2018
DOI: 10.1109/mcom.2018.1700795
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

Abstract: Fog computing is a recent research trend to bring cloud computing services to network edges. Edge datacenters (EDCs) are deployed to decrease the latency and networks congestion by processing data streams and user requests in near real-time. The EDCs deployment is distributed in nature and positioned between cloud datacenter and data sources. Load balancing is the process of redistributing the work load among EDCs to improve both resource utilization and job response time. Load balancing also avoids a situatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
85
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
3

Relationship

3
7

Authors

Journals

citations
Cited by 209 publications
(85 citation statements)
references
References 13 publications
(18 reference statements)
0
85
0
Order By: Relevance
“…Puthal et al focused on developing an efficient dynamic load-balancing algorithm with an authentication method for edge data centers [175]. Tasks were assigned to an underutilized edge data center by applying the Breadth First Search (BFS) method.…”
Section: Load-balancingmentioning
confidence: 99%
“…Puthal et al focused on developing an efficient dynamic load-balancing algorithm with an authentication method for edge data centers [175]. Tasks were assigned to an underutilized edge data center by applying the Breadth First Search (BFS) method.…”
Section: Load-balancingmentioning
confidence: 99%
“…The authors of [33] developed an authentication technique in edge cloud computing environments. In terms of task allocation, their technique tries to find less overloaded edge servers by monitoring edge servers in the system and performing the breadth first search method to implement the load balancing technique.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The former is enables continuous queries in cloud applications as they determine considerable amounts of resource usage, while the latter refers to both secure authentication (significantly concerning in edge computing scenarios) and online end‐to‐end security. The need for secure authentication, as illustrated in the work of Puthal et al, becomes particularly evident if we compare full cloud deployments, which are always performed in secured and trusted environments, against edge computing datacenters and edge devices that, conversely, are only partially trusted (since they are located at the network edge), thus requiring the cloud to be the initial authentication point. Online end‐to‐end security is a relevant issue for near‐/real‐time big data processing scenarios where traditional online security verification approaches cannot cope well with huge volumes of data …”
Section: Related Workmentioning
confidence: 99%