for a rigorous statistical
providing a comprehension of the roles played by these patterns
analysis, and an eventual quantitative result. Most articles utilized
based on basic parameters required in the development process. A
a singular experiment approach for evaluating their expected
protocol was developed for the study with basic steps to enable the
result.
replication of their work by the research community, which results
in confirming the validation of the research. For this paper, ACM In [21], the authors presented a comprehensive review of
DL, IEEExplore, SCOPUS, and Web of Science digital libraries knowledge management in organization with a focus on the
were utilized, and the guidelines laid down in [12] were adhered potential role of Information Technology (IT) in the process. They
to. further discussed several important issues bordering on the process
In [14], the authors dwelled on describing the protocol for a of managing knowledge and the role of IT in propelling and
systematic map, in relation to domain-specific languages (DSL). assisting these processes. Also, emphasis was made on the need to
The authors focused on channeling their work on the advanced support in creating, storing, transferring and applying knowledge
apprehension of the DSL domain of research, while emphasizing in organizations.
www.astesj.com 92
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
In [22], the authors discussed the usefulness and limitations of further discussed the difficulties of literature search in the ever-
systematic literature review in information system and social increasing dynamic setting of data frameworks, and proffer
sciences. They are of the opinion that the general stand that solutions on how these difficulties can be dealt with.
systematic literature review provide a holistic and superior
approach to literature review is not only questionable but also In [29], the authors presented the systematic mapping study of
unacceptable. In their argument and justification of this, they high-performance computing and the cloud which based their
concluded that caution and restrains should be exercised when work on the concepts of [27]. This study provided six classes of
choosing systematic literature review as it could undermine critical studies in the areas of architecture, virtualization, application,
engagement with literature and the scholarly nature of academic optimization, design and implementation, and performances in
work. relation to the focus of study. The selected studies were applied on
the contribution facet such tool, method, and model. In addition,
In [23], the authors discussed the lessons learned from utilizing the selected studies were used on the research facet which dealt
a systematic literature review process on software engineering with evaluation, validation and solution research.
domain. The authors summarized the review process, highlighted
the reviews of other authors and finally extracted and discussed In [30], the researchers examined the systematic mapping
findings as regards applying this practice to software engineering study of cloud resources management and scalability in brokering,
domain. scheduling, capacity planning and elasticity. The classification
scheme in relation to resource management, discussed scalability,
In [24], the researchers opined that research reviews must pay brokering, scheduling, capacity planning, elasticity, and resource
close attention to rigorous methodology that is required of primary sharing. The selected studies were applied on the contribution facet
researcher. The author further conceptualized the research review such metric, tool, method, and model. In addition, the selected
as a scientific enquiry involving five stages that parallel those studies were applied to the types of research.
primary research, which includes: formulating the problem,
collecting data, evaluating the data points, analyzing and 3. Materials and Methods
interpreting the data, and lastly, presenting the results. All the
functions; sources of variance and the other potential treats to The systematic mapping study is a useful tool for both
validity with each stage are discussed. researchers and practitioners alike. A mapping study provides a
visual representation of scope of work in a particular discipline.
In [25], the authors provided useful insights to researchers for This study was carried out utilizing the guidelines on systematic
carrying out literature review. They suggested synthesizing trends mapping studies, as seen in [12]. Systematic mapping study
and patterns while preparing to write literature review, among involves replicating a process for deducing and interpreting
which includes: the purpose and voice before beginning to write accessible materials, in line with a research objective [31]. This
must be considered, then consider how to reassemble the notes as important process (Figure 1) involves defining the research
well as create a topical outline that traces the argument in the question and outlining the scope of the review. Next is screening
literature review. All of these provides the guidelines for the articles to select the important ones and key wording the
developing a thorough and coherent literature review. abstract of the articles, with the goal of creating a classification
In [26], the researchers assessed the effectiveness of a scheme. Finally, the last step involves extracting the data, which
systematic literature review, which recommends evidence-based ultimately leads to creating the systematic map. At every stage of
software engineering methods for aggregating evidence. The the process there was an outcome which was refined for better
authors utilized manually searched Journals (10) and conference overall output of the systematic map.
proceedings (4). Of the twenty (20) significant articles considered, 3.1. Definition of Research Questions
eight (8) articles focused on research trends rather than evaluating
the technique utilized, and seven (7) systematic literature reviews The goal of a systematic map is to provide more insight into
focused on estimating the cost. The quality of systematic literature the quantity and type of work being conducted in a particular
reviews was fair with only three scoring less than 2 out of 4. discipline. It may also be necessary to know the places where such
work were published. These issues help in determining the
In [27], the authors have an opinion that the evaluation of the appropriate research questions to apply to the study in this paper.
approaches of systematic mapping, as carried out by researchers,
is needed in identifying the improved guidelines that are centered The research questions are:
on the experiences from existing systematic maps and literature RQ 1: What areas are addressed and what number of articles
reviews. In the affirmative, the authors carried out a systematic are covered in the highlighted areas of the research topic?
mapping study and considered a few practices of the systematic
review guidelines. They discovered that amongst the extensive RQ 2: What sets of articles are published in the highlighted
number of studies carried out, various guidelines were utilized and areas and what are their evaluations and originality?
integrated, leading to multiple methods of conducting systematic
3.2. Conduct of Research for Primary Studies
mapping studies.
In [28], the authors stressed the importance of literature review For the purpose of getting papers for this study, four (4) major
in scientific enquiry and the need to avoid standing on the digital libraries based on their impact factor of conferences and
shoulders of dwarf literature search, which remains a point of journal publication were utilized. Table 1 contains the digital
concern for enhancing a productive literature review. The authors libraries and their corresponding uniform resource locator (URL).
www.astesj.com 93
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
Table 1: Electronic databases used for the systematic mapping study 3.4. Keywording of Abstracts
Electronic Databases URL
Keyword of abstracts is an important process in systematic
ACM http://dl.acm.org/ mapping, used to design the classification scheme for the study and
involves the following stages as shown in Figure 1.
IEEE http://ieeexplore.ieee.org/xplore
Definition of Conduct Research Screening of Keywording Data Extraction and
SCIENCE DIRECT http://www.sciencedirect.com/ Research Questions Papers Using Abstracts Mapping Process
SPRINGER http;//www.springerlink.com/
Review Scope All Papers Relevant papers Classification Systematic Map
Scheme Abstracts
The search string was designed based on population, outcome
and intervention of the papers. The keywords used in the research Figure 1: The systematic mapping process [27]
was gotten from all parts of the structure of this study’s title; the
search string is as follows: Key wording was useful in decreasing the required time for
designing a classification scheme for cloud management and
(TITLE (cloud) AND KEY (cloud) AND (TITLE-ABS-KEY) model studies. Also, key wording ensured that only the significant
(fog) OR TITLE-ABS-KEY (edge and mobile) OR TITLE-ABS- papers were considered in the scheme. The abstracts were studied
KEY (“devices management”) AND (KEY (Models) OR TITLE in order to extract concepts and keywords relating to the focus of
(models) this study. Therefore, keywords from different publications were
The searches were performed on the electronic database, which combined together to give satisfactory knowledge about the nature
involves utilizing the designed search string above on document of the contributing research. This was eventually utilized in
metadata to guarantee the inclusion of significant articles. For this determining the facts or categories of the study.
study, findings from relevant databases relating to cloud A cluster of keywords were finally used in this paper to
computing and computer science were utilized, and a total of 120 determine the categories and the eventual systematic map. In this
papers were relevant to be included out of an underlying pursuit paper, the three categories focused on topics based on all aspect of
comprising of 1339 papers. This study covered the period 2001 – the title of the study. The second facets discussed the types of
2018. The list of primary studies utilized for this work is at the contributions in relation to metric, tool, method, process and model
Appendix. [12]. The third facet concentrated on research types such as
3.3. Screening of Papers for Inclusion and Exclusion evaluation and validation.
3.5. Research type Facts with Category and Description
The importance of selection criteria is identifying and
incorporating all papers relevant to the study. This was a vital A study of this nature will be inadequate without all the
aspect of the study. It was essential to use the inclusion and categories outlined. The following is the classification of research
exclusion criteria to eliminate irrelevant articles as regards to methods, which was utilized for the third facet, as listed in [32]:
cloud, fog, and edge/models device management. In addition, the
criteria was utilized in removing all materials not providing 1. Validation of research: The utilized methods are unique
answers to the research question. Some abstract usually mention but not yet executed, either in form of an application or
only one aspect of the focus of study without further details and experiments.
such papers are also excluded. This study also excluded panel 2. Evaluation research: The methods have been executed
discussions, editorials, prefaces, presentation slides, summaries and analyzed with a proof of concept. Outcomes are
and tutorials. It was pertinent to consider articles that had the main examined in terms of advantages and disadvantages.
focus and able to also provide some secondary details. The main
focus of this study was devices management and models as it 3. Solution proposal: The method offers an essential
relates to cloud, fog, and computing. Therefore, the inclusion and solution to a problem; the benefits and application of such
exclusion process was done using details depicted in Table 2. results are also outlined.
Table 2: Inclusion and exclusion criteria 4. Philosophical papers: The papers discuss techniques
that provide new methods of solving a problem in relation
Inclusion criteria Exclusion criteria to concepts and framework.
The abstract explicitly mentions The paper lies outside the area 5. Opinion papers: The research papers do not apply any
cloud, fog, edge, mobile devices of cloud computing as it
known methods, but simply expressed the opinion of
individuals.
management, hierarchy models identifies with cloud
6. Experience papers: This paper relates the personal
and business models. management. The paper does
experience of the researcher. It offers insight into how
Furthermore, discussions in this not contribute to issues of something was done
area are meant to achieve cloud management in the cloud. These categories were considered adequate and sufficient to be
management. used in the classification scheme of this study, as to research facet.
The papers included in this study were all examined based on the
various research categories.
www.astesj.com 94
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
3.6. Data Extraction and Mapping Studies publications that discussed process in relations to the field of study
was 14.04% out of the 114 papers included. In addition, method
Relevant articles were sorted into a classification scheme at the contributed 24.56%, model had 42.98% and tool contributed
key wording stage. This next step allowed data extraction from the 18.42%. There were no contributions at all from metric.
primary studies. The method of extracting data shaped the nature
of the classification scheme. The procedure for extracting data was Models discussion contributed 42.98% of the papers reviewed.
achieved on Microsoft Excel tables. The Excel tables contained the In relation to the topics, model had 5.22% in terms of architecture,
various groups of the classification scheme. The frequency of 12.28% in terms of application, and 3.51% in the area of
publications in each category was extracted to different tables. The implementation, 10.53% in the area of networking, 3.51% in the
frequency of publications in each category was combined into a aspect of mobile computing and 7.89% on embedded system.
table either contenting the topic/contribution category or the Other aspects of topic and contribution aspect are reflected in
topic/research category. The analysis was focused on presenting Figure 2.
the frequencies of articles based on the entries made into the 4.2. Type and Research Facet
various Excel tables. The essence was to identify which aspect of
device management and models as it relates to cloud, fog and The list of primary studies used for examining the topics
edge/mobile computing were given more emphasis in this study against the types of research is at Table 4. On the x-axis of the right
This enabled the determination of gaps and made it easy to identify quadrant of Figure 2 are the results of the types of research
areas for further research. conducted with respect to the field of study. The result indicated
that evaluation research in terms of the field of study was 27.5%
Based on the results extracted to the Excel tables, bubble plots
out of 120 primary studies. Also, validation was discussed in
were subsequently utilized in presenting the frequency of the
17.5% of the papers, solution in 32.5%, philosophical in 5.83%,
articles using a map. The map included a two x-y scatter plot with
experience in 15.83% and opinion in 0.83%.
bubbles at the crossing point of the classifications. The size of the
bubble coordinates corresponds to the quantity of articles in such Solution proposal constituted 32.5% of the papers examined in
combined categories. There were two quadrants based on the three this field of study in relation to the topics. Solution proposal had
facets under consideration. Each quadrant provided different 1.67% in terms of architecture, 8.33% in terms of applications, 5%
visualized maps on the basis of the intersection of the topic in relation to implementation, 11.67% with respect to networking,
category with either the contribution or research category. The 3.33% in terms of mobile computing and 2.5% in terms of
different facets could be considered simultaneously, providing an embedded system. Other aspects of research and topic contribution
overview of the results of the study. is as shown in Figure 2.
4. Results and Discussion 4.3. Major Findings
The analysis of the result is meant to present the frequencies of From Figure 2,
publication in each category, and to identify which category has
a. It can be identified from the visual map that there were
been emphasized in past research [12]. The essence of this was the
more publications on implementations and mobile
identification of gaps and the possibility of researching further.
networking that discussed metric with 26%, more
From the analysis, gaps were identified by using the systematic
publication on applications that examined model with
map, which showed topic areas where there was dearth of study,
and indicated the areas that were explored as regards articles. In 12.28%, more papers on architecture that discussed
this systematic study, high-level categories was utilized in method with 6.14% and more work on embedded systems
examining process at 6.14%.
assessing the primary studies, which was used to create the
systematic map. b. Similarly, on the left quadrant of Figure 2, there were
more articles on mobile computing that discussed
4.1. Topic and Contribution Facet
evaluation research with 9.17%, more publications on
The topics extracted at the classification scheme in this field of application that examined validation research with 5%,
study comprise of the following: more work on network in terms of solution proposal at
11.67%, more publication on mobile computing in terms
1. Architecture of philosophical paper with 3.33%, more materials on
2. Application application in term of experience papers and only one
opinion paper related to embedded system.
3. Implementation
c. On the other hand, this study had shown that there were
4. Networking no discussions at all relating to metric in this field of
5. Mobile computing study. There were no papers on architecture in terms of
tool. There were no articles on implementation and
6. Embedded systems networking in terms of process. In addition, there was no
The list of primary studies used for checking the topics against work on architecture, application, and networking in the
the types of contributions is at Table 3. The systematic map is area of philosophical papers.
shown at Figure 2. The contribution facet shows the type of d. Furthermore, publications on application topic as it
contribution to the field of study. The results showed that related to tool, mobile networking and implementations
www.astesj.com 95
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
Application 28, 25, 36, 39, 38, 45, 48, 5, 11, 14, 86, 105, 108,
54, 57, 71, 78, 82, 85, 94,
115, 119,
Implementation 13, 19, 26, 101, 118, 120 50, 55, 87, 100, 2, 43, 46,
Networking 22, 24, 29, 31, 33, 7, 9, 12, 15, 16, 91, 96, 20, 41, 47, 70,
98, 103, 104,106, 112, 79, 83,
Mobile 3, 6, 10, 23, 109, 110, 27, 32, 34, 35 2, 73, 75, 76, 44, 53, 56, 58,
computing 89, 99 71
Embedded 49, 61, 62, 1, 64, 65, 66, 67, 68, 81 17, 21, 51, 52,
Systems 74, 115, 119 97, 113, 114,
Figure 2: Systematic map of cloud fog, and edge/mobile devices management, hierarchy and business models
www.astesj.com 96
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
Application 78, 102 11, 14, 59, 63, 105, 108 5, 36, 39, 38,48, 54, 25, 28, 45, 57,
82, 85, 115, 119 69, 71, 86, 94
Implementation 2 13, 87 19, 26, 43, 46, 118, 101 50, 55, 100
120
Networking 7, 20, 22, 24, 29, 31, 41, 47, 88, 91 9, 12, 15, 16, 49, 61, 79, 83
33 62, 70, 104,106, 112,
96, 98, 103
Mobile 3, 6, 10, 23, 34, 35, 76, 89, 107 40, 44, 73, 117 53, 56, 58, 72 27, 32, 109,
computing 75, 99, 111, 113, 114 110
in terms of model, embedded systems were the least attention. Despite the large quantity of publications in this field of
having, 0.88%, 3.51%, 0.88% and 1.75% respectively. study, the systematic map has shown that there are shortage of
publications in this field of study. The visual representation
e. In terms of the topic and research types, implementation
provided by the systematic map enhances decision on areas of
topic in relation to evaluation research, implementation
further research. This systematic mapping study has been able to
and architecture in relation to solution proposals,
identify some areas where there were less emphasis on the topic,
implementation with respect to philosophical paper,
based on the categories used in the scheme. This paper has
architecture and embedded systems in terms of
therefore contributed to knowledge by highlighting the different
experience papers had the least publications with 0.83%,
aspects of the study with gaps, and recommending them for further
1.67%, 0.83% and 0.83% respectively.
studies. Also, further research could be carried out to validate this
From the foregoing, the visual appeal of a systematic map study or resolve contradictory issues. In summary, this study
assists in summarizing and offering researchers with the likelihood created a systematic map that could be advantageous to the cloud
of stimulating interest in the results. community, and will assist researchers in uncovering the critical
gaps that were not previously explored.
The different categories combined together makes the bubble
plot more useful. It is imperative to state that the creation of a Conflict of Interest
systematic map in the absence of a successive systematic review is
valuable in itself. This is because the systematic map enables the The authors declare no conflict of interest.
identification of research gaps and shortage of publication in this
Acknowledgment
field of study. This paper provided six classes of studies namely
architecture, application, implementation, networking, mobile We acknowledge the support and sponsorship provided by
computing and embedded systems, which could be discussed as Covenant University through the Centre for Research, Innovation,
regards to either tool, model, method, metric and process or
and Discovery (CUCRID).
evaluation, validation, solution, philosophical and opinion
research. The few aforementioned areas, along these lines, are References
suggested for additional research, and the rundown of primary
studies would likewise help meaning researchers. [1] R. Buyya, J. Broberg, and A. Goscinski, “Cloud computing principles and
paradigms,” John Wiley and Son, 2011, pp. 4-10.
5. Conclusion [2] I. Odun-Ayo, S. Misra, N. Omoregbe, E. Onibere, Y. Bulama, and R.
Damasevičius, “Cloud-based security driven human resource management
Cloud computing is providing opportunities in different areas system,” Frontiers in Artificial Intelligence and Applications. 295, pp. 96 –
106, 2017. doi:10.3233/978-1-61499-773-3-96
of human life. More areas of cloud research are opening up on a [3] I. Odun-Ayo, M. Ananya, F. Agono, and R. Goddy-Worlu, “Cloud
regular basis. This has led to increasing studies and consequent computing architecture: A critical analysis,” In IEEE Proceedings of the
publications in cloud computing. There are volumes of research 2018 18th International Conference on Computational Science and Its
effort that is useful both to the cloud users and cloud providers Applications (ICCSA 2018), pp. 1-7 doi: 10.1109/ICCSA.2018.8439638
[4] I. Odun-Ayo, B. Odede, and R. Ahuja, “Cloud applications management-
alike. The aspect of devices management and models in relation to Issues and developments,” Lecture Notes in Computer Science (including
cloud, fog, edge and mobile computing has continued to receive
www.astesj.com 97
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in systematic literature review,” Information and Software Technology, vol.
Bioinformatics), Vol.10963, pp. 683-694, 2018, Berlin, Germany: Springer. 51, no. 1, pp. 7-15, 2009.
[5] I. Odun-Ayo, S. Misra, O. Abayomi-Alli, and O. Ajayi, “Cloud multi- [27] K. Petersen, S. Vakkalanka, and L. Kuzniarz, “Guidelines for conducting
tenancy: Issues and developments,” UCC '17 Companion, Companion systematic mapping studies in software engineering: An update,”
Proceedings of the10th International Conference on Utility and Cloud Information and Software Technology, vol. 64, pp. 1-18, 2015.
Computing. pp. 209 – 214, 2017. [28] J. Vom Brocke, A. Simons, K. Riemer, B. Niehaves, R. Plattfaut, and A.
[6] I. Odun-Ayo, N. Omoregbe, M. Odusami, and O. Ajayi, “Cloud ownership Cleven, “Standing on the Shoulders of Giants: Challenges and
and reliability - Issues and developments,” Lecture Notes in Computer Recommendations of Literature Search in Information Systems Research,”
Science (including subseries Lecture Notes in Artificial Intelligence and CAIS, vol. 37, no. 9, 2015
Lecture Notes in Bioinformatics), Vol. 10658, pp. 231-240, 2017, Berlin, [29] I. Odun-Ayo, R. Goddy-Worlu, O. Ajayi and E. Grant, “A Systematic
Germany: Springer. Mapping Study of High Performance Computing and the Cloud”. ARPN
[7] S. K. Datta and C. Bonnet, “An Edge computing Architecture integrating Journal of Engineering and Applied Sciences, vol. 13, Issue 24, pp. 9886-
virtual IOT Devices,” EURECO Sophia Antipolis, France. 9700, 1 Dec 2018.
[8] T. M. Beck and M. Maier, “Mobile Edge computing challenges for future [30] I. Odun-Ayo, O. Ajayi, R. Goddy-Worlu and J. Yahaya, “A Systematic
Virtual Networking Embedding Algorithms,” IARIA, 2014. Mapping Study of Cloud Resources Management and Scalability in
[9] J. Wenke and M. Jiangbo, “A Reference Model of cloud operating and open Brokering, Scheduling, Capacity Planning and Elasticity”. Asian Journal of
source software implementation mapping,” 18th IEEE international Work Scientific Research, vol. 12, pp. 151-166, 2019.
Shop on enables Technologies: Infrastructures for collaborations [31] A. C. Muhammed and A. B. Muhammed, “A systematic Mapping study of
Enterprises, 2009. software architectures for cloud based systems,” Software System section,
[10] P. Varshney and Y. Simmhan, “Demonstrating Fog computing: IT University of Copenhagen, 2014.
