Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.32Keywords:
Internet of Things, Cloud computing, Fog Computing, Fog-Cloud Paradigm, Cluster head selection algorithm, Network utilization, Energy consumptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Fog computing is the architecture that most researchers use to build latency-sensitive Internet of Things (IoT) applications. By placing resource-constrained fog devices near the network’s edge, fog computing design delivers less delay than the cloud computing paradigm. Fog nodes use the available resources to process the incoming data, which lowers the data amount that needs to be transferred to the server of the cloud. A system contains fog devices with various levels of computing power. The best system performance is only possible when the appropriate sensor nodes are connected to the parent fog node. In this study, we introduce a cluster head selection algorithm for effective network resource utilization through application deployment in a fog-cloud environment for internet of things-based applications. With the introduction of fog computing, the processing is animatedly dispersed through the cloud layers and fog, enabling the deployment of an application’s modules closer to the foundation of fog-layer devices. The method is general and may be used with various network topologies and a broad range of standardized IoT applications, regardless of load.Abstract
How to Cite
Downloads
Similar Articles
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Aruljothi Rajasekaran, Jemima Priyadarsini R., ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Radha K. Jana, Dharmpal Singh, Saikat Maity, Modified firefly algorithm and different approaches for sentiment analysis , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Chinnadurai U, A. Vinayagam, Energy efficient routing with cluster approach in wireless networks – A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Expanding the quantity of virtual machines utilized within an open-source cloud infrastructure , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Jafar Ali, Dr.G. Ravi, D.I. George Amalarethinam, AI-Driven Swarm-Optimized Adaptive Routing Using Quantum-Inspired Neural Scheduling with Homomorphic Encryption , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Kohila, S. Rethinavalli, A P2ECAM: A Trust-Preserving Cross-Cloud Data Migration Model For Resource-Constrained Mobile Devices Using Certificate-Free Elliptic Curve Cryptography , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, Cost-based resource allocation method for efficient allocation of resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

