IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing

B. B. Gupta,Yogachandran Rahulamathavan,Shingo Yamaguchi,Tyson Brooks,Zheng Yan
DOI: https://doi.org/10.1109/access.2019.2940302
IF: 3.9
2019-01-01
IEEE Access
Abstract:Today, cloud computing services are undeniably becoming parts of modern information and communication systems in our daily lives. Cloud computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology (IT) solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness, and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through fog and mobile edge computing (FMEC) to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. Organizations are beginning to look at FMEC as the answer to the cloud computing problem. FMEC consists of putting micro data centers or even small, purpose-built high-performance data analytics machines in remote offices and locations in order to gain real-time insights from the data collected, or to promote data thinning at the edge, by dramatically reducing the amount of data that needs to be transmitted to a central data center. Without having to move unnecessary data to a central data center, analytics at the edge can simplify and drastically speed analysis while also cutting costs. FMEC pushes applications, data, and computing power (services) away from centralized points to the logical extremes of a network. FMEC replicates fragments of information across distributed networks of web servers, which may be vast. As a topological paradigm, edge computing is also referred to as mesh computing, peer-to-peer computing, autonomic (self-healing) computing, grid computing, and other names implying non-centralized, node-less availability.
What problem does this paper attempt to address?