Characterizing Architectures, Applications and Abstractions,” arxiv: [32] R. Wieringa, N. A. Maiden, N. R. Mead and C. Rolland, “Requirement
1702.06331v1 [cs.Dc] 21 Feb. 2017. engineering paper classification and evaluation criteria. A proposal and a
[11] G. Baranwal and D. P. Vidyarthi, “A cloud service selection model using discussion,” Requirement Engineering, vol. 11, pp. 102-107, 2006.
improved ranked voting method”, Concurring and Computation: Practice
and Experience,” Wileyonhinelibrary.com, 2008. Appendix: List of primary studies
[12] K. Petersen, R. Feldt, S. Mujtaba and M. Matisson, “Systematic Mapping
Studies In Software Engineering”, EASE'08 Proceedings of the 12th
[1] Al-Jaroodi, J., Mohamed, N., Jawhar, I., Mahmoud, S. CoTWare: A Cloud
international conference on Evaluation and Assessment in Software
of Things Middleware (2017) Proceedings - IEEE 37th International
Engineering, Italy — June 26 - 27, 2008, , pp. 68-77
Conference on Distributed Computing Systems Workshops, ICDCSW 2017,
[13] J.L. Barros-Justo, A.L. Cravero-Leal, F. B. Benitti, and R. Capilla-Sevilla,
art. no. 7979819, pp. 214-219.
“Systematic mapping protocol: the impact of using software patterns during
[2] Al-Joboury, I.M., Al-Hemiary, E.H. F2CDM: Internet of things for
requirements engineering activities in real-world settings,” Cornell
healthcare network based fog-to-cloud and data-in-motion using MQTT
University Library, 2017. arXiv:1701.05747v1 [cs.SE].
protocol (2017) Lecture Notes in Computer Science (including subseries
[14] T. Kosar, S. Bohra, and M. A. Mernik, “Protocol of a systematic mapping
Lecture Notes in Artificial Intelligence and Lecture Notes in
study for domain-specific languages,” Journal of Information and Software
Bioinformatics), 10542 LNCS, pp. 368-379.
Technology 21(C). pp. 77-91, 2016.
[3] Alonso-Monsalve, S., García-Carballeira, F., Calderón, A. A heterogeneous
[15] V. Santos, E. F. Souza, K. R. Felizardo, and N. L. Vijaykumar, “Analyzing
mobile cloud computing model for hybrid clouds (2018) Future Generation
the Use of Concept Maps in Computer Science: A Systematic Mapping
Computer Systems, . Article in Press.
Study,” Informatics in Education, 16(2) pp. 257–288, 2017.
[4] Alsaffar, A.A., Pham, H.P., Hong, C.-S., Huh, E.-N., Aazam, M. An
doi:10.15388/infedu.2017.13
Architecture of IoT Service Delegation and Resource Allocation Based on
[16] M. Souza, L. Veado, R. T. Moreira, E. Figueiredo, and H. Costa, “A
Collaboration between Fog and Cloud Computing (2016) Mobile
systematic mapping study on game-related methods for software engineering
Information Systems, 2016, art. no. 6123234, .
education,” Information and Software Technology 95, pp. 201-218, 2018.
[5] Anantula, P.R., Someswar, G.M. Protecting data in cloud environment from
[17] C. R. Fernandez-Blanco, F. Careri, K. Kavvadias, I. Hidalgo Gonzalez, A.
intruders using fog computing mechanism and control flows (2018)
Zucker, and E. Peteves, “Systematic mapping of power system models:
Proceedings of the 2nd International Conference on Communication and
Expert survey,” EUR 28875 EN, Publications Office of the European Union,
Electronics Systems, ICCES 2017, 2018-January, pp. 176-182.
Luxembourg, 2017, ISBN 978-92-79-76462-2, doi:10.2760/422399,
[6] Arfat, Y., Aqib, M., Mehmood, R., Albeshri, A., Katib, I., Albogami, N.,
JRC109123.
Alzahrani, A. Enabling Smarter Societies through Mobile Big Data Fogs and
[18] M. Mernik, “Domain-specific languages: A systematic mapping study,”
Clouds (2017) Procedia Computer Science, 109, pp. 1128-1133.
International Conference on Current Trends in Theory and Practice of
[7] Arun, S.H., Sharma, S.K., Chaurasia, S., Kumar, R. Detection and analysis
Informatics, Lecture Notes in Computer Science, Vol. 10139, pp. 464-472,
of fog/low cloud using Ceilometer and INSAT-3D satellite data over Delhi
2017, Berlin, Germany: Springer.
Earth Station, New Delhi (2017) 38th Asian Conference on Remote Sensing
[19] C. Griffo, J. P. A. Almeida, and G. Guizzardi, “A systematic mapping of the
- Space Applications: Touching Human Lives, ACRS 2017, 2017-October, .
literature on legal core ontologies,” In Brazilian Conference on Ontologies,
[8] Bhatia, M., Sood, S.K. Exploring Temporal Analytics in Fog-Cloud
ONTOBRAS 15, 2015, CEUR Workshop Proceedings.
Architecture for Smart Office HealthCare (2018) Mobile Networks and
[20] A. Ahmad, P. Brereton, and P. Andras, “A systematic mapping study of
Applications, pp. 1-19. Article in Press.
empirical studies on software cloud testing methods,” In IEEE International
[9] Bruschi, R., Davoli, F., Lago, P., Lombardo, A., Lombardo, C., Rametta, C.,
Conference on Software Quality, Reliability and Security Companion, pp.
Schembra, G. An SDN/NFV platform for personal cloud services (2017)
555-562, 2017.
IEEE Transactions on Network and Service Management, 14 (4), pp. 1143-
[21] M. Alavi, and D. E. Leidner, “Knowledge management and knowledge
1156.
management systems: Conceptual foundations and research issues,” MIS
[10] Bruschi, R., Lago, P., Lombardo, C. In-Network Programmability for Next-
Quarterly, pp. 107-136, 2001.
generation Personal Cloud Service Support (INPUT) (2016) Procedia
[22] S. K. Boell, and D. Cecez-Kecmanovic, “On being ‘Systematic’ in literature
Computer Science, 97, pp. 114-117.
reviews,” In Formulating Research Methods for Information Systems,
[11] Byrne, J., Svorobej, S., Giannoutakis, K.M., Tzovaras, D., Byrne, P.J.,
Palgrave Macmillan, London, pp. 48-78, 2015.
Östberg, P.-O., Gourinovitch, A., Lynn, T. A review of cloud computing
[23] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner, and M. Khalil,
simulation platforms & related environments (2017) CLOSER 2017 -
“Lessons from applying the systematic literature review process within the
Proceedings of the 7th International Conference on Cloud Computing and
software engineering domain,” Journal of Systems and Software, vol. 80, no.
Services Science, pp. 651-663.
4, pp. 571-583, 2007.
[12] Chaudhary, D., Bhushan, K., Gupta, B.B. Survey on DDoS attacks and
[24] H. M. Cooper, “Scientific guidelines for conducting integrative research
defense mechanisms in cloud and fog computing (2018) International
reviews,” Review of educational research, vol. 52, no.2, pp. 291-302, 1982.
Journal of E-Services and Mobile Applications, 10 (3), pp. 61-83.
[25] J. L. Galvan, and M. C. Galvan, “Writing literature reviews: A guide for
[13] Chaudhary, R., Kumar, N., Zeadally, S. Network Service Chaining in Fog
students of the social and behavioral sciences,” Routledge, 2017.
and Cloud Computing for the 5G Environment: Data Management and
[26] B. Kitchenham, O. P. Brereton, D. Budgen, M. Turner, J. Bailey, and S.
