Advertisement

Fog Computing in a Developing World Context: Jumping on the Bandwagon

  • Bvuma Stella
  • Kelvin Joseph Bwalya
Chapter

Abstract

The emergence of Fog Computing has culminated into a plethora of service options for computing users. Fog computing provides opportunities where a network of remote servers on the Internet can store and process data, rather than a local server or a personal computer as elaborated by the Compaq Computer in 1996. Defining policies for adopting Fog Computing from the perspectives of both the individual users and organisations has become essential for choosing the right Fog Computing services. The aim of this chapter is to articulate the vantage points of Fog Computing in the informational computational continuum and explore the factors affecting the adoption of Fog Computing by users or organisations with a special focus in the developing world. Amongst others, the chapter explores the contemporary privacy and security concerns and other issues of Fog Computing especially from the standpoint of service excellence. Further, the chapter explores contextual challenges that may be encountered when implementing Fog Computing in developing world contexts such as low latency and jitter, context awareness and mobile support due to underdeveloped ICT infrastructures. The chapter integrates the Technology, Organisation and Environment (TOE) framework which can be employed to understand the factors influencing the penetration of Fog Computing in different businesses in the developing world. The chapter also explores opportunities bordering on how Fog Computing can advance the agenda of service ubiquity and pervasiveness.

Keywords

Fog computing Edge computing South Africa Serviceadoption Service excellence Framework EmergingPlatforms 

