Skip to main content

Fog Computing in a Developing World Context: Jumping on the Bandwagon

  • Chapter
  • First Online:
Fog Computing

Abstract

The emergence of Fog Computing has culminated into a plethora of service options for computing users. Fog computing provides opportunities where a network of remote servers on the Internet can store and process data, rather than a local server or a personal computer as elaborated by the Compaq Computer in 1996. Defining policies for adopting Fog Computing from the perspectives of both the individual users and organisations has become essential for choosing the right Fog Computing services . The aim of this chapter is to articulate the vantage points of Fog Computing in the informational computational continuum and explore the factors affecting the adoption of Fog Computing by users or organisations with a special focus in the developing world . Amongst others, the chapter explores the contemporary privacy and security concerns and other issues of Fog Computing especially from the standpoint of service excellence . Further, the chapter explores contextual challenges that may be encountered when implementing Fog Computing in developing world contexts such as low latency and jitter, context awareness and mobile support due to underdeveloped ICT infrastructures. The chapter integrates the Technology, Organisation and Environment (TOE) framework which can be employed to understand the factors influencing the penetration of Fog Computing in different businesses in the developing world. The chapter also explores opportunities bordering on how Fog Computing can advance the agenda of service ubiquity and pervasiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vaquero LM, Rodero-Merino L (2014) Finding your way in the Fog: towards a comprehensive definition of Fog Computing. SIGCOMM Comput Commun Rev 44(5):27–32. https://doi.org/10.1145/2677046.2677052. Accessed 26 Feb 2018

    Article  Google Scholar 

  2. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog Computing and its role in the internet of things. In: Proceedings of the 1st edition of the MCC workshop on mobile cloud computing, 13–16. https://doi.org/10.1145/2342509.2342513

  3. Yi S, Li C, Li Q (2015) A survey of Fog Computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, ACM, 37–42

    Google Scholar 

  4. Kavis M (2014) Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, Hoboken. https://doi.org/10.1002/9781118691779

    Book  Google Scholar 

  5. ITU (2015) ICT Facts and Figures ITU. http://www.itu.int/en/ITU-D/statistics. Accessed 19 Feb 2018

  6. Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84106

    Article  Google Scholar 

  7. Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29

    Article  Google Scholar 

  8. Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using Fog Computing in internet of things. IEEE Internet Things J 4(5):1143–1155

    Article  Google Scholar 

  9. Varshney P, Simmhan Y (2017) Demystifying Fog Computing: characterizing architectures. Applications and Abstractions, arXiv 1702(06331):1–23

    Google Scholar 

  10. Shi C, Lakafosis V, Ammar MH, Zegura EW (2012) Serendipity: enabling remote computing among intermittently connected mobile devices. In: ACM MOBIHOC, 145–154

    Google Scholar 

  11. Hassan MA, Xiao M, Wei Q, Chen S (2015) Help your mobile applications with Fog Computing. In: Proceedings of the IEEE international conference on sensing, communication, and networking—workshops, 1–6

    Google Scholar 

  12. Kang K, Wang C, Luo T (2016) Fog Computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts and Telecommun 23(2):56–96

    Article  Google Scholar 

  13. Aazam M, Huh EN (2016) Fog Computing: the Cloud-iot/ioe middleware paradigm. IEEE Potentials 35(3):40–44

    Article  Google Scholar 

  14. Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog Computing: a platform for internet of things and analytics. In: Bessiss N, Dobre C (eds) Big data and internet of things: a roadmap for smart environments. Studies in Computational Intelligence, vol 546, pp 169–186. https://doi.org/10.1007/978-3-319-05029-4_7

    Chapter  Google Scholar 

  15. Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile Fog. In: Proceedings of the second ACM SIGCOMM workshop on mobile cloud computing—MCC, 13–15. https://doi.org/10.1145/2491266.2491270

  16. Popović K, Hocenski Z (2015) Cloud computing security issues and challenges, 344–349

    Google Scholar 

  17. Hugos MH, Hulitzky D (2011) Business in the cloud: what every business needs to know about cloud computing. John Wiley & Sons, Hoboken

