Fuzzy Theory in Fog Computing: Review, Taxonomy, and Open Issues


Creative Commons License

Al-Araji Z. J., Ahmad S. S. S., KAUSAR N., Farhani A., Ozbilgekahveci E., Cagin T.

IEEE Access, cilt.10, ss.126931-126956, 2022 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Derleme
  • Cilt numarası: 10
  • Basım Tarihi: 2022
  • Doi Numarası: 10.1109/access.2022.3225462
  • Dergi Adı: IEEE Access
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Sayfa Sayıları: ss.126931-126956
  • Anahtar Kelimeler: Fog computing, fuzzy logic, healthcare, intrusion detection system, resource management, task management
  • Yıldız Teknik Üniversitesi Adresli: Evet

Özet

Geographically dispersed Fog Computing architecture ubiquitously connected to a range of heterogeneous nodes at the edge of the network can provide cooperative flexible, and variable computations, communications, and storage services. Several fog computing methods, models, and techniques have been used to solve cloud issues. The fuzzy theory has also been used in many aspects of fog computing. Objectives: This work presents a systematic literature review of the use of fuzzy theory in Fog Computing, highlighting the main practical motivations, classification types in research approaches, fuzzy methods used, popular evaluation tools, open issues, and future trends. Methods: The investigations were systematically performed using fuzzy theory in fog computing, and four databases which are ScienceDirect, Web of Science (WoS), Scopus, and IEEE Xplore Digital Library from 2015 to 2022, were used to analyse their performance evaluation, architecture, and applications. Results: 94 articles were selected based on fuzzy theory in fog computing using different methods, models, and techniques, based on the proposed exclusion and inclusion criteria. The results of the taxonomy were divided into five major classes: task and resource management, intrusion detection systems, trust management, and healthcare services. Discussion: Applications requiring real-time, low latency, and quick responses are well suited for fog computing. These studies show that resource sharing improves the fog computing architecture by delivering reduced latency, distributed processing, improved scalability, better security, fault tolerance, and privacy. Conclusion: The majority of the time, research areas on fuzzy theory in fog computing are crucially significant. We conclude that this review will enhance research capacity, thereby expanding and creating new research domains.