Home > Research > Publications & Outputs > The Extended Cloud

Electronic data

  • cc-survey

    Rights statement: ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

    Accepted author manuscript, 7.59 MB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective. / Shirazi, Syed Noor Ul Hassan ; Gouglidis, Antonios; Farshad, Arsham et al.
In: IEEE Journal on Selected Areas in Communications, Vol. 35, No. 11, 11.2017, p. 2586-2595.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Shirazi SNUH, Gouglidis A, Farshad A, Hutchison D. The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective. IEEE Journal on Selected Areas in Communications. 2017 Nov;35(11):2586-2595. Epub 2017 Oct 6. doi: 10.1109/JSAC.2017.2760478

Author

Bibtex

@article{6da294bbcf944efc9727ff69eba605fb,
title = "The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective",
abstract = "Mobile Edge Computing (MEC) and Fog are emerging computing models that extend the cloud and its services to the edge of the network. The emergence of both MEC and fog introduce new requirements, which mean their supported deployment models must be investigated. In this paper, we point out the influence and strong impact of the extended cloud (i.e., the MEC and fog) onexisting communication and networking service models of the cloud. Although the relation between them is fairly evident, there are important properties, notably those of security and resilience, that we study in relation to the newly posed requirements from the MEC and fog. Although security and resilience have been already investigated in the context of the cloud - to a certain extent - existing solutions may not be applicable in the context of the extended cloud. Our approach includes the examination of models and architectures that underpin the extended cloud, and we provide a contemporary discussion on the most evident characteristics associated with them. We examine the technologies that implement these models and architectures, and analyse them with respect to security and resilience requirements. Furthermore, approaches to security and resilience-related mechanisms are examined in the cloud (specifically, anomaly detection and policy based resilience management), and we argue that these can also be applied in order to improve security and achieve resilience in the extended cloud environment.",
keywords = "Cloud computing, cloud resilience, edge computing, mobile edge computing, fog computing, cloud security",
author = "Shirazi, {Syed Noor Ul Hassan} and Antonios Gouglidis and Arsham Farshad and David Hutchison",
note = "{\textcopyright}2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.",
year = "2017",
month = nov,
doi = "10.1109/JSAC.2017.2760478",
language = "English",
volume = "35",
pages = "2586--2595",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC",
number = "11",

}

RIS

TY - JOUR

T1 - The Extended Cloud

T2 - Review and Analysis of Mobile Edge Computing and Fog from a Security and Resilience Perspective

AU - Shirazi, Syed Noor Ul Hassan

AU - Gouglidis, Antonios

AU - Farshad, Arsham

AU - Hutchison, David

N1 - ©2017 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PY - 2017/11

Y1 - 2017/11

N2 - Mobile Edge Computing (MEC) and Fog are emerging computing models that extend the cloud and its services to the edge of the network. The emergence of both MEC and fog introduce new requirements, which mean their supported deployment models must be investigated. In this paper, we point out the influence and strong impact of the extended cloud (i.e., the MEC and fog) onexisting communication and networking service models of the cloud. Although the relation between them is fairly evident, there are important properties, notably those of security and resilience, that we study in relation to the newly posed requirements from the MEC and fog. Although security and resilience have been already investigated in the context of the cloud - to a certain extent - existing solutions may not be applicable in the context of the extended cloud. Our approach includes the examination of models and architectures that underpin the extended cloud, and we provide a contemporary discussion on the most evident characteristics associated with them. We examine the technologies that implement these models and architectures, and analyse them with respect to security and resilience requirements. Furthermore, approaches to security and resilience-related mechanisms are examined in the cloud (specifically, anomaly detection and policy based resilience management), and we argue that these can also be applied in order to improve security and achieve resilience in the extended cloud environment.

AB - Mobile Edge Computing (MEC) and Fog are emerging computing models that extend the cloud and its services to the edge of the network. The emergence of both MEC and fog introduce new requirements, which mean their supported deployment models must be investigated. In this paper, we point out the influence and strong impact of the extended cloud (i.e., the MEC and fog) onexisting communication and networking service models of the cloud. Although the relation between them is fairly evident, there are important properties, notably those of security and resilience, that we study in relation to the newly posed requirements from the MEC and fog. Although security and resilience have been already investigated in the context of the cloud - to a certain extent - existing solutions may not be applicable in the context of the extended cloud. Our approach includes the examination of models and architectures that underpin the extended cloud, and we provide a contemporary discussion on the most evident characteristics associated with them. We examine the technologies that implement these models and architectures, and analyse them with respect to security and resilience requirements. Furthermore, approaches to security and resilience-related mechanisms are examined in the cloud (specifically, anomaly detection and policy based resilience management), and we argue that these can also be applied in order to improve security and achieve resilience in the extended cloud environment.

KW - Cloud computing

KW - cloud resilience

KW - edge computing

KW - mobile edge computing

KW - fog computing

KW - cloud security

U2 - 10.1109/JSAC.2017.2760478

DO - 10.1109/JSAC.2017.2760478

M3 - Journal article

VL - 35

SP - 2586

EP - 2595

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 11

ER -