    Google Scholar 

  18. Linthicum D (2013) Cloud adoption’s tipping point has arrived. http://www.infoworld.com/d/Cloudcomputing/Cloud-adoptions-tipping-point-has-arrived-221335

  19. Lam R (2011) Organisational readiness and change management in the cloud age. Cloud computing: principles and paradigms, 549–572. http://pfakhri20.persiangig.com/document/mabahesvije/para22.pdf. Accessed 25 Feb 2018

    Chapter  Google Scholar 

  20. Dhiman A (2010) Analysis of on-premise to cloud computing migration strategies for enterprises. Massachusetts Institute of Technology. http://dspace.mit.edu/handle/1721.1/70796. Accessed 26 Feb 2018

  21. Swink M (2000) Technological innovativeness as a moderator of new product design integration and top management support

    Article  Google Scholar 

  22. ITU (2012) Cloud computing in africa: situation and perspectives. ITU

    Google Scholar 

  23. Kannabiran G (2012) Enablers and inhibitors of advanced information technologies adoption by SMEs. J Enterp Inf Manage 25(2):186–209. https://doi.org/10.1108/17410391211204419

    Article  Google Scholar 

  24. Davis FD, Bargozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manage Sci 35:982–1003

    Article  Google Scholar 

  25. Venkatesh V, Morris M, Davis G, Davis F (2003) User acceptance of information technology: toward a unified view. MIS Quart 27(3):425–478

    Article  Google Scholar 

  26. Rogers EM (1995) Diffusion of innovations, 5th edn. The Free Press, New York

    Google Scholar 

  27. Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. MA Books, Lexington

    Google Scholar 

  28. Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Sys Eval 14(1):110–121

    Google Scholar 

  29. Low C, Chen Y, Wu M (2011) Understanding the determinants of cloud computing adoption. Ind Manage Data Syst 111(7):1006–1023

    Article  Google Scholar 

  30. Thamhain Hans J (2005) Management of technology: managing effectively in technology—intensive organizations. John Wiley & Sons, Hoboken

    Google Scholar 

  31. Wang YM, Wang YS, Yang YF (2010) Understanding the determinants of RFID adoption in the manufacturing industry. Technol Forecast Soc Chang 77(5):803–815

    Article  Google Scholar 

  32. Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29

    Article  Google Scholar 

  33. Hu V et al (2014) Guide to attribute based access control (ABAC) definition and considerations, NIST

    Google Scholar 

  34. Qiu T, Zhao A, Xia F, Si, Wu DO (2017) Rose: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw, pp (99), 1–16. https://doi.org/10.1109/tnet.2017.2713530

  35. Lee K, Kim D, Ha D, Rajput U (2015) On security and privacy issues of Fog Computing supported internet of things environment. In: Proceedings of the international conference on the network of the future, pp 1–3

    Google Scholar 

  36. Dsouza C, Ahn, GJ, Taguinod M (2015) Policy-driven security management for Fog Computing: preliminary framework and a case study. In: Proceedings of the IEEE international conference on information reuse and integration, pp 16–23

    Google Scholar 

  37. Bernsmed K, Rubsamen T, Onen M, Sudhol M (2014) Healthcare services in the cloud—obstacles to adoption, and a way forward. In: Proceedings of the 9th international conference on availability, reliability and security

    Google Scholar 

  38. Zao JK, Nguyen KT, Wang YH, Lin ACH, Wang BW, Liu JWS (2014) Trustworthy emergency information brokerage service (TIBS). WIT Trans Built Env 133:216–227. https://doi.org/10.2495/DMAN130221

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bvuma Stella .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stella, B., Bwalya, K.J. (2018). Fog Computing in a Developing World Context: Jumping on the Bandwagon. In: Mahmood, Z. (eds) Fog Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-94890-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94890-4_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94889-8

  • Online ISBN: 978-3-319-94890-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics