2023
DOI: 10.1145/3571729
|View full text |Cite
|
Sign up to set email alerts
|

Resource Management in Cloud and Cloud-influenced Technologies for Internet of Things Applications

Abstract: The trend of adopting Internet of Things (IoT) in healthcare, smart cities, Industry 4.0, etc. is increasing by means of cloud computing, which provides on-demand storage and computation facilities over the Internet. To meet specific requirements of IoT applications, the cloud has also shifted its service offering platform to its next-generation models, such as fog, mist, and dew computing. As a result, the cloud and IoT have become part and parcel of smart applications that play significant roles in improving… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 128 publications
0
3
0
Order By: Relevance
“…The research community is gradually beginning to pay greater attention to task scheduling in fog computing, despite the fact that there is not a great deal of research on the subject. In distributed systems, the metaheuristic method is often used to schedule tasks and handle resources (Jeyaraj et al, 2023). But not much study has been done on how scheduling methods can be used in fog computing architecture.…”
Section: Literature Surveymentioning
confidence: 99%
“…The research community is gradually beginning to pay greater attention to task scheduling in fog computing, despite the fact that there is not a great deal of research on the subject. In distributed systems, the metaheuristic method is often used to schedule tasks and handle resources (Jeyaraj et al, 2023). But not much study has been done on how scheduling methods can be used in fog computing architecture.…”
Section: Literature Surveymentioning
confidence: 99%
“…Work [12] further divides cloud application security engineering and implementation into two main categories: systems and software development security and software acquisition security author [13] suggests their cloud storage-specific security model. The only difference between the two is that the proposal from [14] goes into greater detail and describes the theories as well as users associated with their proof-of-concept. However, neither of the proposals [15] has any experiments, simulations, or empirical data to support its fine-grained security model's efficacy or robustness.…”
Section: Data Protection In Cloud Based Social Networkmentioning
confidence: 99%
“…With the rapid development of wireless sensor networks [ 1 ], microelectromechanical systems [ 2 ], and the Internet of Things [ 3 ], more and more demands are being placed on portable power supplies. Traditional chemical batteries cannot provide a long-term and stable power supply [ 4 ] due to their low energy density, inability to be recycled, and environmental hazards [ 5 ].…”
Section: Introductionmentioning
confidence: 99%