FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing
TL;DR Summary
FogBus is a blockchain-based lightweight framework for integrating edge, fog, and cloud computing, supporting latency-sensitive IoT applications. It offers platform-independent interfaces, assists in multi-application execution, and secures data through authentication and encrypt
Abstract
Recently much emphasize is given on integrating Edge, Fog and Cloud infrastructures to support the execution of various latency sensitive and computing intensive Internet of Things (IoT) applications. Although different real-world frameworks attempt to assist such integration, they have limitations in respect of platform independence, security, resource management and multi-application execution. To address these limitations, we propose a framework, named FogBus that facilitates end-to-end IoT-Fog(Edge)-Cloud integration. FogBus offers platform independent interfaces to IoT applications and computing instances for execution and interaction. It not only assists developers to build applications but also helps users to run multiple applications at a time and service providers to manage their resources. Moreover, FogBus applies Blockchain, authentication and encryption techniques to secure operations on sensitive data. Due to its simplified and cross platform software systems, it is easy to deploy, scalable and cost efficient. We demonstrate the effectiveness of FogBus by creating a computing environment with it that integrates finger pulse oximeters as IoT devices with Smartphone-based gateway and Raspberry Pi-based Fog nodes for Sleep Apnea analysis. We also evaluate the characteristics of FogBus in respect of other existing frameworks and the impact of various FogBus settings on system parameters through deployment of a real-world IoT application. The experimental results show that FogBus is comparatively lightweight and responsive, and different FogBus settings can tune the computing environment as per the situation demands.
Mind Map
In-depth Reading
English Analysis
1. Bibliographic Information
1.1. Title
FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing
1.2. Authors
-
Shreshth Tuli (a,b)
-
Redowan Mahmud (a,*)
-
Shikhar Tuli (c)
-
Rajkumar Buyya (a)
Affiliations:
-
(a) Cloud Computing and Distributed Systems (CLOUDS) Laboratory, School of Computing and Information Systems, The University of Melbourne, Parkville, VIC 3010, Australia
-
(b) Indian Institute of Technology Delhi, Hauz Khas, New Delhi 110016, India
-
(c) Massachusetts Institute of Technology, Cambridge, MA 02139, USA
1.3. Journal/Conference
Published by Elsevier Inc. The paper was received on October 2, 2018, revised on March 13, 2019, accepted on April 12, 2019, and made available online on April 13, 2019. Elsevier is a highly reputable publisher of scientific, technical, and medical content, indicating a significant peer-review process and a strong standing within academic communities.
1.4. Publication Year
2019
1.5. Abstract
The paper proposes FogBus, a lightweight framework designed to integrate Edge, Fog, and Cloud infrastructures, addressing limitations in existing frameworks such as platform independence, security, resource management, and multi-application execution. FogBus offers platform-independent interfaces for IoT applications and computing instances, assisting developers, users (for running multiple applications), and service providers (for resource management). It incorporates Blockchain, authentication, and encryption for secure data operations. Due to its simplified, cross-platform software systems, it is easy to deploy, scalable, and cost-efficient. The effectiveness of FogBus is demonstrated through a real-world computing environment for Sleep Apnea analysis, integrating finger pulse oximeters as IoT devices with Smartphone-based gateway and Raspberry Pi-based Fog nodes. Experimental evaluations show that FogBus is comparatively lightweight and responsive, and its various settings can tune the computing environment according to situational demands.
1.6. Original Source Link
/files/papers/691b152480efabfa5c6ee4c3/paper.pdf (This link is a relative path; assuming it refers to an internal file system or a specific host that serves these files.) Publication status: Officially published by Elsevier Inc.
2. Executive Summary
2.1. Background & Motivation
The rapid growth of the Internet of Things (IoT) paradigm, with trillions of devices expected by 2025, leads to an increased demand for latency-sensitive and compute-intensive applications. Traditional Cloud-centric IoT models face significant challenges:
-
High Latency: Cloud datacenters are geographically distant from
IoT devices, causing communication delays that drastically affect theQuality of Service (QoS)for critical applications like remote patient monitoring or disaster detection. -
Network Congestion: The massive volume of data generated by
IoT devicescan overwhelm network infrastructure when simultaneously transferred to theCloud. -
Heterogeneity and Resource Constraints:
FogandEdge computingemerged to address these issues by bringing computation closer toIoT data sources. However,Fog nodesare oftenresource-constrainedand highlyheterogeneousin terms of computing capabilities, operating systems, and communication standards, making seamless integration challenging. -
Security and Management: Existing frameworks for
IoT-Fog-Cloudintegration often lack platform independence, fail to support simultaneous execution of multiple applications, offer limited scope for customization, rely on centralized management (degradingQoS), and have narrow security focuses, increasing vulnerability.The core problem
FogBusaims to solve is the need for a secure, platform-independent, lightweight, and efficient framework that can seamlessly integrate heterogeneousIoT,Fog, andCloudinfrastructures to support diverse and demandingIoT applications.
2.2. Main Contributions / Findings
The paper's primary contributions are:
-
Proposed Lightweight Framework (
FogBus): Introduction ofFogBusfor end-to-endIoT-Fog-Cloudintegration, designed to harness both edge and remote resources based on application requirements. It emphasizes a lightweight design suitable for resource-constrainedFog nodes. -
Platform-Independent Architecture: Design of a system that offers
platform-independentapplication execution andnode-to-node interaction, effectively overcoming the heterogeneity of computing instances across operating systems and peer-to-peer communication standards. -
Enhanced Security with Blockchain: Integration of
Blockchaintechnology to ensure data integrity during the transfer of confidential data, complemented by authentication and encryption techniques for data protection and privacy. -
Support for Diverse Applications and Management Policies:
FogBusis designed to assist in implementing various concurrent/application programming models (e.g.,SPMD,workflows,streams) and allows service providers to apply customized resource management and scheduling policies. -
Real-World Case Study and Evaluation: Development of a prototype application system for
Sleep Apneadata analysis, demonstratingFogBus's effectiveness in a healthcare scenario. Comprehensive evaluation ofFogBus's characteristics (lightness, responsiveness) against existing frameworks and the impact of its settings on system parameters (service latency, energy consumption, network usage).The key findings from the evaluation are:
-
Lightweight and Responsive:
FogBusdemonstrates lowerCPUandRAMusage, shorter system initiation times, and faster data retrieval compared to other existing frameworks. -
Efficient Resource Management: It achieves a comparatively lower
QoS expectation miss rateby effectively harnessing both edge and remote resources (Cloud) to handle workloads. -
Tunable Performance: Different
FogBussettings (e.g.,With/Without Interval,With/Without Blockchain,Fog/Cloud Only/Integrated) allow for flexible tuning of the computing environment to balance performance, security, and resource consumption based on specific application demands and situational constraints.
3. Prerequisite Knowledge & Related Work
3.1. Foundational Concepts
To understand FogBus, a foundational grasp of the following concepts is essential:
-
Internet of Things (IoT): A network of physical objects ("things") embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- Sensors: Devices that detect and respond to changes in the physical environment (e.g., temperature sensors, pulse oximeters).
- Actuators: Devices that convert an electrical signal into a physical action, often triggered by
IoT data analysis(e.g., smart light switches, robotic arms). - Cyber-Physical Systems (CPS): Systems that integrate computation, networking, and physical processes.
IoTis a key enabler forCPS, allowing real-time interaction with the physical world.
-
Cloud Computing: A model for delivering computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet ("the cloud"). It typically involves large, centralized datacenters.
- Infrastructure as a Service (IaaS): Provides virtualized computing resources over the internet.
- Platform as a Service (PaaS): Provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
- Software as a Service (SaaS): A method of software delivery that allows data to be accessed from any device with an internet connection and a web browser.
-
Fog Computing / Edge Computing: Paradigms that extend
Cloud computingto the edge of the network, bringing computation, storage, and networking closer to theIoT devicesthat generate data. This reduceslatencyand networkcongestion.- Edge Computing: Generally refers to computation performed at the "edge" of the network, often on the
IoT deviceitself or a gateway very close to it. - Fog Computing: Often seen as a broader concept encompassing
Edge computing, forming an intermediate layer betweenIoT devicesand theCloud.Fog nodescan be distributed across various locations, ranging from smart devices (e.g.,Raspberry Pi, smartphones) to micro-datacenters. - Fog Gateway Nodes (FGNs): Entry points for
IoT devicesinto theFogenvironment, often responsible for data filtration, aggregation, and initial processing. - Fog Computational Nodes (FCNs):
Fog nodesequipped with processing power, memory, and storage to perform more substantial computations.