Linkman, “Systematic literature reviews in software engineering–a
www.astesj.com 98
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
Security Challenges (2017) IEEE Communications Magazine, 55 (11), art. Cloud Computing Technology and Science, CloudCom, 2017-December,
no. 8114560, pp. 114-122. pp. 331-334.
[14] Chen, F., Li, H., Liu, J., Li, B., Xu, K., Hu, Y. Migrating big video data to [36] Huang, C.-Y., Xu, K. Reliable realtime streaming in vehicular cloud-fog
cloud: a peer-assisted approach for VoD (2017) Peer-to-Peer Networking computing networks (2016) 2016 IEEE/CIC International Conference on
and Applications, pp. 1-15. Article in Press. Communications in China, ICCC 2016, art. no. 7636838, .
[15] Deepali, Bhushan, K. DDoS attack defense framework for cloud using fog [37] Hung, S.-C., Hsu, H., Lien, S.-Y., Chen, K.-C. Architecture harmonization
computing (2018) RTEICT 2017 - 2nd IEEE International Conference on between cloud radio access networks and fog networks (2015) IEEE Access,
Recent Trends in Electronics, Information and Communication Technology, 3, art. no. 07359093, pp. 3019-3034.
Proceedings, 2018-January, pp. 534-538. [38] Jalali, F., Hinton, K., Ayre, R., Alpcan, T., Tucker, R.S. Fog computing may
[16] Deng, R., Lu, R., Lai, C., Luan, T.H., Liang, H. Optimal Workload help to save energy in cloud computing (2016) IEEE Journal on Selected
Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Areas in Communications, 34 (5), art. no. 7439752, pp. 1728-1739.
Consumption (2016) IEEE Internet of Things Journal, 3 (6), art. no. [39] Jayalath, C., Stephen, J.J., Eugster, P. Atmosphere: A universal cross-cloud
7467406, pp. 1171-1181. communication infrastructure (2013) Lecture Notes in Computer Science
[17] Desirena Lopez, H.J., Siller, M., Huerta, I. Internet of vehicles: Cloud and (including subseries Lecture Notes in Artificial Intelligence and Lecture
fog computing approaches (2017) Proceedings - 2017 IEEE International Notes in Bioinformatics), 8275 LNCS, pp. 163-182.
Conference on Service Operations and Logistics, and Informatics, SOLI [40] Kanapram, D., Lamanna, G., Repetto, M. Exploring the trade-off between
2017, 2017-January, pp. 211-216. performance and energy consumption in cloud infrastructures (2017) 2017
[18] Dixit, A., Yadav, A.K., Kumar, S. An efficient architecture and algorithm 2nd International Conference on Fog and Mobile Edge Computing, FMEC
for server provisioning in Cloud computing using clustering approach (2017) 2017, art. no. 7946418, pp. 121-126.
Proceedings of the 5th International Conference on System Modeling and [41] Khalid, A., Shahbaz, M. Adaptive deadline-aware scheme (ADAS) for data
Advancement in Research Trends, SMART 2016, art. no. 7894532, pp. 260- migration between cloud and fog layers (2018) KSII Transactions on Internet
266. and Information Systems, 12 (3), pp. 1002-1015.
[19] Elkhatib, Y., Porter, B., Ribeiro, H.B., Zhani, M.F., Qadir, J., Riviere, E. On [42] Khalid, A., Shahbaz, M. Service architecture models for fog computing: A
using micro-clouds to deliver the fog (2017) IEEE Internet Computing, 21 remedy for latency issues in data access from clouds (2017) KSII
(2), art. no. 7867723, pp. 8-15. Transactions on Internet and Information Systems, 11 (5), pp. 2310-2345.
[20] El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Elmougy, S., Ghoneim, [43] Kim, O.T.T., Dang Tri, N., Nguyen, V.D., Tran, N.H., Hong, C.S. A shared
A. Secure quantum steganography protocol for fog cloud internet of things parking model in vehicular network using fog and cloud environment (2015)
(2018) IEEE Access, 6, pp. 10332-10340. 17th Asia-Pacific Network Operations and Management Symposium:
[21] Elmisery, A.M., Rho, S., Aborizka, M. A new computing environment for Managing a Very Connected World, APNOMS 2015, art. no. 7275447, pp.
collective privacy protection from constrained healthcare devices to IoT 321-326.
cloud services (2017) Cluster Computing, pp. 1-28. Article in Press. [44] Kirkham, T., Armstrong, D., Djemame, K., Jiang, M. Risk driven Smart
[22] Elmisery, A.M., Sertovic, M. Privacy enhanced cloud-based Home resource management using cloud services (2014) Future Generation
recommendation service for implicit discovery of relevant support groups in Computer Systems, 38, pp. 13-22.
healthcare social networks (2017) International Journal of Grid and High [45] Kirkman, S.S., Newman, R. Bridging the Cloud Trust Gap: Using ORCON
Performance Computing, 9 (1), pp. 75-91. Policy to Manage Consumer Trust between Different Clouds (2017)
[23] Elmroth, E., Leitner, P., Schulte, S., Venugopal, S. Connecting Fog and Proceedings - 2017 IEEE 1st International Conference on Edge Computing,
Cloud Computing (2017) IEEE Cloud Computing, 4 (2), art. no. 7912269, EDGE 2017, art. no. 8029260, pp. 82-89.
pp. 22-25. [46] Kitanov, S., Janevski, T. Energy efficiency of 5G mobile networks in hybrid
[24] Escamilla-Ambrosio, P.J., Rodríguez-Mota, A., Aguirre-Anaya, E., Acosta- Fog and Cloud Computing environment (2016) CEUR Workshop
Bermejo, R., Salinas-Rosales, M. Distributing computing in the internet of Proceedings, 1746, pp. 41-46.
things: Cloud, fog and edge computing overview (2018) Studies in [47] Krishnan, Y.N., Bhagwat, C.N., Utpat, A.P. Fog computing - Network based
Computational Intelligence, 731, pp. 87-115. cloud computing (2015) 2nd International Conference on Electronics and
[25] Farris, I., Militano, L., Nitti, M., Atzori, L., Iera, A. MIFaaS: A Mobile-IoT- Communication Systems, ICECS 2015, art. no. 7124902, pp. 250-251.
Federation-as-a-Service Model for dynamic cooperation of IoT Cloud [48] Kumar, R., Rajalakshmi, S. Mobile cloud computing: Standard approach to
Providers (2017) Future Generation Computer Systems, 70, pp. 126-137. protecting and securing of mobile cloud ecosystems Computer Sciences and
[26] Farris, I., Girau, R., Militano, L., Nitti, M., Atzori, L., Iera, A., Morabito, G. Applications, CSA 2013, art. no. 6835687, pp. 663-669.
Social Virtual Objects in the Edge Cloud (2015) IEEE Cloud Computing, 2 [49] Liang, Y., Wang, T., Bhuiyan, M.Z.A., Liu, A. Research on coupling
(6), art. no. 7397053, pp. 20-28. reliability problem in sensor-cloud system (2017) Lecture Notes in
[27] Farris, I., Militano, L., Nitti, M., Atzori, L., Iera, A. Federated edge-assisted Computer Science (including subseries Lecture Notes in Artificial
mobile clouds for service provisioning in heterogeneous IoT environments Intelligence and Lecture Notes in Bioinformatics), 10658 LNCS, pp. 468-
(2015) IEEE World Forum on Internet of Things, WF-IoT 2015 - 478.
