2.0 Literature review
Fog Computing is also represented as Fogging that is a term created by
Cisco. The role of fogging is to extend the cloud computing into the
edge computing. The fogging is supported to the IoT network that is the
main idea to develop this term. The Fogging has improved the accuracy of
the system and the quality of the services. It can support the physical
things that are connected together. In 2015, Cisco represented fogging
for the cloud computing in the edge of the network to process the
information in a more accurate way. It is used to reduce the workload of
cloud computing [3]. Flavio Bonomi et. al. was presented the role of
fogging and its characteristics in the internet of things [4]. Fog
computing is used to minimize the information transmitted to the cloud
to process, analyze and store. It is also improved the efficiency and
security of the framework. In 2017, Jianbing Ni has presented an article
on secure fogging for IoT. In this paper, the authors were focused on
security and privacy issues faced in the communication among IoT nodes
with fogging [5]. In 2017, Joy Dutta and Sarbani Roy have published
an article [6] on IoT-Fog framework for smart cities. In this paper,
they presented the smart building structure with the use of fog and IoT
networks. In 2017, Muhtasim M., et. al. was published the thesis report
[7], they have presented the security of transmitted data
transactions in the internet of things network by using the blockchains
technology. In the article [8], various consensus algorithms
discussed and compared. They compared the algorithms such as
Proof-of-Work (PoW), Proof-of-Stake (PoS), Delegated Proof-of-Stake
(DPoS), Leased Proof-Of-Stake (LPoS), Proof of Elapsed Time (PET),
Practical Byzantine Fault Tolerance (PBFT), Simplified Byzantine Fault
Tolerance (SBFT), Delegated Byzantine Fault Tolerance (DBFT), Directed
Acyclic Graphs (DAG), Proof-of-Activity (PoA), Proof-of-Importance
(PoI), Proof-of-Capacity (PoC), Proof-of-Burn (PoB), and Proof-of-Weight
(PoW) [9].
Table 1: Comparison of the Consensus Algorithms [9,10]