2.0 Literature review
Fog Computing is also represented as Fogging that is a term created by Cisco. The role of fogging is to extend the cloud computing into the edge computing. The fogging is supported to the IoT network that is the main idea to develop this term. The Fogging has improved the accuracy of the system and the quality of the services. It can support the physical things that are connected together. In 2015, Cisco represented fogging for the cloud computing in the edge of the network to process the information in a more accurate way. It is used to reduce the workload of cloud computing [3]. Flavio Bonomi et. al. was presented the role of fogging and its characteristics in the internet of things [4]. Fog computing is used to minimize the information transmitted to the cloud to process, analyze and store. It is also improved the efficiency and security of the framework. In 2017, Jianbing Ni has presented an article on secure fogging for IoT. In this paper, the authors were focused on security and privacy issues faced in the communication among IoT nodes with fogging [5]. In 2017, Joy Dutta and Sarbani Roy have published an article [6] on IoT-Fog framework for smart cities. In this paper, they presented the smart building structure with the use of fog and IoT networks. In 2017, Muhtasim M., et. al. was published the thesis report [7], they have presented the security of transmitted data transactions in the internet of things network by using the blockchains technology. In the article [8], various consensus algorithms discussed and compared. They compared the algorithms such as Proof-of-Work (PoW), Proof-of-Stake (PoS), Delegated Proof-of-Stake (DPoS), Leased Proof-Of-Stake (LPoS), Proof of Elapsed Time (PET), Practical Byzantine Fault Tolerance (PBFT), Simplified Byzantine Fault Tolerance (SBFT), Delegated Byzantine Fault Tolerance (DBFT), Directed Acyclic Graphs (DAG), Proof-of-Activity (PoA), Proof-of-Importance (PoI), Proof-of-Capacity (PoC), Proof-of-Burn (PoB), and Proof-of-Weight (PoW) [9].
Table 1: Comparison of the Consensus Algorithms [9,10]