ENTNET Project Article
ENTNET Project Article
There are several challenges that could Feature Fog Computing Edge Computing
occur in edge computing: Multi-layered, Single-layer,
Architecture intermediate processing at the
1. Security Concerns: Although edge processing source
computing can improve security in certain Layered approach, Simple, direct
Deployment
contexts, it however would introduce complex deployment on
Models
challenges related to protecting numerous configurations devices
edge devices and defending against attacks Lower than cloud, Minimal, processed
Latency
higher than edge at the edge
in a distributed network.
Highly scalable across Scalable, limited by
2. Management Complexity: Managing a Scalability
multiple nodes device capabilities
diverse array of edge devices, ensuring they
Enhanced by localized High, but dependent
are all properly functioning and up-to-date Security
processing on device security
will bring very significant challenges
Figure 4.0. Fog vs Edge Computing
especially across complex environments and
technologies.
The table above compares fog and edge
3. Interoperability Issues: Ensuring that
computing based on several key elements which
devices from different manufacturers work
are the architecture, deployment models, latency,
together seamlessly would remain a
scalability, and security.
challenge due to the varying of standards
and technologies.
1. Architecture: Fog computing utilizes multi
layered architecture acting as intermediate
And for the future directions:
processing between cloud and edge which
allows for a distributed processing
1. Enhanced Security Measures: Future
framework. Edge computing on the other
advancements in edge computing will most
hand, features a single-layer processing
likely focus on developing a robust security
which occurs on the edge itself which means
framework tailored to its distributed nature.
the data will be handled locally without
These will include the new encryption
needing to traverse to a centralized or
methods and also smarter anomaly
intermediate nodes allowing for faster
detection systems.
response times and reduced data
2. Greater Standardization: There will be
transmission.
increased efforts toward standardizing the
protocols and interfaces to ensure better
2. Deployment Model: Fog computing uses a
interoperability and ease of management
layered approach with complex
across every different manufacturers'
configurations. The complexity will not only
devices.
add more flexibility but also adds control on
3. AI Integration and Machine Learning:
where and how data is processed. Edge
Integrating AI at the edge will significantly
computing on the other hand is deployed
enhance the capability of edge devices to
directly, reducing the need for extensive
make intelligent decisions, learn from new
modifications or additions which means it is
data and autonomously improve operations.
less complex as it aims to leverage the
existing capabilities of edge devices to their
fullest.
[5] G. Mujica et al., “Edge and Fog computing [13] J. Gedeon, F. Brandherm, R. Egert, T.
platform for data fusion of complex Grube, and M. Mühlhäuser, “What the fog?
heterogeneous sensors,” Sensors, vol. 18, no. 11, Edge Computing revisited: promises,
p. 3630, Oct. 2018, doi: 10.3390/s18113630. applications and future challenges,” IEEE
Access, vol. 7, pp. 152847–152878, Jan. 2019,
[6] J. P. L. Pérez, J. Díaz, J. Berrocal, R. doi: 10.1109/access.2019.2948399.
López-Viana, and Á. González-Prieto, “Edge
computing,” Computing, vol. 104, no. 12, pp. [14] J. C. Guevara, R. Da Silva Torres, and N. L.
2711–2747, Jul. 2022, doi: S. Da Fonseca, “On the classification of fog
10.1007/s00607-022-01104-2. computing applications: A machine learning
perspective,” Journal of Network and Computer
[7] J. M. G. Sánchez et al., “Edge Computing for Applications, vol. 159, p. 102596, Jun. 2020,
Cyber-physical Systems: A Systematic mapping doi: 10.1016/j.jnca.2020.102596.
study emphasizing trustworthiness,” ACM
Transactions on Cyber-physical Systems, vol. 6, [15] K. Dolui and S. K. Datta, “Comparison of
no. 3, pp. 1–28, Jul. 2022, doi: edge computing implementations: Fog
10.1145/3539662. computing, cloudlet and mobile edge
computing,” Dwasd, Jun. 2017, doi:
[8] K. Dolui and S. K. Datta, “Comparison of 10.1109/giots.2017.8016213.
edge computing implementations: Fog
computing, cloudlet and mobile edge [16] W. Shi, G. Pallis, and Z. Xu, “Edge
computing,” Global Internet of Things Summit Computing [Scanning the issue],” Proceedings
(GIoTS), Jun. 2017, doi: of the IEEE, vol. 107, no. 8, pp. 1474–1481,
10.1109/giots.2017.8016213. Aug. 2019, doi: 10.1109/jproc.2019.2928287.
[9] A. Al-Qamash, I. Soliman, R. Abulibdeh, [17] “ICFEC 2024 - 8th IEEE International
and M. Saleh, “Cloud, Fog, and Edge Conference on Fog and Edge Computing 2024.”
Computing: A Software Engineering https://icfec2024.ontariotechu.ca/
Perspective,” International Conference on
Computer and Applications (ICCA), Aug. 2018, [18] A. Sunyaev, “Fog and Edge Computing,” in
doi: 10.1109/comapp.2018.8460443. Springer eBooks, 2020, pp. 237–264. doi:
10.1007/978-3-030-34957-8_8.
[10] P. PunithaIlayarani and M. M. Dominic,
“Anatomization of Fog Computing and Edge [19] I. Stojmenović, S. Wen, X. Huang, and H.
Computing,” IEEE International Conference on Luan, “An overview of Fog computing and its
Electrical, Computer and Communication security issues,” Concurrency and Computation,
Technologies (ICECCT), Feb. 2019, doi: vol. 28, no. 10, pp. 2991–3005, Apr. 2015, doi:
10.1109/icecct.2019.8869125. 10.1002/cpe.3485.
[11] “A smart manufacturing service system [20] F. Bonomi, R. A. Milito, J. Zhu, and S.
based on edge computing, fog computing, and Addepalli, “Fog computing and its role in the
cloud computing,” IEEE Journals & Magazine | internet of things,” MCC ’12, Aug. 2012, doi:
IEEE Xplore, 2019. 10.1145/2342509.2342513.
https://ieeexplore.ieee.org/document/8740963
[21] Ala Al-Fuqaha; Mohsen Guizani; Mehdi
Mohammadi; Mohammed Aledhari; Moussa
Ayyash, “Internet of Things: A Survey on
Enabling Technologies, Protocols, and
Applications,” Volume: 17, Issue: 4,
Fourthquarter 2015, doi:
10.1109/COMST.2015.2444095.