Loading...

Elaris Computing Nexus

Elaris Computing Nexus


Edge and Cloud Computing Architectures in IoT A Systematic Review on Applications Security and Resource Management


Elaris Computing Nexus

Received On : 15 January 2025

Revised On : 12 March 2025

Accepted On : 18 March 2025

Published On : 06 April 2025

Volume 01, 2025

Pages : 011-021


Abstract

Companies have identified edge-to-cloud integration as a valid way to improve the efficiency of Internet of Things (IoT) systems through the provision of data processing capability and security, and a range of other resource management services. This study entails a literature analysis of the present state of progress in the development of edge and cloud computing architecture with their applications, challenges, and possible solutions. The review reflects the effectiveness of the designs in vital fields like health, safety, privacy, and optimization of resources. It also discusses the methods that are considered hybrids, namely fog computing, and how it may be applied to IoT-related issues of lower latency, energy saving, and offloading. In general, this paper provides an in-depth review of the existing body of knowledge in terms of registration and mapping analysis, identification of trends and novel technologies like federated learning and blockchain.

Keywords

Cloud Computing, Edge Computing, IoT, Hybrid Systems, Fog Computing, Security, Resource Management, Healthcare, Privacy, Task Offloading.

  1. W. Choi, T. Choi, and S. Heo, “A comparative study of automated machine learning platforms for exercise Anthropometry-Based Typology Analysis: performance evaluation of AWS SageMaker, GCP VertexAI, and MS Azure,” Bioengineering, vol. 10, no. 8, p. 891, Jul. 2023, doi: 10.3390/bioengineering10080891.
  2. H. El-Sayed et al., “Edge of Things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment,” IEEE Access, vol. 6, pp. 1706–1717, Dec. 2017, doi: 10.1109/access.2017.2780087.
  3. Y. Zhang, “Research and application of next-generation firewall technique in medical network,” Journal of Computational Methods in Sciences and Engineering, vol. 22, no. 5, pp. 1461–1476, Jun. 2022, doi: 10.3233/jcm-226182.
  4. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on Internet of things: architecture, enabling technologies, security and privacy, and applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, Mar. 2017, doi: 10.1109/jiot.2017.2683200.
  5. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, Jan. 2015, doi: 10.1109/comst.2015.2444095.
  6. T. K. L. Hui, R. S. Sherratt, and D. D. Sánchez, “Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies,” Future Generation Computer Systems, vol. 76, pp. 358–369, Nov. 2016, doi: 10.1016/j.future.2016.10.026.
  7. N. Cvar, J. Trilar, A. Kos, M. Volk, and E. S. Duh, “The use of IoT technology in smart cities and smart villages: similarities, differences, and future prospects,” Sensors, vol. 20, no. 14, p. 3897, Jul. 2020, doi: 10.3390/s20143897.
  8. Ren, D. Zhang, S. He, Y. Zhang, and T. Li, “A survey on End-Edge-Cloud Orchestrated Network Computing Paradigms,” ACM Computing Surveys, vol. 52, no. 6, pp. 1–36, Oct. 2019, doi: 10.1145/3362031.
  9. G. Suciu et al., “Big data, internet of things and cloud convergence – an architecture for secure E-Health applications,” Journal of Medical Systems, vol. 39, no. 11, Sep. 2015, doi: 10.1007/s10916-015-0327-y.
  10. C.-L. Hsu and J. C.-C. Lin, “An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives,” Computers in Human Behavior, vol. 62, pp. 516–527, Apr. 2016, doi: 10.1016/j.chb.2016.04.023.
  11. T. J. Gerpott, N. Ahmadi, and D. Weimar, “Who is (not) convinced to withdraw a contract termination announcement? – A discriminant analysis of mobile communications customers in Germany,” Telecommunications Policy, vol. 39, no. 1, pp. 38–52, Jan. 2015, doi: 10.1016/j.telpol.2014.11.005.
  12. U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.
  13. Fiannaca, M. La Rosa, R. Rizzo, A. Urso, and S. Gaglio, “An expert system hybrid architecture to support experiment management,” Expert Systems With Applications, vol. 41, no. 4, pp. 1609–1621, Sep. 2013, doi: 10.1016/j.eswa.2013.08.058.
  14. W. Villegas-Ch, J. Govea, R. Gurierrez, and A. Mera-Navarrete, “Optimizing security in IoT ecosystems using hybrid artificial intelligence and blockchain models: a scalable and efficient approach for threat detection,” IEEE Access, p. 1, Jan. 2025, doi: 10.1109/access.2025.3532800.
  15. P. Phalaagae, A. M. Zungeru, A. Yahya, B. Sigweni, and S. Rajalakshmi, “A Hybrid CNN-LSTM Model with Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks,” IEEE Access, p. 1, Jan. 2025, doi: 10.1109/access.2025.3555861.
  16. F. C. Andriulo, M. Fiore, M. Mongiello, E. Traversa, and V. Zizzo, “Edge Computing and Cloud Computing for Internet of Things: a review,” Informatics, vol. 11, no. 4, p. 71, Sep. 2024, doi: 10.3390/informatics11040071.
  17. P. Ranaweera, A. D. Jurcut, and M. Liyanage, “Survey on Multi-Access Edge Computing Security and Privacy,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1078–1124, Jan. 2021, doi: 10.1109/comst.2021.3062546.
  18. H. Sodhro, Z. Luo, A. K. Sangaiah, and S. W. Baik, “Mobile edge computing based QoS optimization in medical healthcare applications,” International Journal of Information Management, vol. 45, pp. 308–318, Sep. 2018, doi: 10.1016/j.ijinfomgt.2018.08.004.
  19. Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, “Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain,” 2018 IEEE International Conference on Communications (ICC), May 2018, doi: 10.1109/icc.2018.8422517.
  20. C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A comprehensive survey on FoG Computing: State-of-the-Art and Research challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 416–464, Nov. 2017, doi: 10.1109/comst.2017.2771153.
CRediT Author Statement

The author reviewed the results and approved the final version of the manuscript.

Acknowledgements

The author(s) received no financial support for the research, authorship, and/or publication of this article.

Funding

No funding was received to assist with the preparation of this manuscript.

Ethics Declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Availability of Data and Materials

Data sharing is not applicable to this article as no new data were created or analysed in this study.

Author Information

Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.

Corresponding Author



Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/

Cite this Article

Prathap Mani, “Edge and Cloud Computing Architectures in IoT A Systematic Review on Applications Security and Resource Management”, Elaris Computing Nexus, pp. 011-021, 06 April 2025, doi: 10.XXXXX/ECN/2025002.

Copyright

© 2025 Prathap Mani. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.