Proceedings, art. no. 7389120, pp. 591-596. [50] Lin, Y., Shen, H. CloudFog: Leveraging Fog to Extend Cloud Gaming for
[28] Fernandez, E.B., Yoshioka, N., Washizaki, H., Syed, M.H. Modeling and Thin-Client MMOG with High Quality of Service (2017) IEEE Transactions
security in cloud ecosystems (2016) Future Internet, 8 (2), art. no. 13, . on Parallel and Distributed Systems, 28 (2), art. no. 7465785, pp. 431-445.
[29] Goleva, R., Stainov, R., Kletnikov, N., Achkoski, J., Mirtchev, S., Ganchev, [51] Lin, Y., Shen, H. Cloud fog: Towards high quality of experience in cloud
I., Savov, A. Performance Analysis of End-to-End Sensor-to-Cloud Personal gaming (2015) Proceedings of the International Conference on Parallel
Living Platform (2017) Procedia Computer Science, 113, pp. 615-620. Processing, 2015-December, art. no. 7349605, pp. 500-509.
[30] Gupta, R., Garg, R. Mobile Applications Modelling and Security Handling [52] Lin, Y., Shen, H. Leveraging Fog to Extend Cloud Gaming for Thin-Client
in Cloud-Centric Internet of Things (2015) Proceedings - 2015 2nd IEEE MMOG with High Quality of Experience (2015) Proceedings - International
International Conference on Advances in Computing and Communication Conference on Distributed Computing Systems, 2015-July, art. no. 7164961,
Engineering, ICACCE 2015, art. no. 7306695, pp. 285-290. pp. 734-735.
[31] Hajibaba, M., Gorgin, S. A review on modern distributed computing [53] Lobo, F.L., Lima, M., Oliveira, H., Harrington, J., El-Khatib, K. SoLVE: A
paradigms: Cloud computing, jungle computing and fog computing (2014) localization system framework for VANets using the cloud and fog
Journal of Computing and Information Technology, 22 (2), pp. 69-84. computing (2017) DIVANet 2017 - Proceedings of the 6th ACM Symposium
[32] Hajji, W., Tso, F.P. Understanding the performance of low power raspberry on Development and Analysis of Intelligent Vehicular Networks and
pi cloud for big data (2016) Electronics (Switzerland), 5 (2), art. no. 29, . Applications, Co-located with MSWiM 2017, pp. 17-22.
[33] Hani, Q.B., Ditcher, J.P. Stand-Out Segmentation Access Control for Cloud [54] Lubamba, C., Bagula, A. Cyber-healthcare cloud computing interoperability
Outsourced Data (2017) Proceedings - 2017 IEEE 1st International using the HL7-CDA standard (2017) Proceedings - IEEE Symposium on
Conference on Edge Computing, EDGE 2017, art. no. 8029278, pp. 210- Computers and Communications, art. no. 8024513, pp. 105-110.
215. [55] Macías-Macías, M., García-Orellana, C.J., González-Velasco, H., Gallardo-
[34] Hasan, R., Hossain, M., Khan, R. Aura: An incentive-driven ad-hoc IoT Caballero, R. Independent component analysis for cloud screening of
cloud framework for proximal mobile computation offloading (2017) Future meteosat images (2003) Lecture Notes in Computer Science (including
Generation Computer Systems, . Article in Press. subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
[35] Hong, H.-J. From cloud computing to fog computing: Unleash the power of Bioinformatics), 2687, pp. 551-558.
edge and end devices (2017) Proceedings of the International Conference on
www.astesj.com 99
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
[56] Macías-Macías, M., García-Orellana, C.J., González-Velasco, H.M., J.L., Lynn, T., Mancuso, V., Svorobej, S., Torneus, A., Wesner, S., Willis,
Gallardo-Caballero, R., Serrano-Pérez, A. A comparison of PCA and GA P., Domaschka, J. Reliable capacity provisioning for distributed
selected features for cloud field classification (2002) Lecture Notes in cloud/edge/fog computing applications (2017) EuCNC 2017 - European
Artificial Intelligence (Subseries of Lecture Notes in Computer Science), Conference on Networks and Communications, art. no. 7980667, .
2527, pp. 42-49. [77] Pahl, C., Helmer, S., Miori, L., Sanin, J., Lee, B. A container-based edge
[57] Mahmoud, M.M.E., Rodrigues, J.J.P.C., Saleem, K., Al-Muhtadi, J., Kumar, cloud PaaS architecture based on raspberry Pi clusters (2016) Proceedings -
N., Korotaev, V. Towards energy-aware fog-enabled cloud of things for 2016 4th International Conference on Future Internet of Things and Cloud
healthcare (2018) Computers and Electrical Engineering, 67, pp. 58-69. Workshops, W-FiCloud 2016, art. no. 7592710, pp. 117-124.
[58] Makitalo, N., Ometov, A., Kannisto, J., Andreev, S., Koucheryavy, Y., [78] Pham, X.-Q., Man, N.D., Tri, N.D.T., Thai, N.Q., Huh, E.-N. A cost- and
Mikkonen, T. Safe and Secure Execution at the Network Edge: A performance-effective approach for task scheduling based on collaboration
Framework for Coordinating Cloud, Fog, and Edge (2018) IEEE Software, . between cloud and fog computing (2017) International Journal of Distributed
Article in Press. Sensor Networks, 13 (11), .
[59] Manasrah, A.M., Aldomi, A., Gupta, B.B. An optimized service broker [79] Pradilla, J.V., Palau, C.E. Micro Virtual Machines (MicroVMs) for Cloud-
routing policy based on differential evolution algorithm in fog/cloud assisted Cyber-Physical Systems (CPS) (2016) Internet of Things: Principles
environment (2017) Cluster Computing, pp. 1-15. Article in Press. and Paradigms, pp. 125-142.
[60] Masip-Bruin, X., Marin-Tordera, E., Jukan, A., Ren, G.-J. Managing [80] Ramirez, W., Masip-Bruin, X., Marin-Tordera, E., Souza, V.B.C., Jukan, A.,
resources continuity from the edge to the cloud: Architecture and Ren, G.-J., Gonzalez de Dios, O. Evaluating the benefits of combined and
performance (2018) Future Generation Computer Systems, 79, pp. 777-785. continuous Fog-to-Cloud architectures (2017) Computer Communications,
[61] Masip-Bruin, X., Marin-Tordera, E., Gomez, A., Barbosa, V., Alonso, A. 113, pp. 43-52.
