| Literature DB >> 34690529 |
Maryam Sheikh Sofla1, Mostafa Haghi Kashani1, Ebrahim Mahdipour1, Reza Faghih Mirzaee2.
Abstract
Fog computing is considered a formidable next-generation complement to cloud computing. Nowadays, in light of the dramatic rise in the number of IoT devices, several problems have been raised in cloud architectures. By introducing fog computing as a mediate layer between the user devices and the cloud, one can extend cloud computing's processing and storage capability. Offloading can be utilized as a mechanism that transfers computations, data, and energy consumption from the resource-limited user devices to resource-rich fog/cloud layers to achieve an optimal experience in the quality of applications and improve the system performance. This paper provides a systematic and comprehensive study to evaluate fog offloading mechanisms' current and recent works. Each selected paper's pros and cons are explored and analyzed to state and address the present potentialities and issues of offloading mechanisms in a fog environment efficiently. We classify offloading mechanisms in a fog system into four groups, including computation-based, energy-based, storage-based, and hybrid approaches. Furthermore, this paper explores offloading metrics, applied algorithms, and evaluation methods related to the chosen offloading mechanisms in fog systems. Additionally, the open challenges and future trends derived from the reviewed studies are discussed.Entities:
Keywords: Fog computing; Internet of things (IoT); Offloading; Quality of service (QoS)
Year: 2021 PMID: 34690529 PMCID: PMC8526054 DOI: 10.1007/s11042-021-11423-9
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.577
Related work in the field of offloading
| Review type | Ref | Edge technology | Publication year | Paper selection process | Taxonomy | Covered year |
|---|---|---|---|---|---|---|
| Survey | [ | Fog computing | 2018 | Not clear | Yes | Not mentioned |
| [ | MCC | 2015 | Not clear | No | Not mentioned | |
| [ | Edge computing | 2019 | Not clear | No | Not mentioned | |
| [ | MCC | 2018 | Not clear | No | Not mentioned | |
| [ | MCC | 2018 | Not clear | No | Not mentioned | |
| [ | MEC | 2017 | Not clear | No | Not mentioned | |
| [ | Mobile cellular computing | 2019 | Not clear | Yes | Not mentioned | |
| [ | MEC | 2019 | Not clear | Yes | Not mentioned | |
| [ | MCC | 2016 | Not clear | Yes | Not mentioned | |
| [ | Edge computing | 2020 | Clear | Yes | 2016–2020 | |
| [ | Edge computing | 2020 | Not clear | Yes | Not mentioned | |
| Systematic review | [ | MEC | 2020 | Clear | Yes | 2016–2020 |
| [ | MEC | 2020 | Clear | Yes | 2013–2020 | |
| [ | MEC | 2020 | Clear | Yes | 2013–2019 | |
| Our study | Fog computing | 2021 | Clear | Yes | 2016–2020 |
Fig. 1Fog architectural paradigm [80, 81]
Fig. 2Offloading process in fog computing [2, 34]
Filtration of automated search paper by inclusion/exclusion criteria
| Inclusion | The papers proposing evaluations, experiences, or solutions of offloading mechanisms in fog computing JCR-indexed journal papers Papers published between 2016 and January-2020 |
| Exclusion | Review and survey papers, conference papers, theses, books, and book chapters Studies not focusing on offloading mechanisms in fog computing Non-English scripts and non-peer-reviewed papers Short papers (less than six papers) |
Fig. 3The number of papers based on Stage 3
Fig. 4Percentage of published papers in any publications based on Stage 3
Fig. 5The number of papers based on publishers as mentioned in Stage 3
Details of selected papers
| Category | Publisher | Year | Author(s) | Journal/conference name |
|---|---|---|---|---|
| Computation-based | ACM | 2016 | Fricker et al. [ | ACM transactions on modeling and performance evaluation of computing systems (TOMPECS) |
| IEEE | 2016 | Liang et al. [ | China communications | |
| 2017 | Liu et al. [ | IEEE internet of things journal | ||
| 2018 | Wang et al. [ | IEEE transactions on industrial informatics | ||
| 2018 | Du et al. [ | IEEE transactions on communications | ||
| 2018 | Shah-Mansouri and Wong [ | IEEE internet of things journal | ||
| 2018 | Liu et al. [ | IEEE transactions on vehicular technology | ||
| 2018 | Jiang and Tsang [ | IEEE internet of things journal | ||
| 2018 | Ruan et al. [ | Journal of communications and networks | ||
| 2019 | Li et al. [ | IEEE access | ||
| 2019 | Wu et al. [ | IEEE access | ||
| Springer | 2019 | Zhang et al. [ | Peer-to-peer networking and applications | |
| Wiley | 2019 | Rabie et al. [ | Transactions on emerging telecommunications technologies | |
| 2020 | Wang and Chen [ | Transactions on emerging telecommunications technologies | ||
| Energy-based | IEEE | 2018 | Jiang et al. [ | IEEE systems journal |
| 2018 | Wei and Jiang [ | IEEE access | ||
| 2018 | Zhang et al. [ | IEEE internet of things journal | ||
| 2019 | Li et al. [ | China communications | ||
| 2019 | Chen et al. [ | Transactions on green communications and networking | ||
| Wiley | 2018 | Vu et al. [ | Transactions on emerging telecommunications technologies | |
| Storage-based | Hindawi | 2018 | Quinton and Aboutorab [ | Wireless communications and mobile computing |
