Fuzzy Theory in Fog Computing: Review, Taxonomy, and Open Issues

Creative Commons License

Al-Araji Z. J., Ahmad S. S. S., KAUSAR N., Farhani A., Ozbilgekahveci E., Cagin T.

IEEE Access, vol.10, pp.126931-126956, 2022 (SCI-Expanded) identifier

  • Publication Type: Article / Review
  • Volume: 10
  • Publication Date: 2022
  • Doi Number: 10.1109/access.2022.3225462
  • Journal Name: IEEE Access
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC, Directory of Open Access Journals
  • Page Numbers: pp.126931-126956
  • Keywords: Fog computing, fuzzy logic, healthcare, intrusion detection system, resource management, task management
  • Yıldız Technical University Affiliated: Yes


Geographically dispersed Fog Computing architecture ubiquitously connected to a range of heterogeneous nodes at the edge of the network can provide cooperative flexible, and variable computations, communications, and storage services. Several fog computing methods, models, and techniques have been used to solve cloud issues. The fuzzy theory has also been used in many aspects of fog computing. Objectives: This work presents a systematic literature review of the use of fuzzy theory in Fog Computing, highlighting the main practical motivations, classification types in research approaches, fuzzy methods used, popular evaluation tools, open issues, and future trends. Methods: The investigations were systematically performed using fuzzy theory in fog computing, and four databases which are ScienceDirect, Web of Science (WoS), Scopus, and IEEE Xplore Digital Library from 2015 to 2022, were used to analyse their performance evaluation, architecture, and applications. Results: 94 articles were selected based on fuzzy theory in fog computing using different methods, models, and techniques, based on the proposed exclusion and inclusion criteria. The results of the taxonomy were divided into five major classes: task and resource management, intrusion detection systems, trust management, and healthcare services. Discussion: Applications requiring real-time, low latency, and quick responses are well suited for fog computing. These studies show that resource sharing improves the fog computing architecture by delivering reduced latency, distributed processing, improved scalability, better security, fault tolerance, and privacy. Conclusion: The majority of the time, research areas on fuzzy theory in fog computing are crucially significant. We conclude that this review will enhance research capacity, thereby expanding and creating new research domains.