Will it be cloud or will it be fog? F2C, A novel flagship computing paradigm [81] Renner, T., Kliem, A., Kao, O. The Device Cloud - Applying Cloud
for highly demanding services (2017) FTC 2016 - Proceedings of Future Computing Concepts to the Internet of Things (2014) Proceedings - 2014
Technologies Conference, art. no. 7821744, pp. 1129-1136. IEEE International Conference on Ubiquitous Intelligence and Computing,
[62] Meng, X., Wang, W., Zhang, Z. Delay-Constrained Hybrid Computation 2014 IEEE International Conference on Autonomic and Trusted Computing,
Offloading with Cloud and Fog Computing (2017) IEEE Access, 5, art. no. 2014 IEEE International Conference on Scalable Computing and
8023966, pp. 21355-21367. Communications and Associated Symposia/Workshops, UIC-ATC-
[63] Mo, Y., Peng, M., Xiang, H., Sun, Y., Ji, X. Resource allocation in cloud ScalCom 2014, art. no. 7306981, pp. 396-401.
radio access networks with device-to-device communications (2017) IEEE [82] Seo, D.B., Jeon, Y.-B., Lee, S.-H., Lee, K.-H. Cloud computing for
Access, 5, art. no. 7855644, pp. 1250-1262. ubiquitous computing on M2M and IoT environment mobile application
[64] Mohamed, N., Al-Jaroodi, J., Jawhar, I., Lazarova-Molnar, S., Mahmoud, S. (2016) Cluster Computing, 19 (2), pp. 1001-1013.
SmartCityWare: A service-oriented middleware for cloud and fog enabled [83] Shah-Mansouri, H., Wong, V.W.S. Hierarchical Fog-Cloud Computing for
smart city services (2017) IEEE Access, 5, art. no. 7990214, pp. 17576- IoT Systems: A Computation Offloading Game (2018) IEEE Internet of
17588. Things Journal, . Article in Press.
[65] Mohamed, N., Lazarova-Molnar, S., Jawhar, I., Al-Jaroodi, J. Towards [84] Sharma, P.K., Chen, M.-Y., Park, J.H. A Software Defined Fog Node Based
Service-Oriented Middleware for Fog and Cloud Integrated Cyber Physical Distributed Blockchain Cloud Architecture for IoT (2018) IEEE Access, 6,
Systems (2017) Proceedings - IEEE 37th International Conference on art. no. 8053750, pp. 115-124.
Distributed Computing Systems Workshops, ICDCSW 2017, art. no. [85] Sharma, S.K., Wang, X. Live Data Analytics with Collaborative Edge and
7979797, pp. 67-74. Cloud Processing in Wireless IoT Networks (2017) IEEE Access, 5, art. no.
[66] Mohamed, N., Lazarova-Molnar, S., Al-Jaroodi, J. Cloud of things: 7882669, pp. 4621-4635.
Optimizing smart city services (2017) 2017 7th International Conference on [86] Shekhar, S., Gokhale, A. Dynamic resource management across cloud-edge
Modeling, Simulation, and Applied Optimization, ICMSAO 2017, art. no. resources for performance-sensitive applications (2017) Proceedings - 2017
7934875, . 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid
[67] Mohan, N., Zhou, P., Govindaraj, K., Kangasharju, J. Managing data in Computing, CCGRID 2017, art. no. 7973763, pp. 707-710.
computational edge clouds (2017) MECOMM 2017 - Proceedings of the [87] Shekhar, S., Gokhale, A. Poster abstract: Enabling IoT applications via
2017 Workshop on Mobile Edge Communications, Part of SIGCOMM 2017, dynamic cloud-edge resource management (2017) Proceedings - 2017
pp. 19-24. IEEE/ACM 2nd International Conference on Internet-of-Things Design and
[68] Mohan, N., Kangasharju, J. Edge-Fog cloud: A distributed cloud for Internet Implementation, IoTDI 2017 (part of CPS Week), pp. 331-332.
of Things computations (2017) 2016 Cloudification of the Internet of Things, [88] Shen, S., Huang, L., Zhou, H., Yu, S., Fan, E., Cao, Q. Multistage Signaling
CIoT 2016, art. no. 7872914, . Game-Based Optimal Detection Strategies for Suppressing Malware
[69] Mueller, H., Gogouvitis, S.V., Seitz, A., Bruegge, B. Seamless computing Diffusion in Fog-Cloud-Based IoT Networks (2018) IEEE Internet of Things
for industrial systems spanning cloud and edge (2017) Proceedings - 2017 Journal, 5 (2), pp. 1043-1054.
International Conference on High Performance Computing and Simulation, [89] Shirazi, S.N., Gouglidis, A., Farshad, A., Hutchison, D. The extended cloud:
HPCS 2017, art. no. 8035079, pp. 209-216. Review and analysis of mobile edge computing and fog from a security and
[70] Mueller, H., Gogouvitis, S.V., Haitof, H., Seitz, A., Bruegge, B. Poster resilience perspective (2017) IEEE Journal on Selected Areas in
abstract: Continuous computing from cloud to edge (2016) Proceedings - 1st Communications, 35 (11), art. no. 8060526, pp. 2586-2595.
IEEE/ACM Symposium on Edge Computing, SEC 2016, art. no. 7774685, [90] Shroff, G.Enterprise cloud computing: Technology, architecture,
pp. 97-98. applications (2010) Enterprise Cloud Computing: Technology, Architecture,
[71] Munir, A., Kansakar, P., Khan, S.U. IFCIoT: Integrated Fog Cloud IoT: A Applications, 9780521760959, pp. 1-273.
novel architectural paradigm for the future Internet of Things (2017) IEEE [91] Simonet, A., Lebre, A., Orgerie, A.-C. Deploying distributed cloud
Consumer Electronics Magazine, 6 (3), art. no. 7948854, pp. 74-82. infrastructures: Who and at what cost? (2016) Proceedings - 2016 IEEE
[72] Nan, Y., Li, W., Bao, W., Delicato, F.C., Pires, P.F., Zomaya, A.Y. A International Conference on Cloud Engineering Workshops, IC2EW 2016,
dynamic tradeoff data processing framework for delay-sensitive applications art. no. 7527837, pp. 178-183.
in Cloud of Things systems (2018) Journal of Parallel and Distributed [92] Sinaeepourfard, A., Garcia, J., Masip-Bruin, X., Marin-Tordera, E. A Novel
Computing, 112, pp. 53-66. Architecture for Efficient Fog to Cloud Data Management in Smart Cities
[73] Nan, Y., Li, W., Bao, W., Delicato, F.C., Pires, P.F., Dou, Y., Zomaya, A.Y. (2017) Proceedings - International Conference on Distributed Computing
Adaptive Energy-Aware Computation Offloading for Cloud of Things Systems, art. no. 7980258, pp. 2622-2623.
Systems (2017) IEEE Access, 5, art. no. 8081765, pp. 23947-23957. [93] Singh, H., Bonev, B., Petkov, P., Patil, S. Cloud attenuation model at
[74] Okafor, K.C., Ugwoke, F.N., Obayi, A.A. Evaluation of virtualized osmotic millimeter frequency bands (2018) 2017 International Conference on
cloud network using discrete event Branch-And-Bound heuristics (2018) Infocom Technologies and Unmanned Systems: Trends and Future
2017 IEEE 3rd International Conference on Electro-Technology for National Directions, ICTUS 2017, 2018-January, pp. 175-180.
Development, NIGERCON 2017, 2018-January, pp. 425-437. [94] Siravenha, A.C., Sousa, D., Bispo, A., Pelaes, E. Evaluating inpainting
[75] Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.-K.R., Dlodlo, M. From methods to the satellite images clouds and shadows removing (2011)
Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Communications in Computer and Information Science, 260 CCIS, pp. 56-
Framework (2017) IEEE Access, 5, art. no. 7896564, pp. 8284-8300. 65.
