skip to main content
10.1145/3022636.3022649acmotherconferencesArticle/Chapter ViewAbstractPublication PagesvikingplopConference Proceedingsconference-collections
research-article

A Pattern for Fog Computing

Authors Info & Claims
Published:07 April 2016Publication History

ABSTRACT

Fog Computing is a new variety of the cloud computing paradigm that brings virtualized cloud services to the edge of the network to control the devices in the IoT. We present a pattern for fog computing which describes its architecture, including its computing, storage and networking services. Fog computing is implemented as an intermediate platform between end devices and cloud computing data centers. The recent popularity of the Internet of Things (IoT) has made fog computing a necessity to handle a variety of devices. It has been recognized as an important platform to provide efficient, location aware, close to the edge, cloud services. Our model includes most of the functionality found in current fog architectures.

References

  1. Amazon. 2015. How the AWS IoT Platform Works. Retrieved February 15, 2016 from https://aws.amazon.com/iot/how-it-works/Google ScholarGoogle Scholar
  2. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (MCC '12). ACM, New York, NY, USA, 13--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu. 2014. Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments, Springer International Publishing Switzerland, 169--186.Google ScholarGoogle Scholar
  4. Jan Bosch. 2009. From Software Product Lines to Software Ecosystems. In Proceedings of the 13th Int. Software Product Line Conference (SPLC'09), ACM (August 2009) Carnegie Mellon University, Pittsburgh, PA, USA, 111--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Buschmann, R. Meunier, H. Rohnert, P. Sommerland, and M. Stal. 1996. Pattern-Oriented Software Architecture. Volume 1: A System of Patterns. Volume 1. Wiley, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cisco. 2015. Cisco Fog Computing with IOx. Retrived August 8, 2015 from http://www.cisco.com/web/solutions/trends/iot/cisco-fog-computing-with-iox.pdfGoogle ScholarGoogle Scholar
  7. Clinton Dsouza, Gail-Joon Ahn, and Marthony Taguinod. 2014. Policy-driven security management for fog computing: Preliminary framework and a case study. In IEEE 15th International Conference on Information Reuse and Integration (IRI), IEEE (Aug. 2014), 16--23.Google ScholarGoogle ScholarCross RefCross Ref
  8. Eduardo B. Fernandez, N. Yoshioka, H. Washizaki and M. H. Syed, "Modeling and security in cloud ecosystems", Future Internet 2016, 8(2), 13; (Special Issue Security in Cloud Computing and Big Data),Google ScholarGoogle Scholar
  9. Eduardo B. Fernandez, N. Yoshioka and H. Washizaki. 2015. Patterns for Security and Privacy in Cloud Ecosystems. In 2nd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2015), IEEE (August 2015), 13--18.Google ScholarGoogle Scholar
  10. Eduardo B. Fernandez, Raul Monge, and Keiko Hashizume. 2015. Building a security reference architecture for cloud systems. J. Requirements Engineering (June 2015), 1--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Eduardo B. Fernandez. 2013. Security Patterns in Practice: Designing Secure Architectures Using Software patterns. J. Wiley Sons, May 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Foghorn. 2016. Foghorn Technology. Retrived October 20, 2016 from https://foghorn-systems.com/technology/Google ScholarGoogle Scholar
  13. IBM. 2016. Watson Internet of Things: IoT in the cognitive era. Retrieved February 20, 2016 from http://www.ibm.com/internet-of-things/watson-iot.htmlGoogle ScholarGoogle Scholar
  14. Ivan Stojmenovic and Sheng Wen. 2014. The Fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS 2014). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. H. Syed and E. B. Fernandez. 2015. The Software Container pattern. 22nd Conference on Pattern Languages of Programs (PLoP 2015). Pittsburgh, PA, Oct. 24--26, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Luis M. Vaquero, and Luis Rodero-Merino. 2014. Finding your way in the fog: Towards a Comprehensive Definition of Fog Computing. ACM SIGCOMM Computer Communication Review. 44, 5 (October 2014), 27--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Vortex. 2015. Fog Computing. Retrieved August 8, 2015 from http://www.prismtech.com/vortex/technologies/fog-computingGoogle ScholarGoogle Scholar
  18. Dale Willis, Arkodeb Dasgupta, and Suman Banerjee. 2014. Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture (MobiArch '14). ACM, New York, NY, USA, 43--48. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    VikingPLoP '16: Proceedings of the 10th Travelling Conference on Pattern Languages of Programs
    April 2016
    186 pages
    ISBN:9781450342001
    DOI:10.1145/3022636

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 April 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate8of11submissions,73%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader