Guest Editors
Dr. Anwar Ghani, International Islamic University, Pakistan
Dr. Shehzad Ashraf Chaudhry, Abu Dhabi University, United Arab Emirates
Dr. Rashid Ahmad, Jeju National University, South Korea
Summary
The Internet of Things (IoT) is the web of tangible devices or equipment that can communicate by sending and receiving information electronically without operator interaction. Massive information is being gathered through different instruments thanks to the development of IoT devices, particularly within the healthcare industry. This data is then sent to the computer and kept there. When dealing with such a large volume of data on the internet, especially in medicine, where accurate information processing and archiving are necessary, that becomes challenging. Another significant cloud technology concern is the security of data. The solution to these problems is fog computation. Cloud applications operate at the periphery and improve information security, correctness, and uniformity while lowering latencies, which is crucial for health information applications.
The sophisticated encryption standardized method is used in the cloud environment to secure the information acquired from it before sending it to the internet. Data analytics hence enhances the protection of medical records. A fog computer technique brings virtualization and its applications to the broadcaster's periphery. It offers users cloud-like data, computation, security, and cloud platforms. Beginning to receive an internet address, a network component, and everything from household appliances to warplanes. An upcoming mobile application, fog processing, is mostly employed for the web. Services and information are fetched using cloud services from the board's center to the network's edge. Fog provides enterprise customers with communication, computing, security, and software comparable to the cloud.
Fog computing is a collaborative computational approach that delivers the edge of the network equipment with a centralized database, computation, and programming. Cloud computing is a way where the client uses the application anonymously. Fog computing is a technology that offers IOT data management, retention, and local computation in smartphones rather than transmitting it to the cloud. Clouds and foggy architecture are being used for computing, storage, and networking devices. In sensor networks, information collected by widgets is transmitted to the network's edge or fixed boxes, gateways, and network connections for computation rather than to secure communications, lowering traffic because of bandwidth. Cloud computing decreases latencies while simultaneously enhancing customer experience. Only computer tasks are done domestically using the cloud, and answers are returned to the remaining consumers. Fog nodes are therefore becoming a preferable choice over cloud computing for smaller computing tasks. The interesting topics include but are not limited to:
Utilizing cloud services to enhance information protection in IoT medical care.
Leveraging cloud computing to improve the interpretation of medical datasets.
IoT dynamic spectrum estimate and charging strategy focused on edge computing in tiny server farms.
Fog computing with high availability for home automation applications in smart towns.
Enhanced monitoring architecture and the integration of edge computing to enhance electrification.
Framework for sophisticated cross-genuine sensors depending on fog computing.
Sophisticated monitoring architecture pervasive computing technology.
Designing a dynamic display for green infrastructure using IoT and fog technology.
A high dimensional decrease in IoT applications was accomplished by new pervasive computing.
A mobile cloud system that uses smart contracts to distribute sensor readings.
An effective framework for virtual discomfort tracking in e-healthcare.
Multi-tier network virtualization infrastructure implementation for IoT services in green infrastructure.
Keywords
Fog computing
Edge computing
Internet of Things (IoT)
Cloud computing platforms
Privacy & security
Computer networks
Communication technologies
Computation and programming
Network virtualization
Information security
Published Papers