From cloud to fog computing : a review and a conceptual live VM migration framework

Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and g...

Full description

Saved in:
Bibliographic Details
Main Authors: Osanaiye, Opeyemi, Chen, Shuo, Yan, Zheng, Lu, Rongxing, Choo, Kim-Kwang Raymond, Dlodlo, Mqhele
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2018
Subjects:
Online Access:https://hdl.handle.net/10356/87815
http://hdl.handle.net/10220/45512
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-87815
record_format dspace
spelling sg-ntu-dr.10356-878152020-03-07T11:48:59Z From cloud to fog computing : a review and a conceptual live VM migration framework Osanaiye, Opeyemi Chen, Shuo Yan, Zheng Lu, Rongxing Choo, Kim-Kwang Raymond Dlodlo, Mqhele School of Computer Science and Engineering Cloud Computing Edge Computing Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined. Published version 2018-08-07T06:18:30Z 2019-12-06T16:50:02Z 2018-08-07T06:18:30Z 2019-12-06T16:50:02Z 2017 Journal Article Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.-K. R., & Dlodlo, M. (2017). From cloud to fog computing : a review and a conceptual live VM migration framework. IEEE Access, 5, 8284-8300. https://hdl.handle.net/10356/87815 http://hdl.handle.net/10220/45512 10.1109/ACCESS.2017.2692960 en IEEE Access © 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. 17 p. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Cloud Computing
Edge Computing
spellingShingle Cloud Computing
Edge Computing
Osanaiye, Opeyemi
Chen, Shuo
Yan, Zheng
Lu, Rongxing
Choo, Kim-Kwang Raymond
Dlodlo, Mqhele
From cloud to fog computing : a review and a conceptual live VM migration framework
description Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Osanaiye, Opeyemi
Chen, Shuo
Yan, Zheng
Lu, Rongxing
Choo, Kim-Kwang Raymond
Dlodlo, Mqhele
format Article
author Osanaiye, Opeyemi
Chen, Shuo
Yan, Zheng
Lu, Rongxing
Choo, Kim-Kwang Raymond
Dlodlo, Mqhele
author_sort Osanaiye, Opeyemi
title From cloud to fog computing : a review and a conceptual live VM migration framework
title_short From cloud to fog computing : a review and a conceptual live VM migration framework
title_full From cloud to fog computing : a review and a conceptual live VM migration framework
title_fullStr From cloud to fog computing : a review and a conceptual live VM migration framework
title_full_unstemmed From cloud to fog computing : a review and a conceptual live VM migration framework
title_sort from cloud to fog computing : a review and a conceptual live vm migration framework
publishDate 2018
url https://hdl.handle.net/10356/87815
http://hdl.handle.net/10220/45512
_version_ 1681041849761923072