References

  1. 1.
    Vaquero LM, Rodero-Merino L (2014) Finding your way in the Fog: towards a comprehensive definition of Fog Computing. SIGCOMM Comput Commun Rev 44(5):27–32. https://doi.org/10.1145/2677046.2677052. Accessed 26 Feb 2018CrossRefGoogle Scholar
  2. 2.
    Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog Computing and its role in the internet of things. In: Proceedings of the 1st edition of the MCC workshop on mobile cloud computing, 13–16.  https://doi.org/10.1145/2342509.2342513
  3. 3.
    Yi S, Li C, Li Q (2015) A survey of Fog Computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data, ACM, 37–42Google Scholar
  4. 4.
    Kavis M (2014) Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, Hoboken.  https://doi.org/10.1002/9781118691779CrossRefGoogle Scholar
  5. 5.
    ITU (2015) ICT Facts and Figures ITU. http://www.itu.int/en/ITU-D/statistics. Accessed 19 Feb 2018
  6. 6.
    Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84106CrossRefGoogle Scholar
  7. 7.
    Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29CrossRefGoogle Scholar
  8. 8.
    Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using Fog Computing in internet of things. IEEE Internet Things J 4(5):1143–1155CrossRefGoogle Scholar
  9. 9.
    Varshney P, Simmhan Y (2017) Demystifying Fog Computing: characterizing architectures. Applications and Abstractions, arXiv 1702(06331):1–23Google Scholar
  10. 10.
    Shi C, Lakafosis V, Ammar MH, Zegura EW (2012) Serendipity: enabling remote computing among intermittently connected mobile devices. In: ACM MOBIHOC, 145–154Google Scholar
  11. 11.
    Hassan MA, Xiao M, Wei Q, Chen S (2015) Help your mobile applications with Fog Computing. In: Proceedings of the IEEE international conference on sensing, communication, and networking—workshops, 1–6Google Scholar
  12. 12.
    Kang K, Wang C, Luo T (2016) Fog Computing for vehicular ad-hoc networks: paradigms, scenarios, and issues. J China Univ Posts and Telecommun 23(2):56–96CrossRefGoogle Scholar
  13. 13.
    Aazam M, Huh EN (2016) Fog Computing: the Cloud-iot/ioe middleware paradigm. IEEE Potentials 35(3):40–44CrossRefGoogle Scholar
  14. 14.
    Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog Computing: a platform for internet of things and analytics. In: Bessiss N, Dobre C (eds) Big data and internet of things: a roadmap for smart environments. Studies in Computational Intelligence, vol 546, pp 169–186.  https://doi.org/10.1007/978-3-319-05029-4_7CrossRefGoogle Scholar
  15. 15.
    Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile Fog. In: Proceedings of the second ACM SIGCOMM workshop on mobile cloud computing—MCC, 13–15.  https://doi.org/10.1145/2491266.2491270
  16. 16.
    Popović K, Hocenski Z (2015) Cloud computing security issues and challenges, 344–349Google Scholar
  17. 17.
    Hugos MH, Hulitzky D (2011) Business in the cloud: what every business needs to know about cloud computing. John Wiley & Sons, HobokenGoogle Scholar
  18. 18.
    Linthicum D (2013) Cloud adoption’s tipping point has arrived. http://www.infoworld.com/d/Cloudcomputing/Cloud-adoptions-tipping-point-has-arrived-221335
  19. 19.
    Lam R (2011) Organisational readiness and change management in the cloud age. Cloud computing: principles and paradigms, 549–572. http://pfakhri20.persiangig.com/document/mabahesvije/para22.pdf. Accessed 25 Feb 2018CrossRefGoogle Scholar
  20. 20.
    Dhiman A (2010) Analysis of on-premise to cloud computing migration strategies for enterprises. Massachusetts Institute of Technology. http://dspace.mit.edu/handle/1721.1/70796. Accessed 26 Feb 2018
  21. 21.
    Swink M (2000) Technological innovativeness as a moderator of new product design integration and top management supportCrossRefGoogle Scholar
  22. 22.
    ITU (2012) Cloud computing in africa: situation and perspectives. ITUGoogle Scholar
  23. 23.
    Kannabiran G (2012) Enablers and inhibitors of advanced information technologies adoption by SMEs. J Enterp Inf Manage 25(2):186–209.  https://doi.org/10.1108/17410391211204419CrossRefGoogle Scholar
  24. 24.
    Davis FD, Bargozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manage Sci 35:982–1003CrossRefGoogle Scholar
  25. 25.
    Venkatesh V, Morris M, Davis G, Davis F (2003) User acceptance of information technology: toward a unified view. MIS Quart 27(3):425–478CrossRefGoogle Scholar
  26. 26.
    Rogers EM (1995) Diffusion of innovations, 5th edn. The Free Press, New YorkGoogle Scholar
  27. 27.
    Tornatzky LG, Fleischer M, Chakrabarti AK (1990) Processes of technological innovation. MA Books, LexingtonGoogle Scholar
  28. 28.
    Oliveira T, Martins MF (2011) Literature review of information technology adoption models at firm level. Electron J Inf Sys Eval 14(1):110–121Google Scholar
  29. 29.
    Low C, Chen Y, Wu M (2011) Understanding the determinants of cloud computing adoption. Ind Manage Data Syst 111(7):1006–1023CrossRefGoogle Scholar
  30. 30.
    Thamhain Hans J (2005) Management of technology: managing effectively in technology—intensive organizations. John Wiley & Sons, HobokenGoogle Scholar
  31. 31.
    Wang YM, Wang YS, Yang YF (2010) Understanding the determinants of RFID adoption in the manufacturing industry. Technol Forecast Soc Chang 77(5):803–815CrossRefGoogle Scholar
  32. 32.
    Sarkar S, Misra S (2016) Theoretical modelling of Fog Computing: a green computing paradigm to support iot applications. IET Netw 5(2):23–29CrossRefGoogle Scholar
  33. 33.
    Hu V et al (2014) Guide to attribute based access control (ABAC) definition and considerations, NISTGoogle Scholar
  34. 34.
    Qiu T, Zhao A, Xia F, Si, Wu DO (2017) Rose: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans Netw, pp (99), 1–16.  https://doi.org/10.1109/tnet.2017.2713530
  35. 35.
    Lee K, Kim D, Ha D, Rajput U (2015) On security and privacy issues of Fog Computing supported internet of things environment. In: Proceedings of the international conference on the network of the future, pp 1–3Google Scholar
  36. 36.
    Dsouza C, Ahn, GJ, Taguinod M (2015) Policy-driven security management for Fog Computing: preliminary framework and a case study. In: Proceedings of the IEEE international conference on information reuse and integration, pp 16–23Google Scholar
  37. 37.
    Bernsmed K, Rubsamen T, Onen M, Sudhol M (2014) Healthcare services in the cloud—obstacles to adoption, and a way forward. In: Proceedings of the 9th international conference on availability, reliability and securityGoogle Scholar
  38. 38.
    Zao JK, Nguyen KT, Wang YH, Lin ACH, Wang BW, Liu JWS (2014) Trustworthy emergency information brokerage service (TIBS). WIT Trans Built Env 133:216–227.  https://doi.org/10.2495/DMAN130221CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Intelligence and Information SystemsUniversity of JohannesburgJohannesburgSouth Africa

Personalised recommendations