- Edge Computing: Generally refers to computation performed at the "edge" of the network, often on the
-
Blockchain: A decentralized, distributed, and immutable ledger that records transactions across many computers. Each "block" in the chain contains a timestamp and a hash of the previous block, linking them together. This structure makes it highly resistant to modification.
- Hash Value: A fixed-size string of characters that uniquely identifies a block's data. Any change in the data results in a different
hash value. - Proof-of-Work (PoW): A mechanism requiring computational effort to create new blocks, deterring malicious activities by making data tampering computationally expensive.
- Digital Signature: A mathematical scheme for verifying the authenticity of digital messages or documents, ensuring data source integrity.
- Data Integrity: Ensuring that data is accurate, consistent, and unaltered over its entire lifecycle.
- Hash Value: A fixed-size string of characters that uniquely identifies a block's data. Any change in the data results in a different
-
Platform Independence: The ability of software to run on different operating systems (
OSs) or hardware architectures without modification. This is crucial in heterogeneousFogenvironments.- Java Virtual Machine (JVM): A virtual machine that enables a computer to run Java programs as well as programs written in other languages that are compiled to Java bytecode.
JVMis key to Java's platform independence. - HTTP (Hypertext Transfer Protocol) / RESTful APIs: Standardized protocols for communication over networks, enabling web-based interactions between diverse systems.
RESTful APIs(Representational State Transfer Application Programming Interfaces) useHTTPmethods to perform operations.
- Java Virtual Machine (JVM): A virtual machine that enables a computer to run Java programs as well as programs written in other languages that are compiled to Java bytecode.
-
Quality of Service (QoS): The overall performance of a service, particularly in telecommunications and computer networking. Key metrics include
latency(delay),throughput(data rate),reliability(availability), andavailability. -
SPMD (Single Program Multiple Data): A parallel computing programming model where multiple autonomous processors simultaneously execute the same program on different portions of data. This is relevant for distributed
IoT applicationprocessing.
3.2. Previous Works
The paper categorizes existing frameworks into two types: application-specific prototypes and generalized PaaS models.
-
Application-Specific Prototypes:
- Rahmani et al. (2018): A prototype for
IoT-enabled health-carewith smart gateways for local storage and processing, usingCloudas a back-end. Limitation: Relies onOS-level security, lacks generalized platform independence. - Dubey et al. (2017): Another smart health-care prototype using
Intel EdisonandRaspberry PiasFog nodes. Employsrole-based authentication. Limitation:Cloudpartially adopted, narrow security. - Azimi et al. (2017): Hierarchical health-care framework using
MAPE-K modelfor computations, with analytics split betweenCloudandFog. Providesdata encryption. Limitation: No explicit mention of platform independence or robust resource management for diverse applications. - Gia et al. (2017): Low-cost health monitoring, where
IoT devicespre-process data andFog layermanages distributed databases for security. Limitation: Focus onIoT devicecapabilities may increase energy consumption, limited scope formulti-applicationsupport. - Akrivopoulos et al. (2017): Health data sharing and emergency notification.
Spark IoT Platform Corein theCloudmanages operations, using encryption and authentication. Limitation:Cloud-centricmanagement can lead tolatencyissues, limitedFogresource leverage. - Chen et al. (2017) & Craciunescu et al. (2015): Prototypes for
smart city surveillanceandgas-leak monitoring.Foghandles processing;Cloudstores data. Limitation: Lack explicit security features or heterogeneity management. - Hu et al. (2017): Face identification prototype.
Cloudmanages resources and offloads tasks toFog. Limitation: Omissions on security,centralized Cloudmanagement.
- Rahmani et al. (2018): A prototype for
-
Generalized PaaS Models:
- Yangui et al. (2016):
Cloud-centric PaaSforIoT-Fog-Cloudintegration, automating application provisioning. Handles node heterogeneity, extendsCloud Foundrysecurity. Limitation: StillCloud-centric, potential forlatencyandcongestion. - Bruneo et al. (2016) (Stack4Things):
Fog-centric PaaSformulti-applicationdeployment onIoT devices.Fogacts as a centralized programmable coordinator. AppliesCloud-based security. Limitation: CentralizedFogcoordination can be asingle point of failureor bottleneck,Cloud-based securitymight not be optimized forFog. - Verba et al. (2017): Gateway architecture offering
PaaSforFog nodeandIoT deviceintegration. Supports messaging with authentication, horizontal integration withCloud. Limitation: Limited scope in security (only authentication), resource management policies not fully detailed. - Yi et al. (2015a) (Cloudlet-based PaaS): Requires
resource-enriched Fog nodesand virtualization of every node. Uses existingauthentication techniques. Limitation: High resource requirements forFog nodes, virtualization overhead. - Vatanparvar et al. (2015):
PaaSforelectricity usage management. Deals with heterogeneity, encrypts data. Limitation: Specific application domain, general applicability might be limited. - Chang et al. (2017) (Indie Fog): Utilizes user's networking devices for
IoT applications. Extendscore servicesfromCloudtoFog. SupportsCluster of Fog nodes, registry service for security. Limitation:Cloud-dependentcore services, registry might be a bottleneck, security limited to registry. - Mohamed et al. (2017):
Service-oriented frameworkforsmart-city services. Classifies services into core (resource management, security) and application-specific. Uses authentication and access control. Limitation: Security exploited from a narrow perspective,computing capabilitiesof edge/remote resources not fully leveraged.
- Yangui et al. (2016):
3.3. Technological Evolution
The IoT paradigm initially relied on Cloud computing for data storage and processing. However, as IoT devices proliferated and generated vast amounts of data, and as applications demanded real-time, latency-sensitive responses, the Cloud-centric model proved inadequate due to inherent delays and network congestion. This led to the emergence of Fog and Edge computing in the early 2010s (e.g., Bonomi et al., 2012), pushing computation closer to the data sources.
Early Fog/Edge frameworks focused on specific applications (e.g., healthcare, smart cities) or offered basic PaaS capabilities, often facing limitations in handling heterogeneous devices, providing comprehensive security, or supporting multiple applications concurrently. Many were also Cloud-dependent or employed centralized management, reintroducing single points of failure and bottlenecks.
FogBus fits into this evolution by attempting to overcome these persistent challenges. It leverages advances in distributed systems, virtualization, and security technologies like Blockchain to provide a more robust, platform-independent, and lightweight solution for orchestrating IoT, Fog, and Cloud resources. It moves beyond specific application prototypes or partially generalized PaaS to offer a more comprehensive and flexible framework that explicitly addresses heterogeneity, security, and resource management in a decentralized manner, while maintaining a lightweight footprint suitable for resource-constrained Fog environments.
3.4. Differentiation Analysis
Compared to the main methods and frameworks in related work, FogBus introduces several core differences and innovations:
-
Comprehensive Platform Independence: While some frameworks (e.g.,
Yangui et al., 2016,Bruneo et al., 2016,Vatanparvar et al., 2015) address heterogeneity to some extent,FogBusexplicitly designs itsSystem Services(usingPHPforService InterfaceandJavaforManagement Activity) to ensureOSandP2P communication-levelheterogeneity is overcome across all hardware instruments. This includesIoT devices,FGNs,FCNs, andCloud datacenters. -
Integrated and Layered Security: Unlike frameworks that exploit security from a "narrow perspective" (e.g.,
Dubey et al., 2017with role-based authentication,Verba et al., 2017with authentication,Chang et al., 2017with a registry service),FogBusprovides a multi-faceted security approach. It integrates:- Blockchain for Data Integrity: This is a significant differentiator.
FogBususesBlockchainto ensure data tampering prevention and source authentication, which is not commonly found in the surveyed frameworks. - Authentication and Encryption: Alongside
Blockchain, it applies traditionalauthentication(user credentials, port knocking, privileged port authentication) andattribute-based encryptionfor sensitive data privacy.
- Blockchain for Data Integrity: This is a significant differentiator.
-
Lightweight Design with Decentralized Management: Many existing frameworks either push computation to
IoT devicesorresource-enriched Fog nodes(increasing cost and energy) or rely oncentralized management(degradingQoS).FogBusis designed to be lightweight, as evidenced by its lowerCPUandRAMusage. It promotes adecentralized bottom-up approachfor resource management (e.g.,broker nodesdistribute tasks and coordinate activities,GCNsform clusters), reducing reliance onCloud-centricorsingle-point-of-failure Fog-centriccontrol. -
Multi-Application and Service Tuning Support: The paper criticizes existing frameworks for barely supporting simultaneous execution of multiple applications and offering "narrow scope to application developers and users to tune the framework."
FogBusexplicitly addresses this by facilitatingmulti-applicationexecution, concurrent programming models (SPMD,workflows,streams), and offering "service tuning facility to both users and providers." -
End-to-End IoT-Fog-Cloud Integration: While others integrate parts,
FogBusaims for a trulyend-to-endintegration, where resources can be dynamically provisioned fromFogtoCloudbased on application needs andFogload, ensuringQoSand resilience.In essence,
FogBusdifferentiates itself by offering a more holistic, secure, and flexible solution that explicitly tackles the core challenges ofheterogeneity,security, andresource managementinIoT-Fog-Cloudenvironments through a lightweight, platform-independent, and decentralized architecture, withBlockchainas a key innovation for data integrity.
4. Methodology
4.1. Principles
The core idea behind FogBus is to create a robust, secure, and flexible framework that seamlessly integrates diverse hardware instruments (from IoT devices to Cloud datacenters) into a unified computing environment. It addresses the challenges of latency, network congestion, heterogeneity, and security in IoT-Fog-Cloud systems by employing platform-independent software components, a master-worker network topology, and Blockchain technology for data integrity. The framework is designed to be lightweight and responsive, enabling IoT applications to be executed closer to the data sources while leveraging Cloud resources when needed, thereby optimizing QoS and resource utilization. It aims to empower developers to build applications, users to run multiple applications, and service providers to manage resources efficiently and securely.
4.2. Core Methodology In-depth (Layer by Layer)
FogBus facilitates IoT-Fog-Cloud integration through three main architectural layers: Hardware Instruments, Software Components (System Services), and a Network Structure. The implementation details describe how these layers are realized using specific technologies.
4.2.1. Hardware Instruments
The foundation of FogBus is built upon heterogeneous hardware instruments:
-
IoT devices: These are typically
energyandresource-constraineddevices equipped withsensors(to perceive external environments) andactuators(to convert commands into physical actions). They primarily act asdata producersorconsumers, though some may have limited computational capabilities forpre-processing raw data.FogBusconnectsIoT devicesto proximateFog Gateway Nodes (FGNs)via wireless or wired protocols likeZigbee,Bluetooth, andNFC. The sensing frequency and data format are tunable and device-specific. -
Fog Gateway Nodes (FGNs): These are the
entry pointsforIoT devicesinto the distributed computing infrastructure.FGNsperform several critical functions:- Configuration: Assist
IoT devicesin getting configured within the integrated environment. - User Interface: Offer a
front-end programfor applications, allowing users to set authentication credentials, access back-end programs, convey service expectations, receive outcomes, manageIoT devices, and request resources. - Data Management: Operate
data filtration, organize data into a general format, andaggregate datafrom multipleIoT sources. Forlarge-scale processing,FGNsforward data to other computing instances. - Communication: Maintain rapid and dynamic communication with accessible
Fog Computational Nodes (FCNs)using protocols such asConstrained Application Protocol (CoAP)orSimple Network Management Protocol (SNMP).
- Configuration: Assist
-
Fog Computational Nodes (FCNs):
FogBuscan manage numerousheterogeneous FCNs, which are equipped withprocessing cores,memory,storage, andbandwidthto perform variousFogBusoperations.FCNscan take on three different roles:- Broker nodes: These
FCNsinitiatedata processingforIoT applicationswhen anFGNconnects to them. If the broker node cannot meet an application's resource requirements locally, it acts as abroker, communicating with otherFCNsandCloud datacentersto provision necessary resources. Its responsibilities include:- Distributing
computational tasksacross computing instances. - Seamlessly monitoring and coordinating activities.
- Conducting
load balancing. - Ensuring
reliabilitythroughsecurity featuresandfault-tolerant techniqueslikeBlockchainandreplicationduring interactions.
- Distributing
- General Computing Nodes (GCNs): These
FCNsare used forgeneral computing purposesand are accessible only viabroker nodes, which act as afirewallforGCNs.Broker nodesexplicitly manage theGCNs'resources and forward data along with executableback-end applicationsfor processing.GCNsform clusters under the supervision of a specificbroker nodewhen executingdistributed applicationsand can relate to multiplebroker nodes. To handle concurrent commands from differentbroker nodes,Vector Clocksare used forsynchronizing the system.- Vector Clocks: These are data structures used in
distributed systemsto determine the partial ordering of events. InFogBus,Vector ClockshelpGCNsidentifyconcurrent commandsissued by differentbroker nodes.GCNsthen arbitrarily order these commands and notify the correspondingbroker nodes. Forapplication-level consistency, aGCNexecutes at most one application at a time when carrying out a command.
- Vector Clocks: These are data structures used in
- Repository nodes: These are
FCNsdedicated to managing adistributed databasefordata sharing,replication,recovery, andsecured storage. They provide interfaces forinstant accessandanalysis of historical data, maintainmeta-dataof applications (model, runtime requirements, dependencies), and can preserveintermediate dataduring execution foranomaly-driven restart points. To ensuredata-level consistency, repository nodes manage all data in alog-structured manner, driven by theirupdating timestampandsource.
- Broker nodes: These
-
Cloud datacenters: When the
Fog infrastructurebecomes overloaded or whenservice requirementsarelatency-tolerant,FogBusextends resources fromCloud datacentersto executeback-end IoT applications. This expands thecomputing platformglobally and, in association withFog repository nodes, facilitatesextensive data storageanddistribution, makingdata accessandprocessing location-independent.
4.2.2. Software Components
FogBus uses a set of interrelated software components, broadly classified into three System Services, to manage OS and P2P communication-level heterogeneity:
-
Broker Service: Manages the functionalities of a
broker nodeand initiates other software components.- Broker Security Manager:
- Verifies user authentication credentials (in association with
Credential ArchiveofRepository Service). - Generates
public and private key value pairsforport knocking,privileged port authentication, andattribute-based encryptionto secure communication. - Acts as the
Blockchain interfaceto ensure data integrity. With the help of theData Manager, it creates newblocksfrom received data. Thehash valuesandproof-of-workfor each block are sent toCredential Archivefor distribution to other nodes, ensuring consistent verification.
- Verifies user authentication credentials (in association with
- Resource Manager:
- Selects suitable resources by identifying application requirements (
Application CatalogueofRepository Service) and perceiving resource status (Resource MonitorofComputing Service). - Uses
Cloud Integratorforcontextual dataofCloud-based instances(VMs, containers). - Provisions resources on
FCNsandCloudconsidering theheterogeneityof computing instances (processing capabilities). - Facilitates service providers to apply various resource provisioning policies.
- Maintains a
resource configuration filetrackingFCNandCloud instanceaddresses and deployed applications, shared withCloudforfailure recovery.
- Selects suitable resources by identifying application requirements (
- Data Manager:
- Receives sensed and pre-processed data from
IoT devices, aggregates data, and calibratesdata receiving frequency. - Creates
blocksandchainsfor integrity (withBroker Security Manager). - Forwards data to
Application Executor(Computing Service) for processing. - Stores encrypted data in
Data Container(Repository Service) for future use. - Sends subsequent
data streamsdirectly to allocated resources using theresource configuration file.
- Receives sensed and pre-processed data from
- Cloud Integrator:
- Handles all
FogBusinteractions withCloud. - Notifies
Cloud instance contextto the framework. - Forwards
storageandresource provisioning commandsto theCloud. - Offers interfaces for customized
Cloud-integration scriptsand allows third-party software (e.g.,Aneka) to interact withmultiple Cloud datacentersviaAPIs.
- Handles all
- Broker Security Manager:
-
Repository Service: Runs across
Fog nodesto manage repository-related operations.- Credential Archive:
- Preserves user authentication credentials.
- Distributes security keys and details of each data block generated by
Broker Service. - Provides
Secure Socket Layer (SSL)andTransport Layer Security (TLS)certificates forCloud integration. - Supports
Data Containerfor encrypting/decrypting stored data. - Periodically updates its image on
Cloud(viaCloud Dilator) for security attribute recovery.
- Application Catalogue:
- Maintains details about applications: operations, recommended system properties, execution/programming model, resource requirements, and task dependencies.
- Can extend information from
CloudviaCloud Dilator. - Assists
Resource Managerin provisioning resources andApplication Executorin assembling applications.
- Data Container:
- Stores
IoT datafor long-term analysis, ensuring privacy throughencryption. - Receives
intermediate datafromApplication Executorforfault tolerance(restarting processing). - Allows customization and sharing of database schemas.
- Maintains association with
Cloud Dilatorto graspremote dataand disperselocal datathroughCloud.
- Stores
- Cloud Dilator: Facilitates
Repository Servicecomponents to interact withCloudby using commands fromCloud Integrator.
- Credential Archive:
-
Computing Services: Responsible for controlling the operations of a
GCNor when abroker nodeexecutes back-end applications itself.- Executor Security Manager:
- Manages seamless and secure interactions of an
FCNwith others during computing operations. - Assisted by
Credential Archivefor security attributes. - Plays a significant role in verifying
Blockchains(along withCredential ArchiveandBroker Security Manager).
- Manages seamless and secure interactions of an
- Resource Monitor:
- Monitors
busyandidle status(e.g.,CPU usage,memory occupation,network utilization,power consumption) of computing resources withApplication Executor. - Based on this,
Resource Managerprovisions resources. - Tracks
QoSperformance, notifiesResource Manageron overload or failure, triggering actions likedynamic resource provisioning,application execution migration, andintermediate data storage(currently abstract for customization). - Conducts operations for
system synchronization.
- Monitors
- Application Executor:
- Allocates resources for applications on
FCNsbased onResource Manager's instructions. - Extends
application executablesfromApplication Cataloguefor deployment. - Receives data from
Data Managerfor processing. - Periodically informs
Resource Monitorof resource status. - Extracts
intermediate dataand stores it inData Containeron anomaly detection/prediction, ensuringfault tolerance.
- Allocates resources for applications on
- Executor Security Manager:
4.2.3. Network Structure
The FogBus network structure (Figure 3 from the original paper) is designed for persistent, stable, secure, scalable, and fault-tolerant communication among hardware instruments.

该图像是FogBus框架的网络结构示意图,展示了云、路由器、物理设备以及各类节点(包括Broker节点、计算节点和存储库节点)之间的连接关系。此框架用于支持边缘和雾计算中的物联网应用集成。
Fig. 3. Network Structure of FogBus framework.
-
Topology: Employs a
master-worker topology.Broker nodesaremasters, and otherFCNsareworkers.Master(broker node): Receives data/user info fromFGNs, discoversworkersfor processing/storage, manages worker functionalities during runtime, delivers service results toFGNs, and connectsFogtoCloud.Workers(other FCNs): Communicate among themselves undermaster supervisionfor data sharing and overhead reduction.- All (
masters,workers,FGNs) connect to acommon WLANmanaged by one or more routers.
-
Scalability:
- Service providers can
scale upthe number ofactive Fog nodes. AnFCNcan become aworkerby making itself accessible to amaster, which then configures necessary software. - Supports
coexistence of multiple mastersin aWLAN, providingFGNsdiverse options for data stream dispatch. - Masters can
share workers, ensuringdata integrityandprivacyas each master maintains its ownchain of blocksandseparate databaseon workers. Software componentsat masters facilitate integration withmultiple Cloud datacenters simultaneously.
- Service providers can
-
Reliability: (Figure 4 from the original paper illustrates this concept.)

该图像是示意图,描绘了FogBus框架中用户与计算节点之间的关系。图中展示了从用户到主节点的转变,以及工作节点如何在条件转变下被转换为主节点,以确保系统的可靠性和灵活性。Fig. 4. Ensuring reliability in FogBus framework.
- Multiple Masters: Implicitly eradicates
single point of failureof themaster-worker model. - Synchronization:
Vector Clock-based synchronizationandone-to-one interactionensureexplicit isolationandconsistencyof operations on differentworker nodes. - Master Replication: Each master can
replicate its imageover one of itsworker nodes. If a master fails, theworkergainsmaster privileges, preventing network collapse. This relies on theplatform-independentnature ofFogBussoftware. - Worker Monitoring & Recovery: Masters periodically check
worker statusand store theirintermediate dataandconfigurations(including deployed applications). If aworker fails, masters share its information with otherworkersforimmediate residual data processing. If allworkersof amasterare overloaded,workersof othermastersare considered (with internal communication among masters). This ensures continuous computation.
- Multiple Masters: Implicitly eradicates
-
Security:
- Authentication:
FGNandFCNauthentication is handled byWLANrouters. - Network-level Controls: Masters apply
network-level access controlandpacket filtrationto resist infrastructure compromise and eliminate malicious content. - Redundant Links:
Multiple communication linksexist to differentFog nodes, allowingrouting path readjustmentonnetwork anomaly. - Cloud Security: Leverages
Cloud-provided network security policieswhen interacting withCloud infrastructures.
- Authentication:
-
Performance:
Dedicated Network Bandwidth: Utilizes bandwidth dedicatedly for a specific system, preventing degradation from external entities.Scalability Efficiency: AddingFCNsdoes not require very high additional network resources.Service Delivery: Facilitateseasy deploymentandfaster service delivery.Throughput: As alocalized network, itsthroughputremains acceptable.Resource Adjustment: Supportsperiodic adjustment of network resourcesfor anyfrequencyandvolume of incoming traffic.Cost Efficiency: Less dependence on external hardware for network management reducescapital expenditure(CapEx) andoperational expenditure(OpEx).
4.2.4. Design and Implementation
The implementation ensures platform independence across diverse hardware by using compatible APIs, execution environments, scripting, and programming languages.
-
System Services: Each
System Service(Broker,Repository,Computing) is divided into aService InterfaceandManagement Activity.- Service Interface:
- At masters: Receives data/user specifications from gateways, presents service results, allows providers to notify
worker IP addresses. - At workers: Acts as a receptor, decodes application output to masters.
- Implemented as
web programsusingPHP(anHTML-embedded server-side scripting language). - Uses
HTTP protocol-based RESTful APIsfor data exchange and information sharing amongFCNswithin theWLAN. PHPandHTTPare cross-platform and widely supported byOSs(Unix, Windows, Linux, NetWare) andIoT devices, ensuringOSandP2P communication-levelindependence.- An
Apache serveris deployed in eachFCNto run theweb programs.
- At masters: Receives data/user specifications from gateways, presents service results, allows providers to notify
- Management Activity:
- At masters: Contains
resource provisioningandload balancing policies, updatesconfiguration files, generates and forwards commands to workers. - At workers: Performs
resource allocation,monitoring,status sharing, stores data inrelational databases, createsinput filesforback-end programs. - Developed in
Java programming language.Compiled Java programsrun onJava Virtual Machine (JVM), which is easily installed across variousOSs, enabling wide platform functionality. MySQL serversare installed inFCNsfor database management.
- At masters: Contains
- Security:
Service InterfaceandManagement Activityjointly handleencryptionandauthenticationfor masters and workers, in addition toBlockchain.
- Service Interface:
-
Blockchain:
- Implemented in
Java programming language. - Masters create
blocksfrom received data. - The
hashof each block is calculated using theSHA256 algorithmbased on thedata,hash of the previous block,timestamp, and anonce value. - Masters generate
random public/private key pairsdynamically per block to createunique digital signatureswith the original data. Blockchain details,digital signature attributes, andBase64 encoded dataare shared with workers.- Workers use the master's
public keyto verify the data's legitimate source, rejecting data from other keys. - Workers verify each
blockand itshashbymining the nonce valueto support theproof-of-work. - If a worker reports tampering or forgery, the
Blockchainfrom the majority of the network is copied to that node. Service Interfaceat masters displayslatest hashesof theBlockchain copyat each worker, allowing users/providers to track data flow and suspicious activity.
- Implemented in
-
Cloud Plugin:
- Activated only when users specify
Cloud integrationfordata processing. - Deployed on the master.
- Offers flexibility for customized or third-party
Cloud Plugin services. - In the current version,
Aneka(aPaaS frameworkforCloud-based applicationsmanagement) is used. Anekaoffers APIs for provisioning and scheduling resources in aheterogeneous Aneka-Cloud(public, private, hybrid). It supports programming models likeBag of tasks,Distributed threads,MapReduce, andParameter sweep.- The
Aneka-based Cloud plugininFogBusspecifiesCloud instance IP addresses. - It initiates
taskorthread modelsinAneka-Cloudfor single/multipleCloud instances. FogBus's built-inresource provisioning policyprioritizesFog infrastructure. IfFogload exceeds a threshold, the application and input data stream are referred toCloud.Management Activityat the master stores data in aCloud input file. TheAneka-based Cloud pluginparses this file every500 millisecondspolling period, checks for pending data, forms tasks/threads, encapsulates data, and launches them toAneka-Cloud instances.Blockchainis applied here too.
- Activated only when users specify
-
Application:
FogBussupports diverseIoT applications, structured intofront-endandback-end programs.- Front-end program:
- Runs in
FGNs(e.g., Android, iOS, Windows, Tizen, WebOS, RTOS). Must be developed in a language supported by these platforms. - May require temporary data storage, using compatible
database systemsandschemas. - Handles data from
IoT devices, supportingBluetooth Low Energy (BLE)forenergy-constrained devices. - Correlates with the
Service Interfaceat masters for data/user info forwarding and service outcome reception. Itsuser interfaceshould easily parse themaster's Service Interface web programs.
- Runs in
- Back-end program:
- Executed in
FCNs. - Preferably
distributedandmodularto leverageFCN capabilities. - Uses
cross-platform programming languageslikeJavato overcomeOS-level heterogeneity. - Scripts should specify points for storing
intermediate dataduring execution forfault tolerance. - Must be able to extract
input filesand updateoutput filesatworkers.
- Executed in
- Front-end program:
4.2.5. Formulas and Key Mechanisms (as described in paper)
The paper describes the conceptual application of SHA256 for Blockchain hashing and Vector Clocks for synchronization without providing explicit mathematical formulas for these standard concepts. My explanation remains faithful to this.
Blockchain Hashing (SHA256):
The hash of each block is calculated by the masters using the SHA256 algorithm. The components contributing to this hash are:
-
The
datacontained within the block. -
The
hash of the previous blockin the chain. -
The
timestampof when the data was received. -
A
nonce value, which is a random number used inproof-of-work.Conceptually, the hash function operates as follows: $ H_{\text{current_block}} = \text{SHA256}(\text{Data}, H_{\text{previous_block}}, \text{Timestamp}, \text{Nonce}) $ This process ensures that any change to the data, previous hash, timestamp, or nonce would result in a different current block hash, invalidating the chain unless recomputed. The
nonceis mined to find a hash that follows a specific pattern, fulfilling theproof-of-workrequirement.
Vector Clocks for Synchronization:
Vector Clocks are used by GCNs to handle concurrent commands issued by multiple broker nodes. A Vector Clock for a process (or GCN in this case) is an array of logical clocks, one for each process in the distributed system. When a GCN receives a command from a broker node, it updates its Vector Clock and compares it to the Vector Clock received with the command. This allows the GCN to:
- Identify if commands are
concurrent(neither happened before the other). - Establish a
partial orderingof events. - In
FogBus,GCNsuse this to arbitrarily orderconcurrent commandsand notify the issuingbroker nodesfor consistency.
5. Experimental Setup
5.1. Datasets
The paper uses a real-world application for Sleep Apnea analysis as a case study. The data is collected from finger pulse oximeters which act as IoT devices.
- Source:
Jumper JPD-500F Finger Pulse Oximeter. - Characteristics: Collects
peripheral capillary oxygen saturation (SpO2)andheart beat ratedata. Each datasignal lengthis18 KBwith asensing frequencyof2 signals per second. The data is encoded inUTF-8. - Domain: Healthcare, specifically for diagnosing and monitoring
Sleep Apnea, a condition where breathing repeatedly stops and starts during sleep. - Data Sample (Conceptual): The
Android interfacereceives data values from theOximeterwhich are then appended to a list. This list containstimestamp,heart beat rate, andblood oxygen levelreadings.- Example: A data entry might look like
[Timestamp, HeartRate, SpO2], e.g.,[1678886400, 72, 95].
- Example: A data entry might look like
- Purpose: This dataset is chosen because
Sleep Apneaanalysis is alatency-sensitiveapplication where timely data processing is crucial for patient monitoring, making it an ideal candidate to demonstrate the benefits ofFogandEdge computingwithinFogBus. TheSpO2andheart ratedata are used to calculate theApnea-Hypopnea Index (AHI), which determines the intensity ofSleep Apnea.
5.2. Evaluation Metrics
The paper evaluates FogBus using several performance metrics, which are explained below.
-
Load on Resources: Quantifies the computational burden a framework imposes on its underlying hardware.
- Conceptual Definition: Measures how much of the processing power and memory capacity of a
Fog node(especially the core/master/broker node) is consumed by the framework's operations. A lower load indicates a more lightweight framework, crucial forresource-constrainedenvironments. - Mathematical Formula: Not explicitly provided in the paper as a formal formula but typically measured as a percentage.
- CPU Usage: $ \text{CPU Usage (%)} = \frac{\text{CPU Time Used}}{\text{Total CPU Time}} \times 100 $
- RAM Usage: $ \text{RAM Usage (%)} = \frac{\text{Memory Used}}{\text{Total Available Memory}} \times 100 $
- Symbol Explanation:
CPU Time Used: The amount of time the CPU spends executing non-idle threads or processes.Total CPU Time: The total time the CPU was available for execution during the measurement period.Memory Used: The amount of RAM currently consumed by processes.Total Available Memory: The total physical RAM installed and available in the system.
- Conceptual Definition: Measures how much of the processing power and memory capacity of a
-
QoS Expectation Miss Rate: Measures the frequency with which the framework fails to meet predefined
Quality of Servicetargets.- Conceptual Definition: Indicates the efficiency of the framework in managing and harnessing its computing resources to deliver services within expected performance parameters (e.g.,
latency,throughput). A lower miss rate signifies higher reliability and better performance in meeting user expectations. - Mathematical Formula: Not explicitly provided, but generally calculated as: $ \text{QoS Expectation Miss Rate} = \frac{\text{Number of Requests Failing QoS Target}}{\text{Total Number of Requests}} $
- Symbol Explanation:
Number of Requests Failing QoS Target: The count of service requests that did not meet their specifiedQoScriteria (e.g., exceeding a maximumlatencythreshold).Total Number of Requests: The total count of service requests submitted to the framework.
- Conceptual Definition: Indicates the efficiency of the framework in managing and harnessing its computing resources to deliver services within expected performance parameters (e.g.,
-
Time-based Attributes: Metrics related to the speed and responsiveness of the framework.
- Conceptual Definition:
- System Initiation Time: The duration required for all components within a framework to interconnect and become fully operational from a stopped state.
- Data Retrieving Time: The time taken to access specific data through the framework, often from storage or another node.
- Mathematical Formula: Not explicitly provided, typically measured in units of time (e.g., seconds).
- System Initiation Time: (measured in seconds).
- Data Retrieving Time: (measured in seconds).
- Symbol Explanation:
- : Time elapsed from the start command to the point where the system is ready to accept requests.
- : Time elapsed from the data access request to the point where the data is successfully retrieved.
- Conceptual Definition:
-
Service Latency: The total time taken from when a service request is initiated until the result is delivered.
- Conceptual Definition: A critical
QoSmetric that combinescommunication delayandprocessing time. It represents the overall responsiveness of the system to a user's request. - Mathematical Formula: As defined in the paper, it is the summation of network propagation delay and task completion/application execution time. $ L_{\text{service}} = D_{\text{network}} + T_{\text{execution}} $
- Symbol Explanation:
- : Total service latency.
- : Network propagation delay (time for data to travel across the network).
- : Task completion or application execution time (time for the computation to finish).
- Conceptual Definition: A critical
-
Network Usage: Measures the amount of network bandwidth consumed by the framework.
- Conceptual Definition: Quantifies the volume of data transmitted and received by the framework over the network during its operations. Lower network usage is beneficial for reducing
congestionand operational costs, especially inresource-constrainedenvironments or where bandwidth is limited. - Mathematical Formula: Not explicitly provided, typically measured in units of data rate (e.g.,
Mbps- megabits per second).- Network Usage: (measured in Mbps).
- Symbol Explanation:
- : The average or peak data transfer rate across the network interfaces of the involved computing nodes.
- Conceptual Definition: Quantifies the volume of data transmitted and received by the framework over the network during its operations. Lower network usage is beneficial for reducing
-
Energy Consumption: The amount of electrical energy consumed by the computing infrastructure while performing operations.
- Conceptual Definition: Measures the power used over time. Lower energy consumption is vital for
cost efficiencyand environmental sustainability, particularly foredge deviceswhich may have limited power sources. - Mathematical Formula: Not explicitly provided, typically measured in
JoulesorWatt-hours.- Energy Consumption: (measured in Joules).
- Symbol Explanation:
- : The total energy consumed by the
Fog nodesandCloud VMsduring the execution of applications.
- : The total energy consumed by the
- Conceptual Definition: Measures the power used over time. Lower energy consumption is vital for
5.3. Baselines
The paper compares FogBus against implementations of three existing frameworks by following their guidelines:
-
Stack4Things (Bruneo et al., 2016): A
Fog-centric PaaS frameworkfor deploying and executing multiple applications over computationally soundIoT devices, whereFog infrastructureacts as a centralized programmable coordinator. -
Cloudlet-based PaaS (Yi et al., 2015a): A comprehensive
PaaS frameworkfor integrated environments, which requiresresource-enriched Fog nodesand virtualization of all nodes (includingIoT devices). -
Indie Fog (Chang et al., 2017): A
PaaS frameworkthat utilizes user's networking devices to executeIoT applications, extending core services and resource management instructions fromCloud datacenterstoFog nodes.These baselines are chosen because they represent prominent efforts in
IoT-Fog-Cloud integrationandPaaSmodels in the literature, allowing for a comparative evaluation ofFogBus's lightweight nature, resource management capabilities, and responsiveness against contemporary solutions.
5.4. Experiment Parameters
The following are the results from Table 2 of the original paper:
| Parameter | Value |
| Analysis Task: | |
| Interval between creating sequential data processing requesfs seconds | |
| Data recording time per processing requests Pulse Oximeter: | 3 minute |
| Signal length | 18 KB |
| Sensing frequency | 2 signal per second |
| WLAN: | |
| Download Speed | 7 Mbps |
| Upload Speed | 2 Mbps |
The "Interval between creating sequential data processing requests seconds" parameter in the table has no value specified in the paper, which is an oversight in the provided table content. However, the experimental results discuss With Interval and Without Interval settings, implying that an interval value would be defined in specific experiment scenarios.
5.5. System Configuration (Sleep Apnea Analysis Prototype)
The prototype for Sleep Apnea analysis uses the following hardware and software configuration:
-
IoT Device:
Jumper JPD-500F Finger Pulse Oximeter(1.5V,Bluetooth Low Energy v4.2 (BLE),UTF-8data encoding). -
Gateway (Smartphone):
Oppo A73 CPH1725runningAndroid 7.1.1. -
Broker/Master Node:
Dell Latitude D630 Laptop(Intel(R) Core(TM)2 Duo CPU E6550 @ 2.33GHz,2GB DDR2 RAM, 32-bitWindows 7,Apache HTTP Server 2.4.34,Java SE Runtime Environment (JRE) 1.6,MySQL 5.6,.net 3.5,Aneka 3.1). -
Other FCN/Worker Node:
Raspberry Pi 3 B+(ARM Cortex-A53 quad-core SoC CPU @ 1.4GHz,1GB LPDDR2 SDRAM,IEEE 802.11, 64-bitRaspbian Stretch,Apache HTTP Server 2.4.34,JRE 1.6,MySQL 5.6). -
Public Cloud:
Microsoft Azure B1s Machine(1vCPU,1GB RAM,2GB SSD,Windows Server 2016,.NET 3.5,Aneka 3.1). The real implementation of this system model is shown in Figure 6 from the original paper.
该图像是FogBus基于的睡眠呼吸暂停分析的实际实现。图中展示了两个显示器和一台笔记本电脑,连接了多个手指脉搏血氧仪作为物联网设备,以及底部的Raspberry Pi节点,构成了计算环境。
Fig. 6. Real-world implementation of FogBus-based Sleep Apnea analysis
5.6. Installed Package
The prototype is primarily Fog infrastructure-centric, but can offload to Azure VM via the Aneka-based Cloud Plugin if the Fog infrastructure is overloaded. The application package consists of an Android front-end and a data analytic back-end program.
-
Android Interface at Smartphone Gateway (HealthKeeper):
-
An
Android executablenamedHealthKeeperis installed on theSmartphone. -
Developed using
MIT App Inventor(an open-source platform). -
Home screen (Figure 7a): Allows the operator to pair the
Oximeterwith theSmartphoneviaBluetoothand enter themaster's IP address. -
Session screen (Figure 7b): Manages all interaction with the master, including automatic
data transmission. Initializes an emptydata listandtimerwhen recording starts, appends each data value from theOximeter. When recording stops, the list is sent to the master. Displays results pulled from the master.
该图像是图7,展示了健康管理应用HealthKeeper的安卓界面。左侧为主页,用户可以输入主节点的IP地址并配对传感器;右侧为会话界面,显示了睡眠数据,包括AHI(呼吸暂停-低通气指数)和最低氧气水平等信息,并提供了记录和分析功能。
Fig. 7. (a) Home and (b) Session Screen of the android interface.
-
-
Data Analytic at Worker Computing Nodes:
- Encapsulates two open-source
Java programs. - Stored in the
repository workerand forwarded tocomputing workersfor installation based on master commands. - Takes
input dataas a file, parsing the first, second, and third columns astimestamp,heart beat rate, andblood oxygen levelrespectively. - Uses a
Boolean variableto track dips in oxygen level (below 88%) and acounter variableforApnea-Hypopnea Index (AHI). - AHI based cases for Sleep Apnea analysis:
- AHI < 5: Normal
- 5 <= AHI < 15: Mild
- 15 <= AHI < 30: Moderate
- AHI >= 30: Severe
- Additional information stored: minimum oxygen level, minimum/maximum heart rate, average heart rate, average rise/fall of heart rates.
- Filters
heart beat patternduring oxygen dips and generates anECG. - Delivers results in a file, which the master's
Service Interfaceparses and notifies the operator.
- Encapsulates two open-source
5.7. Sequence of Communication
The communication sequence for FogBus-enabled Sleep Apnea analysis within the same WLAN is presented in Figure 8 from the original paper:

该图像是示意图,展示了在睡眠呼吸暂停分析过程中,脉氧仪、智能手机、主控设备、计算工作者和仓库工作者之间的通信序列。流程包括设备开机、发送数据、请求分析和返回结果等步骤。
Fig. 8. Sequence of communication during Sleep Apnea analysis.
- Oximeter Configuration: The
Pulse Oximeteris configured with theSmartphoneusing operator credentials. - Data Sensing & Forwarding: The
OximetersensesSpO2andheart beat rateand forwards this data to theSmartphoneviaBluetooth. - Data to Master: The
Smartphonesends the data to themaster node. - Data Storage: The
masterstores the data on arepository worker. - Acknowledgement: The
repository workersends an acknowledgement to themaster, which is then visible to the operator via theSmartphone(extending the master'sService Interface). - Analysis Request: After recording data for a period, the operator prompts the
masterviaSmartphoneto analyze the stored data. - Resource Allocation: The
mastercommunicates with a suitablecomputing workerand issues privileges for data analysis. - Data & Analytic Retrieval: The
computing workerrequests the stored data and theanalytic executablefrom therepository worker. - Data Analysis: Upon reception, the
computing workerstarts the analysis. - Result to Master: Once analysis is finished, the result is sent back to the
master. - Result Display: The
Smartphonepulls the result from themasterand displays it to the operator.
5.8. Experiment Settings
The application deployment evaluation considers the impact of Blockchain and management overhead under various FogBus settings:
-
With / Without Interval:
- With Interval: The master waits for a certain interval after receiving the outcome of a previous request before sending the next data processing request. This reduces overhead on both the master and computing worker.
- Without Interval: The master sends the next request immediately after the outcome of the previous request is available. This ensures continuous activity and no idle time.
-
With / Without Blockchain:
- With Blockchain: The
Blockchain security featureofFogBusis enabled, ensuringdata integrityandauthentication. - Without Blockchain: The
Blockchain featureis disabled, reducing security overhead but potentially compromising integrity.
- With Blockchain: The
-
Fog / Cloud Only / Integrated:
- Fog Only: Application execution is solely conducted on the
Fog infrastructure. - Cloud Only: Application execution is solely conducted on the
Cloud infrastructure. - Integrated:
Computational tasksare distributed to bothFogandCloudinfrastructures according to the system's context (e.g.,Fogfirst, thenCloudifFogis overloaded).
- Fog Only: Application execution is solely conducted on the
5.9. Monitoring Tools
- Master and Azure VM:
Microsoft Performance Monitor. - Raspberry Pi circuits:
NMoN Performance Monitor.
6. Results & Analysis
6.1. Core Results Analysis
The evaluation of FogBus's framework characteristics focuses on its lightness, resource management performance, and responsiveness compared to existing frameworks.
6.1.1. Lightness of Frameworks
Figure 9 from the original paper illustrates the CPU and RAM usage of the core/master/broker Fog node across different frameworks.

