Abstract
The emergence of Fog Computing has culminated into a plethora of service options for computing users. Fog computing provides opportunities where a network of remote servers on the Internet can store and process data, rather than a local server or a personal computer as elaborated by the Compaq Computer in 1996. Defining policies for adopting Fog Computing from the perspectives of both the individual users and organisations has become essential for choosing the right Fog Computing services . The aim of this chapter is to articulate the vantage points of Fog Computing in the informational computational continuum and explore the factors affecting the adoption of Fog Computing by users or organisations with a special focus in the developing world . Amongst others, the chapter explores the contemporary privacy and security concerns and other issues of Fog Computing especially from the standpoint of service excellence . Further, the chapter explores contextual challenges that may be encountered when implementing Fog Computing in developing world contexts such as low latency and jitter, context awareness and mobile support due to underdeveloped ICT infrastructures. The chapter integrates the Technology, Organisation and Environment (TOE) framework which can be employed to understand the factors influencing the penetration of Fog Computing in different businesses in the developing world. The chapter also explores opportunities bordering on how Fog Computing can advance the agenda of service ubiquity and pervasiveness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vaquero LM, Rodero-Merino L (2014) Finding your way in the Fog: towards a comprehensive definition of Fog Computing. SIGCOMM Comput Commun Rev 44(5):27–32. https://doi.org/10.1145/2677046.2677052. Accessed 26 Feb 2018
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog Computing and its role in the internet of things. In: Proceedings of the 1st edition of the MCC workshop on mobile cloud computing, 13–16. https://doi.org/10.1145/2342509.2342513
Yi S, Li C, Li Q (2015) A survey of Fog Computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, ACM, 37–42
Kavis M (2014) Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, Hoboken. https://doi.org/10.1002/9781118691779
ITU (2015) ICT Facts and Figures ITU. http://www.itu.int/en/ITU-D/statistics. Accessed 19 Feb 2018
Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84106
Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29
Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using Fog Computing in internet of things. IEEE Internet Things J 4(5):1143–1155
Varshney P, Simmhan Y (2017) Demystifying Fog Computing: characterizing architectures. Applications and Abstractions, arXiv 1702(06331):1–23
Shi C, Lakafosis V, Ammar MH, Zegura EW (2012) Serendipity: enabling remote computing among intermittently connected mobile devices. In: ACM MOBIHOC, 145–154
Hassan MA, Xiao M, Wei Q, Chen S (2015) Help your mobile applications with Fog Computing. In: Proceedings of the IEEE international conference on sensing, communication, and networking—workshops, 1–6
Kang K, Wang C, Luo T (2016) Fog Computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts and Telecommun 23(2):56–96
Aazam M, Huh EN (2016) Fog Computing: the Cloud-iot/ioe middleware paradigm. IEEE Potentials 35(3):40–44
Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog Computing: a platform for internet of things and analytics. In: Bessiss N, Dobre C (eds) Big data and internet of things: a roadmap for smart environments. Studies in Computational Intelligence, vol 546, pp 169–186. https://doi.org/10.1007/978-3-319-05029-4_7
Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile Fog. In: Proceedings of the second ACM SIGCOMM workshop on mobile cloud computing—MCC, 13–15. https://doi.org/10.1145/2491266.2491270
Popović K, Hocenski Z (2015) Cloud computing security issues and challenges, 344–349
Hugos MH, Hulitzky D (2011) Business in the cloud: what every business needs to know about cloud computing. John Wiley & Sons, Hoboken
Linthicum D (2013) Cloud adoption’s tipping point has arrived. http://www.infoworld.com/d/Cloudcomputing/Cloud-adoptions-tipping-point-has-arrived-221335
Lam R (2011) Organisational readiness and change management in the cloud age. Cloud computing: principles and paradigms, 549–572. http://pfakhri20.persiangig.com/document/mabahesvije/para22.pdf. Accessed 25 Feb 2018
Dhiman A (2010) Analysis of on-premise to cloud computing migration strategies for enterprises. Massachusetts Institute of Technology. http://dspace.mit.edu/handle/1721.1/70796. Accessed 26 Feb 2018
Swink M (2000) Technological innovativeness as a moderator of new product design integration and top management support
ITU (2012) Cloud computing in africa: situation and perspectives. ITU
Kannabiran G (2012) Enablers and inhibitors of advanced information technologies adoption by SMEs. J Enterp Inf Manage 25(2):186–209. https://doi.org/10.1108/17410391211204419
Davis FD, Bargozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manage Sci 35:982–1003
Venkatesh V, Morris M, Davis G, Davis F (2003) User acceptance of information technology: toward a unified view. MIS Quart 27(3):425–478
Rogers EM (1995) Diffusion of innovations, 5th edn. The Free Press, New York
Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. MA Books, Lexington
Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Sys Eval 14(1):110–121
Low C, Chen Y, Wu M (2011) Understanding the determinants of cloud computing adoption. Ind Manage Data Syst 111(7):1006–1023
Thamhain Hans J (2005) Management of technology: managing effectively in technology—intensive organizations. John Wiley & Sons, Hoboken
Wang YM, Wang YS, Yang YF (2010) Understanding the determinants of RFID adoption in the manufacturing industry. Technol Forecast Soc Chang 77(5):803–815
Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29
Hu V et al (2014) Guide to attribute based access control (ABAC) definition and considerations, NIST
Qiu T, Zhao A, Xia F, Si, Wu DO (2017) Rose: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw, pp (99), 1–16. https://doi.org/10.1109/tnet.2017.2713530
Lee K, Kim D, Ha D, Rajput U (2015) On security and privacy issues of Fog Computing supported internet of things environment. In: Proceedings of the international conference on the network of the future, pp 1–3
Dsouza C, Ahn, GJ, Taguinod M (2015) Policy-driven security management for Fog Computing: preliminary framework and a case study. In: Proceedings of the IEEE international conference on information reuse and integration, pp 16–23
Bernsmed K, Rubsamen T, Onen M, Sudhol M (2014) Healthcare services in the cloud—obstacles to adoption, and a way forward. In: Proceedings of the 9th international conference on availability, reliability and security
Zao JK, Nguyen KT, Wang YH, Lin ACH, Wang BW, Liu JWS (2014) Trustworthy emergency information brokerage service (TIBS). WIT Trans Built Env 133:216–227. https://doi.org/10.2495/DMAN130221
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Stella, B., Bwalya, K.J. (2018). Fog Computing in a Developing World Context: Jumping on the Bandwagon. In: Mahmood, Z. (eds) Fog Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-94890-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-94890-4_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94889-8
Online ISBN: 978-3-319-94890-4
eBook Packages: Computer ScienceComputer Science (R0)