[76] Ostberg, P.-O., Byrne, J., Casari, P., Eardley, P., Anta, A.F., Forsman, J., [95] Souza, V.B., Masip-Bruin, X., Marín-Tordera, E., Sànchez-López, S.,
Kennedy, J., Le Duc, T., Marino, M.N., Loomba, R., Pena, M.A.L., Veiga, Garcia, J., Ren, G.J., Jukan, A., Juan Ferrer, A. Towards a proper service
www.astesj.com 100
I. Odun-Ayo et al. / Advances in Science, Technology and Engineering Systems Journal Vol. 4, No. 2, 91-101 (2019)
placement in combined Fog-to-Cloud (F2C) architectures (2018) Future [115] Wang, T., Zeng, J., Bhuiyan, M.Z.A., Tian, H., Cai, Y., Chen, Y., Zhong, B.
Generation Computer Systems, 87, pp. 1-15. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location
[96] Souza, V.B., Masip-Bruin, X., Marin-Tordera, E., Ramirez, W., Sanchez- Services (2017) IEEE Access, 5, art. no. 7918561, pp. 7692-7701.
Lopez, S. Proactive vs reactive failure recovery assessment in combined [116] 2016) IEEE Workshop on Local and Metropolitan Area Networks, 2016-
Fog-to-Cloud (F2C) systems (2017) IEEE International Workshop on August, art. no. 7548853, .
Computer Aided Modeling and Design of Communication Links and [117] Yannuzzi, M., Milito, R., Serral-Gracia, R., Montero, D., Nemirovsky, M.
Networks, CAMAD, 2017-June, art. no. 8031528, Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and
[97] Souza, V.B.C., Ramirez, W., Masip-Bruin, X., Marin-Tordera, E., Ren, G., more Fog Computing(2014) 2014 IEEE 19th International Workshop on
Tashakor, G. Handling service allocation in combined Fog-cloud scenarios Computer Aided Modeling and Design of Communication Links and
(2016) 2016 IEEE International Conference on Communications, ICC 2016, Networks, CAMAD 2014, art. no. 7033259, pp. 325-329.
art. no. 7511465, . [118] Zeng, J., Wang, T., Jia, W., Peng, S., Wang, G. A Survey on Sensor-Cloud
[98] Srinivas, K.K., Ramana, T.V. Severe cause of cloud attenuation and rain (2017) Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 54
attenuation on space communication link at millimetre band and (5), pp. 925-939.
differentiation between rain attenuation and cloud attenuation (2017) [119] Zeng, J., Wang, T., Lai, Y., Liang, J., Chen, H. Data Delivery from WSNs
Proceedings - 7th IEEE International Advanced Computing Conference, to Cloud Based on a Fog Structure (2017) Proceedings - 2016 International
IACC 2017, art. no. 7976797, pp. 255-259. Conference on Advanced Cloud and Big Data, CBD 2016, art. no. 7815194,
[99] Stankova, E.N., Korkhov, V.V., Kulabukhova, N.V., Vasilenko, A.Y., pp. 104-109.
Holod, I.I. Computational environment for numerical modeling of the results [120] Zhao, W., Liu, J., Hara, T. Optimal Replica Distribution in Edge-Node-
of cloud seeding (2016) Lecture Notes in Computer Science (including Assisted Cloud-P2P Platforms for Real-Time Streaming (2018) IEEE
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Transactions on Vehicular Technology, . Article in Press.
Bioinformatics), 9788, pp. 454-462.
[100] Syed, M.H., Fernandez, E.B. Cloud ecosystems support for internet of things
and DevOps using patterns (2016) Proceedings - 2016 IEEE 1st International
Conference on Internet-of-Things Design and Implementation, IoTDI 2016,
art. no. 7471379, pp. 301-304.
[101] Taherkordi, A., Eliassen, F. Poster abstract: Data-centric IoT services
provisioning in Fog-Cloud computing systems (2017) Proceedings - 2017
IEEE/ACM 2nd International Conference on Internet-of-Things Design and
Implementation, IoTDI 2017 (part of CPS Week), pp. 317-318.
[102] Tang, C., Wei, X., Xiao, S., Chen, W., Fang, W., Zhang, W., Hao, M. A
Mobile Cloud Based Scheduling Strategy for Industrial Internet of Things
(2018) IEEE Access, 6, pp. 7262-7275.
[103] Tao, M., Ota, K., Dong, M. Foud: Integrating Fog and Cloud for 5G-Enabled
V2G Networks (2017) IEEE Network, 31 (2), art. no. 7884943, pp. 8-13.
[104] Teerapittayanon, S., McDanel, B., Kung, H.T. Distributed Deep Neural
Networks over the Cloud, the Edge and End Devices (2017) Proceedings -
International Conference on Distributed Computing Systems, art. no.
7979979, pp. 328-339.
[105] Tinini, R.I., Reis, L.C.M., Batista, D.M., Figueiredo, G.B., Tornatore, M.,
Mukherjee, B. Optimal Placement of Virtualized BBU Processing in Hybrid
Cloud-Fog RAN over TWDM-PON (2018) 2017 IEEE Global
Communications Conference, GLOBECOM 2017 - Proceedings, 2018-
January, pp. 1-6.
[106] Truong, H.-L., Narendra, N.C., Lin, K.-J. Notes on ensembles of IoT,
network functions and clouds for service-oriented computing and
applications (2018) Service Oriented Computing and Applications, 12 (1), .
[107] Tseng, F.-H., Cho, H.-H., Chang, K.-D., Li, J.-C., Shih, T.K. Application-
oriented offloading in heterogeneous networks for mobile cloud computing
(2018) Enterprise Information Systems, 12 (4), pp. 398-413.
[108] Van Kempen, A., Crivat, T., Trubert, B., Roy, D., Pierre, G. MEC-ConPaaS:
An Experimental Single-Board Based Mobile Edge Cloud (2017)
Proceedings - 5th IEEE International Conference on Mobile Cloud
Computing, Services, and Engineering, MobileCloud 2017, art. no. 7944867,
pp. 17-24.
[109] Varghese, B., Buyya, R. Next generation cloud computing: New trends and
research directions (2018) Future Generation Computer Systems, 79, pp.
849-861.
[110] Wang, H., Wang, Z., Domingo-Ferrer, J. Anonymous and secure aggregation
scheme in fog-based public cloud computing (2018) Future Generation
Computer Systems, 78, pp. 712-719.
[111] Wang, J., Yang, Y., Zhang, G., Yu, S. Climatic trend of cloud amount related
to the aerosol characteristics in Beijing during (2010) Acta Meteorologica
Sinica, 24 (6), pp. 762-775.
[112] Wang, L., Xie, W., Li, L., Pei, J. A thin cloud and fog removal method for
remote sensing multi-spectral images (2013) Shenzhen Daxue Xuebao
(Ligong Ban)/Journal of Shenzhen University Science and Engineering, 30
(6), pp. 592-597.
[113] Wang, S., Urgaonkar, R., He, T., Chan, K., Zafer, M., Leung, K.K. Dynamic
Service Placement for Mobile Micro-Clouds with Predicted Future Costs
(2017) IEEE Transactions on Parallel and Distributed Systems, 28 (4), pp.
1002-1016.
[114] Wang, T., Li, Y., Chen, Y., Tian, H., Cai, Y., Jia, W., Wang, B. Fog-based
evaluation approach for trustworthy communication in sensor-cloud system
(2017) IEEE Communications Letters, 21 (11), art. no. 8010796, pp. 2532-
2535.
www.astesj.com 101