该图像是图表,展示了不同框架下核心节点的 (a) CPU 和 (b) RAM 使用情况。数据表明,FogBus 在 CPU 和 RAM 使用上相较于其他框架表现出更轻量级的特征。
Fig. 9. (a) CPU and (b) RAM usage of core node in different frameworks.
- Analysis:
FogBusconsistently shows lowerCPUandRAMusage compared toStack4Things,Cloudlet-based PaaS, andIndie Fog.- CPU Usage (Figure 9a):
FogBusexhibits the lowestCPUutilization, indicating it imposes less computational burden on the coreFog node. - RAM Usage (Figure 9b): Similarly,
FogBusconsumes the leastRAM, demonstrating its lightweight nature in terms of memory footprint.
- CPU Usage (Figure 9a):
- Reasons for
FogBus's Advantage:- The other frameworks (
Stack4Things,Cloudlet-based PaaS,Indie Fog) extensively incorporate third-party software systems, leading to higher resource consumption. Cloudlet-based PaaSoperates system functionalities without distributing operations across multipleFog nodes, thus centralizing the load on the coreFog node.Indie FogandStack4Things, despite operating collaboratively, assign additional responsibilities (e.g., federated resource, repository and security management, service discovery, application service management) to the coreFog node's registry and virtual board, increasingCPUandRAMload.
- The other frameworks (
- Validation: These results validate
FogBus's claim of being a lightweight framework, making it suitable for deployment onresource-constrained Fog nodes.
6.1.2. Performance in Managing Resources
Figure 10 from the original paper compares the QoS expectation miss rate of different frameworks.

该图像是一个柱状图,展示了不同框架中 QoS 期望未达到的比例(%)。各个框架包括 Stack4Things、Cloudlet-based PaaS、InDie Fog 和 FogBus,显示 FogBus 的未达到比例最低,说明其在性能上的优势。
Fig. 10. QoS expectaion miss rate in different frameworks.
- Analysis:
FogBusachieves the lowestQoS expectation miss rateamong the compared frameworks. - Reasons for
FogBus's Advantage:FogBusis designed to harness bothedge(Fog nodes) andremote resources(Cloud datacenters) simultaneously. WhenFog nodesbecome overloaded,FogBusseamlessly offloads processing toCloud resources. This provides a broader scope to meetQoSexpectations.- In contrast,
Indie Fog's application execution is primarily managed byFog node-based resources, limiting its ability to handle sudden surges in load. Cloudlet-based PaaSsuffers from highCPUandRAMload on its coreFog node, which slows down management operations and increases itsQoS expectation miss rate.Stack4Thingsalso shows a slightly higherQoS expectation miss ratedue to managing application services through a coreFog nodedeployed in aCloudlet, which can become a bottleneck.
- Validation: These findings demonstrate
FogBus's efficiency in resource management and its ability to maintain highQoSeven under varying workloads by intelligently utilizing bothFogandCloudresources.
6.1.3. Responsiveness of Frameworks
Figure 11 from the original paper presents the system initiation time and data retrieval time for the frameworks.

该图像是图表,展示了不同框架的系统启动时间和数据检索时间。图(a)中,FogBus的系统启动时间显著低于其他框架;图(b)中,FogBus的数据检索时间也是最低的,显示出其高效性。
Fig. 11. (a) Initiation and (b) Data retrieval time of different frameworks.
- Analysis:
FogBusexhibits superior responsiveness in bothsystem initiationanddata retrieval.- System Initiation Time (Figure 11a):
FogBushas a significantly shortersystem initiation timecompared to others. - Data Retrieval Time (Figure 11b):
FogBusalso demonstrates the fastestdata retrieval time.
- System Initiation Time (Figure 11a):
- Reasons for
FogBus's Advantage:- System Initiation:
FogBusbenefits from fewer third-party software dependencies, on-demandCloud interaction, and a design that favorshorizontal-level connectionsoververtical-levelones, simplifying the startup process. - Data Retrieval:
FogBusstores data in localrepository nodesin adistributed manner, rather than relying onCloudorcentralized data storages. This proximity and distributed storage enable faster access duringapplication execution.
- System Initiation:
- Validation: These results confirm
FogBus's responsiveness, which is critical forlatency-sensitive IoT applicationswhere quick deployment and data access are paramount.
6.2. Application Deployment Evaluation
This section evaluates the impact of FogBus settings (Interval, Blockchain, Computing Infrastructure) on service latency, energy consumption, and network usage when deploying the Sleep Apnea analysis application. The master sequentially generates processing requests for recorded data chunks.
6.2.1. Number of Requests
Figure 12 from the original paper depicts the number of requests generated in FogBus under different experiment settings.

该图像是图表,展示了在有区块链 (a) 和无区块链 (b) 情况下的请求数量。图中以不同颜色代表三种计算模式:仅雾计算、仅云计算和集成的雾云模式。
Fig. 12. Number of requests (a) With and (b) Without Blockchain.
- Analysis:
- Impact of Infrastructure: The
Fog Onlysetting consistently handles a higher number of requests compared toCloud OnlyandIntegrated Fog-Cloud. This is becauseFog infrastructuredelivers outcomes faster due to proximity. - Impact of Interval: In the
Without Intervalsetting, the number of requests generated is significantly higher thanWith Interval, as the master continuously generates requests without idle time. - Impact of Blockchain: Disabling the
Blockchain featureleads to a comparatively higher number of requests being generated. This is attributed to a lower amount of additional security data being shared and processed, which improves the speed of receiving outcomes for previous requests.
- Impact of Infrastructure: The
- Insight: For scenarios requiring a high volume of requests with less stringent security,
FogBuscan be configured forFog Onlyoperation withBlockchain disabled. However, this increasesmanagementandprocessing overhead. Tuning theintervalbetween request creation can help manage this overhead.
6.2.2. Service Latency
Figure 13 from the original paper presents the impact of different FogBus settings on service latency.

该图像是图表,展示了在有无区间情况下,基于区块链的服务延迟比较。图表中红色、蓝色和橙色条形分别代表仅使用雾计算、仅使用云计算和集成雾云计算的延迟。结果表明集成框架在不同情况下的延迟变化。
Fig. 13. Service latency (a) With and (b) Without Blockchain.
- Analysis:
Service latencyis defined as the sum ofnetwork propagation delayandtask completion/application execution time.- Impact of Infrastructure:
Fog Onlysetting shows minimalservice delivery latencycompared toCloud OnlyandIntegrated Fog-Cloud. This is primarily due to the significantly lowernetwork propagation delayof theFog infrastructure(closer to data source), as the data chunk size for this experiment is not huge, makingtask completion timesimilar acrossFogandCloud. - Impact of Blockchain: Disabling
Blockchainfurther reduceslatency, as its management overhead (hashing, proof-of-work, distribution) adds processing time. - Impact of Interval: The
With Intervalsetting also contributes to improvedservice delivery latencyby reducing overhead on the infrastructure and network.
- Impact of Infrastructure:
- Insight: For
latency-sensitive applicationswith strict deadlines,FogBuscan be configured forFog Onlyoperation, potentiallywithout Blockchain(if security requirements allow), and with a suitableintervalto optimize responsiveness.
6.2.3. Network Usage
Figure 14 from the original paper illustrates network usage in different FogBus settings.

该图像是图表,展示了在使用区块链情况下,(a) 有间隔和 (b) 无间隔的网络使用情况。颜色分别代表 Fog、Cloud 和集成的 Fog-Cloud,显示了在不同配置下的网络带宽使用差异。
Fig. 14. Network usage (a) With and (b) Without Blockchain.
- Analysis:
- Impact of Infrastructure:
Fog Onlysetting results in improvednetwork usagecompared toCloud OnlyandIntegrated Fog-Cloud. This is because it primarily utilizeslocal networking resources(WLAN) rather than relying oninternet-based Cloud connections. - Impact of Blockchain: Disabling
Blockchainreducesnetwork usageas less security-related data (hashes,signatures,block details) needs to be transferred across infrastructures. - Impact of Interval: Continuous request generation (
Without Interval) leads to elevatednetwork usagedue to constant data and information exchange. Tuning theintervalcan mitigate this.
- Impact of Infrastructure:
- Insight: When
network resourcesare constrained,FogBuscan be configured forFog Onlyoperation, withBlockchain disabled, and with a tunedrequest generation intervalto minimizenetwork usage.
6.2.4. Energy Consumption
Figure 15 from the original paper presents how different FogBus settings influence energy consumption of the infrastructure.

该图像是图表,显示了在区块链影响下的能量消耗,分为 (a) 含区块链条件和 (b) 不含区块链条件的比较。图中展示了不同计算模式(仅Fog、仅Cloud、集成Fog-Cloud)在有无时间间隔情况下的能耗,以焦耳为单位。
Fig. 15. Energy consumption (a) With and (b) Without Blockchain,
- Analysis:
- Impact of Infrastructure:
Fog Onlysetting requires lessenergyto conduct operations compared toCloud OnlyandIntegrated Fog-Cloud. This is becauseCloud VMsconsume significantly more energy thanFog nodes(e.g.,Raspberry Pi). InFog Only,Fog nodeshandle both networking and computation. - Impact of Blockchain: Managing the
Blockchain featuredevoursadditional energydue to the computational overhead of hashing, mining, and verification. Therefore, disablingBlockchainsaves energy. - Impact of Interval: An
intervalbetween subsequent request creation helps to improveenergy usageby allowingidle timefor the infrastructure, where energy consumption is lower than during busy periods.
- Impact of Infrastructure:
- Insight: For
energy-constrained scenarios,FogBuscan be configured forFog Onlyoperation,without Blockchain, and with an optimizedinterval timeto process requests efficiently while minimizingenergy consumption. This comes with a trade-off in the number of requests processed, which needs careful tuning.
6.3. Ablation Studies / Parameter Analysis
The "Application deployment evaluation" section acts as a parameter analysis, demonstrating the impact of different FogBus settings on system performance. While not a classic ablation study (removing components to test their contribution), it systematically varies key operational parameters:
-
With / Without Interval: Shows how batching or continuous processing affectsnumber of requests,latency,network usage, andenergy. The results indicate thatWith Intervalgenerally reduces overhead and improveslatencyandenergy efficiency, whileWithout Intervalmaximizesrequest throughputat the cost of higher resource consumption. -
With / Without Blockchain: Highlights the trade-off betweensecurity/integrityandperformance. EnablingBlockchainadds tolatency,network usage, andenergy consumption, but ensures data integrity. Disabling it improves these performance metrics. -
Fog / Cloud Only / Integrated: Demonstrates the flexibility and performance advantages of selecting the appropriate computing infrastructure.Fog Onlyexcels inlatency,network usage, andenergy consumptionfor the given data chunk size, whileCloud Onlyoffers higher computational power for larger tasks (though not explicitly shown as advantageous for this specific small task size) andIntegratedprovides resilience and scalability.These analyses effectively illustrate that
FogBusis not a one-size-fits-all solution but a customizable framework whose settings can be tuned to meet diverse application requirements and resource constraints.
7. Conclusion & Reflections
7.1. Conclusion Summary
This paper introduces FogBus, a novel, lightweight, and Blockchain-based framework designed for the seamless integration of IoT-enabled systems with Fog and Cloud infrastructures. The framework addresses critical limitations of existing solutions, particularly in platform independence, security, resource management, and multi-application execution. FogBus achieves platform independence by implementing its System Services using cross-platform programming languages (PHP for Service Interface and Java for Management Activity) and extensible application layer protocols (HTTP), thereby overcoming OS and P2P communication-level heterogeneity. Functioning as a Platform-as-a-Service (PaaS) model, FogBus empowers developers to build diverse IoT applications, allows users to customize services, and enables service providers to efficiently manage resources.
A key innovation is the integration of Blockchain for data integrity and authentication for data privacy, complemented by encryption techniques for secure data transfer over less secure networks. The effectiveness of FogBus is validated through a cost-efficient prototype for Sleep Apnea analysis, demonstrating its practical applicability in a latency-sensitive healthcare domain. Experimental evaluations reveal that FogBus is notably lightweight in terms of CPU and RAM usage, and highly responsive with faster system initiation and data retrieval times compared to other existing frameworks. Furthermore, the paper demonstrates how different FogBus settings can be tuned to optimize service latency, network usage, and energy consumption according to specific situational demands, highlighting its adaptability and efficiency in managing both edge and remote resources.
7.2. Limitations & Future Work
The authors acknowledge several limitations of the current FogBus framework and propose future research directions:
- Resource Management Policies: While
FogBusoffers flexibility for customized provisioning policies, there's a need to develop more sophisticateddynamic resource management policies. These policies should specifically targetload balancingacross computing infrastructures andQoS enhancement. - Fog Infrastructure Virtualization: Although
Cloud computingis virtualized, in-depth exploration is required to effectivelyvirtualize the Fog infrastructurewithinFogBus. - Artificial Intelligence (AI) Integration: The current version of
FogBuslacksAI techniquesfor controlling operations in different infrastructures and improving system resilience. IntegratingAIcould be a significant contribution. - Application Placement Techniques: For
distributed application execution, efficientapplication placement techniquesare crucial to optimizeservice latency, meetuser expectations, and minimizedeployment cost. Such techniques can be added to theFogBus software stack. Future work could also include comparative performance studies ofFogBuswith variouscompute-intensive,network-intensive, andstorage-intensive applications. - Runtime Application Migration: Developing different
runtime application migration strategiesforFogBusis essential to handleanomaliesor predicted failures, ensuring continuous service. - Lightweight Security Features: The existing
Blockchainand other security features inFogBuscan be computationally intensive, potentially affectingservice delivery latency,energy, andnetwork usage. Research intolightweight but effective security featuresis needed. - Improvement of Embedded Blockchain Feature: The current
Blockchain featureis generic. Future work can focus on enhancing it to reducedata retrieval time, managesmart contracts, and implementchain of chainsover integratedFog-Cloud environments.
7.3. Personal Insights & Critique
FogBus presents a well-thought-out and comprehensive framework that addresses several critical challenges in the evolving IoT-Fog-Cloud landscape. Its explicit focus on platform independence, lightweight design, and decentralized management is highly relevant given the inherent heterogeneity and resource constraints of Fog environments. The integration of Blockchain for data integrity is a significant strength, positioning FogBus as a secure solution for handling sensitive IoT data, particularly in domains like healthcare. The detailed breakdown of hardware instruments, software components, and network structure provides a clear roadmap for implementation and understanding. The real-world case study of Sleep Apnea analysis effectively demonstrates its practical utility and performance advantages.
However, some aspects could be further elaborated or improved:
-
Blockchain Specifics: While the paper highlights
Blockchainintegration, specific details on theconsensus mechanismused (e.g.,Proof of Authority,Proof of Stake, or a simpler custom mechanism forFogenvironments) are not provided. The computational overhead ofProof-of-Workfornonce mining, even if simplified, can still be substantial forresource-constrained Fog nodes. More insight into howFogBusminimizes this overhead or selects an appropriate consensus model for differentFog node capabilitieswould be valuable. The "chain of chains" concept mentioned in future work is intriguing and could mitigate some scalability issues. -
Dynamic Resource Management Depth: The paper mentions
dynamic resource provisioning,application execution migration, andintermediate data storageas actions thatResource Managercan initiate but are currently kept in "abstract form" for user customization. While flexibility is good, concrete examples or a reference implementation of even a basic dynamic policy would significantly strengthen the framework's completeness and provide a clearer benchmark for its potential. This is a critical area forQoSin dynamic environments. -
Generalizability of Performance Benchmarks: The performance evaluation used a specific
Sleep Apneaapplication with small data chunks. While this is valid forlatency-sensitivescenarios, future studies could broaden the scope to includecompute-intensive(e.g., video analytics),network-intensive(e.g., large-scale data ingestion), andstorage-intensive(e.g., long-term archival) applications. This would provide a more holistic view ofFogBus's performance across diverseIoT workloads. -
Scalability for Very Large-Scale Deployments: While
FogBusaddresses scalability through multiple masters and shared workers, the paper doesn't deeply explore the implications for extremely large-scale deployments (e.g., hundreds or thousands ofFog nodesacross vast geographical areas). Issues likeWAN communicationbetween geographically dispersedWLANs,inter-master communication overhead, and robustglobal synchronizationmechanisms would become more prominent. -
AI Integration for Optimization: The suggestion to integrate
AIis promising.AI/MLcould be used for predictiveresource allocation,anomaly detection,intelligent load balancing, and even optimizingsecurity protocolsbased on real-time threat landscapes, makingFogBusmore autonomous and resilient.Overall,
FogBusoffers a significant step forward in building secure and efficientIoT-Fog-Cloudintegrated systems. Its emphasis onplatform independenceand the novel inclusion ofBlockchainare particularly noteworthy. The paper provides a solid foundation for future research to refine its dynamic capabilities and explore its performance across a wider spectrum ofIoT applicationsand deployment scales.
Similar papers
Recommended via semantic vector search.