| IEEE | 2018 | Wang et al. [ | IEEE internet of things journal | |
| 2018 | Chiti et al. [ | IEEE internet of things journal | ||
| 2019 | Shnaiwer et al. [ | IEEE access | ||
| Hybrid | IEEE | 2017 | Meng et al. [ | IEEE access |
| 2017 | Zhu et al. [ | China communications | ||
| 2018 | Yousefpour et al. [ | IEEE internet of things journal | ||
| 2018 | Liu et al. [ | IEEE internet of things journal | ||
| 2019 | Wang et al. [ | IEEE transactions on industrial informatics | ||
| 2019 | Wang et al. [ | IEEE access | ||
| 2019 | Misra and Saha [ | IEEE journal on selected areas in communications | ||
| 2019 | Adhikari et al. [ | IEEE internet of things journal | ||
| 2020 | Cai et al. [ | IEEE internet of things journal | ||
| Science direct | 2019 | Zaharia et al. [ | Simulation modelling practice and theory | |
| Springer | 2018 | Mukherjee et al. [ | The journal of supercomputing | |
| 2019 | Rahbari and Nickray [ | Peer-to-peer networking and applications | ||
| 2020 | Balasubramanian and Meyyappan [ | Computing in engineering and technology |
A comparison of properties in computation-based offloading mechanisms
| Paper | Main idea | Advantage | Disadvantage |
|---|---|---|---|
| [ | Offloading the requests blocked at the data center | Low response time High performance of the system | Low security High cost High response time |
| [ | Resource allocation for fog radio access networks | Low energy Numerical results High resource utilization | Low security |
| [ | Utilizing queuing theory in fog computing | Low energy High scalability | Low availability |
| [ | Designing an offloading algorithm on the Internet of vehicle | Real-time traffic management Optimization problem Resource utilization Low cost | High response time Low availability |
| [ | Computation offloading in fog and cloud computing | Optimization of transmit energy Optimization of offloading Energy efficiency | Low security High response time |
| [ | Allocation of fog computing resources to the IoT users | Low cost Low response time Optimizing performance Low energy | Low throughput Low security |
| [ | Computation offloading with non-orthogonal multiple access | Optimized resource allocation Energy efficiency Reduce cost | Low scalability Low availability |
| [ | Delay-aware task offloading in shared fog networks | Low response time Low cost Low energy Numerical results | Low scalability Low availability |
| [ | Resource allocation in fog environment | Numerical results Low response time Reduce energy | Low scalability Low security Low availability |
| [ | Resource allocation balance in the framework for heterogeneous real-time tasks | Low energy Resource allocation balance and throughput | Low security Low scalability |
| [ | Task offloading in fog and cloud computing | Low energy Optimizing performance Numerical results Low response time | Low scalability Low security Low availability |
| [ | Emergency-level-based healthcare information offloading | Low response time | High cost Low efficiency Low security |
| [ | optimization of computation cost and delay for offloading in fog | Low response time Low cost Numerical results | Low scalability Low security Low availability |
| [ | Minimizing latency and resource allocation for IoT networks in fog | Low response time Optimized resource allocation Numerical results Reduce energy Optimizing performance | Low scalability Low security Low availability High cost |
A comparison of properties in energy-based offloading mechanisms
| Paper | Main idea | Advantage | Disadvantage |
|---|---|---|---|
| [ | Offloading strategy for fog computing | Low energy Low response time Ensures QoS Decreased bandwidth | Low security |
| [ | Improving the offloading efficiency | Low energy Low response time Low cost | Low scalability |
| [ | Fairness scheduling metric for fog offloading | Low energy Low response time | Low scalability |
| [ | Optimizing the computation offloading for the Internet of everything | Low energy Low cost | Low scalability |
| [ | Energy-optimal dynamic offloading in fog | Low energy Low response time | Low scalability |
| [ | Providing a scheme for upstream IoT offloading services in fog radio access networks | Low energy Low response time | Low scalability Low availability |
A comparison of properties in storage-based offloading mechanisms
| Paper | Main idea | Advantage | Disadvantage |
|---|---|---|---|
| [ | Efficient transmission schemes to offload | Low response time | Low scalability |
| [ | Designing an architecture for computation and storage offloading | Low response time Low cost High feasibility High availability | Low scalability |
| [ | Providing an efficient strategy to offload | High flexibility Low energy Low cost Numerical results | Low availability Low accuracy Low security |
| [ | Offloading performance of fog radio access networks | Low response time Low cost | Low security |
A comparison of properties in hybrid offloading mechanisms
| Paper | Main idea | Advantage | Disadvantage |
|---|---|---|---|
| [ | Solving the hybrid computation offloading problem | Low energy Numerical results | Low scalability Low availability |
| [ | Fog computing model and offloading policy | Low response time Low energy Low response time | Low availability Low capacity Low security |
| [ | Providing a framework to reduce IoT service delay | Low response time Low energy Low cost Numerical results Availability | Low security Non-optimized resource utilization |
| [ | Socially-aware dynamic computation offloading scheme | Optimization of the resource utilization Low energy High scalability | Low security High cost |
| [ | Edge offloading in fog computing | Low energy Low response time Low cost | Low scalability Low security |
| [ | Providing algorithms considering mobility | High performance of the system Low energy Low response time Optimized bandwidth | Low security Low scalability Low accuracy |
| [ | Task offloading scheme | Low energy Low response time | Low security |
| [ | Offloading for fog through swarm optimization | Low response time Low cost Better resource utilization | Low security Low scalability Low accuracy |
| [ | Joint offloading of tasks and energy in the fog | Low response time Low cost Low energy Optimized availability High bandwidth Optimized capacity | Low security Low scalability Non-optimized resource utilization |
| [ | Machine learning-based offloading in fog | Low response time Low cost Low energy High throughput | Low security Low scalability Low accuracy |
| [ | Cooperative offloading approach for indoor mobile cloud network | Low energy Low Jitter | Non-optimized resource utilization High response time |
| [ | Providing an algorithm for decision parameters for selecting the best fog devices | Low energy Low response time Best cost Resource utilization | Non-optimized resource utilization Low bandwidth |
| [ | Game theory-based offloading for the cloud of things in the fog | Low energy Low response time Resource utilization Optimized availability | Low security Low scalability High cost Low bandwidth |
Comparison of the existing evaluation metrics in the computation-based approaches
| Paper | Cost | Energy | Response time | Performance | Resource utilization | Security | Throughput |
|---|---|---|---|---|---|---|---|
| [ | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ |
| [ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| [ | ✓ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ | ✗ |
| [ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✓ |
| [ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✓ |
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ |
| [ | ✓ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ |
| [ | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ |
Comparison of the existing evaluation metrics in the energy-based approaches
| Paper | Cost | Energy | Response time | Resource utilization | Scalability | Security | Throughput |
|---|---|---|---|---|---|---|---|
| [ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
| [ | ✗ | ✓ | ✓ | ✓ | ✗ | ✓ | ✓ |
| [ | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ |
| [ | ✗ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
Comparison of the existing evaluation metrics in the storage based approaches
| Paper | Cost | Energy | Resource utilization | Response time | Scalability | Throughput |
|---|---|---|---|---|---|---|
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | |
| [ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ |
| [ | ✓ | ✗ | ✗ | ✓ | ✗ | ✓ |
Comparison of the existing evaluation metrics in the hybrid
| Paper | Authentication | Availability | Cost | Confidentiality | Energy | Integrity | Jitter | Response time | Resource utilization | Throughput |
|---|---|---|---|---|---|---|---|---|---|---|
| [ | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✓ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✗ |
| [ | ✗ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✗ | ✓ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✓ |
| [ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ | ✓ | ✗ | ✗ | ✓ |
| [ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | ✗ | ✗ |
| [ | ✗ | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | ✗ |
Fig. 6Percentage of each category of the selected papers
A summarization of the advantages and disadvantages of the discussed categories
| Category | Advantages | Disadvantage |
|---|---|---|
| Computation-based | • Better energy • Better response time • Better cost | • Low capacity • Low bandwidth • Unacceptable throughput • Low availability • Unacceptable scalability |
| Energy-based | • Better energy • Better response time • Better cost | • Low capacity • Low bandwidth • Unacceptable security • Low availability • Unacceptable throughput |
| Storage-based | • Better response time • Better throughput • Better cost | • Low capacity • Low bandwidth • Unacceptable scalability • Low availability • Unacceptable security |
| Hybrid | • Better energy • Better response time • Better cost | • Low bandwidth • Unacceptable resource utilization • Unacceptable scalability • Low availability • Unacceptable security |
Fig. 7Percentage of evaluation metrics in all papers
Fig. 8Percentage of evaluation metrics in categorized papers
Fig. 9Percentage of each evaluation method in all works
Fig. 10Percentage of algorithm types in all works