Abstract
In this chapter, we discuss big data generated from IoT devices and related challenges. We also discuss suitability of cloud and Fog computing for specific IoT applications. Afterwards, we present architecture for smart parking system and discus the suitability of Fog platform for this scenario.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sarkar, S., Chatterjee, S., & Misra, S. (2015). Assessment of the suitability of fog computing in the context of internet of things. In IEEE Transaction on Cloud Computing, 34 (pp. 1–14).
Jalali, F., & Hinton, K. (2016). Fog computing may help to save energy in cloud computing. IEEE Journal on Selected Areas in Communications, 1, 1–12.
Roman, R., Najera, P., & Lopez, J. (2011). Securing the internet of things. IEEE Journal and Magzines, 44, 51–58.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. ELSEVIER Future Generation Computer System, 29, 1645–1660.
Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things. ACM Digital Library, 33, 107–121.
Atzoria, L., Ierab, A., & Morabito, G. (2010). The internet of things: A survey. ELSEVIER Computer Networks, 54, 2787–2805.
Zugenmaier, A., & Walte, T. (2007). Security in pervasive computing calling for new security principles. In IEEE Conference on Pervasive Computing (pp. 96–99).
Weiser, M. (1999). The computer for the 21st century. ACM Digital Library, 1, 94–110.
Hayat, Z., Reeve, J., & Boutle, C. (1999). Ubiquitous security for ubiquitous computing. ACM Digital Library, 15, 434–441.
Bussard, L., & Roudier, Y. (2002). Authentication in pervasive computing. In Workshop on Security in Ubiquitous Computing (pp. 1–5).
Osmani, V., Balasubramaniam, S., & Botvich, D. (2007). Fog computing may help to save energy in cloud computing. In IEEE Journal on Selected Areas in Communications (JSAC) (pp. 254–258).
Mayrhofer, R., Gellersen, H., & Hazas, M. (2007). Security by spatial reference: Using relative positioning to authenticate devices for spontaneous interaction. Lecture notes in computer science. New York: Springer.
Lai, C.-F., Song, D.-Y., Hwang, R.-H., & Lai, Y.-X. (2016). A QoS-aware streaming service over fog computing infrastructures. In IEEE Digital Media Industry and Forum (pp. 94–98).
Bonomi, F., Milito, R., & Natarajan, P. (2015). Fog computing: A platform for internet of things and analytics. In A roadmap for smart environments, studies in computational intelligence (pp. 169–186). New York: Springer.
Rhodes, B. (1997). The wearable remembrance agent: A system for augmented memory. In International Symposium on Wearable Computers (pp. 123–128).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Hussain, F., Al-Karkhi, A. (2017). Big Data and Fog Computing. In: Internet of Things. SpringerBriefs in Electrical and Computer Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-55405-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-55405-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55404-4
Online ISBN: 978-3-319-55405-1
eBook Packages: EngineeringEngineering (R0)