Companies have identified edge-to-cloud integration as a valid way to improve the efficiency of Internet of Things (IoT) systems through the provision of data processing capability and security, and a range of other resource management services. This study entails a literature analysis of the present state of progress in the development of edge and cloud computing architecture with their applications, challenges, and possible solutions. The review reflects the effectiveness of the designs in vital fields like health, safety, privacy, and optimization of resources. It also discusses the methods that are considered hybrids, namely fog computing, and how it may be applied to IoT-related issues of lower latency, energy saving, and offloading. In general, this paper provides an in-depth review of the existing body of knowledge in terms of registration and mapping analysis, identification of trends and novel technologies like federated learning and blockchain.
W. Choi, T. Choi, and S. Heo, “A comparative study of automated machine learning platforms for exercise Anthropometry-Based Typology Analysis: performance evaluation of AWS SageMaker, GCP VertexAI, and MS Azure,” Bioengineering, vol. 10, no. 8, p. 891, Jul. 2023, doi: 10.3390/bioengineering10080891.
H. El-Sayed et al., “Edge of Things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment,” IEEE Access, vol. 6, pp. 1706–1717, Dec. 2017, doi: 10.1109/access.2017.2780087.
Y. Zhang, “Research and application of next-generation firewall technique in medical network,” Journal of Computational Methods in Sciences and Engineering, vol. 22, no. 5, pp. 1461–1476, Jun. 2022, doi: 10.3233/jcm-226182.
Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on Internet of things: architecture, enabling technologies, security and privacy, and applications,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1125–1142, Mar. 2017, doi: 10.1109/jiot.2017.2683200.
Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of Things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, Jan. 2015, doi: 10.1109/comst.2015.2444095.
T. K. L. Hui, R. S. Sherratt, and D. D. Sánchez, “Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies,” Future Generation Computer Systems, vol. 76, pp. 358–369, Nov. 2016, doi: 10.1016/j.future.2016.10.026.
N. Cvar, J. Trilar, A. Kos, M. Volk, and E. S. Duh, “The use of IoT technology in smart cities and smart villages: similarities, differences, and future prospects,” Sensors, vol. 20, no. 14, p. 3897, Jul. 2020, doi: 10.3390/s20143897.
Ren, D. Zhang, S. He, Y. Zhang, and T. Li, “A survey on End-Edge-Cloud Orchestrated Network Computing Paradigms,” ACM Computing Surveys, vol. 52, no. 6, pp. 1–36, Oct. 2019, doi: 10.1145/3362031.
G. Suciu et al., “Big data, internet of things and cloud convergence – an architecture for secure E-Health applications,” Journal of Medical Systems, vol. 39, no. 11, Sep. 2015, doi: 10.1007/s10916-015-0327-y.
C.-L. Hsu and J. C.-C. Lin, “An empirical examination of consumer adoption of Internet of Things services: Network externalities and concern for information privacy perspectives,” Computers in Human Behavior, vol. 62, pp. 516–527, Apr. 2016, doi: 10.1016/j.chb.2016.04.023.
T. J. Gerpott, N. Ahmadi, and D. Weimar, “Who is (not) convinced to withdraw a contract termination announcement? – A discriminant analysis of mobile communications customers in Germany,” Telecommunications Policy, vol. 39, no. 1, pp. 38–52, Jan. 2015, doi: 10.1016/j.telpol.2014.11.005.
U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.
Fiannaca, M. La Rosa, R. Rizzo, A. Urso, and S. Gaglio, “An expert system hybrid architecture to support experiment management,” Expert Systems With Applications, vol. 41, no. 4, pp. 1609–1621, Sep. 2013, doi: 10.1016/j.eswa.2013.08.058.
W. Villegas-Ch, J. Govea, R. Gurierrez, and A. Mera-Navarrete, “Optimizing security in IoT ecosystems using hybrid artificial intelligence and blockchain models: a scalable and efficient approach for threat detection,” IEEE Access, p. 1, Jan. 2025, doi: 10.1109/access.2025.3532800.
P. Phalaagae, A. M. Zungeru, A. Yahya, B. Sigweni, and S. Rajalakshmi, “A Hybrid CNN-LSTM Model with Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks,” IEEE Access, p. 1, Jan. 2025, doi: 10.1109/access.2025.3555861.
F. C. Andriulo, M. Fiore, M. Mongiello, E. Traversa, and V. Zizzo, “Edge Computing and Cloud Computing for Internet of Things: a review,” Informatics, vol. 11, no. 4, p. 71, Sep. 2024, doi: 10.3390/informatics11040071.
P. Ranaweera, A. D. Jurcut, and M. Liyanage, “Survey on Multi-Access Edge Computing Security and Privacy,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1078–1124, Jan. 2021, doi: 10.1109/comst.2021.3062546.
H. Sodhro, Z. Luo, A. K. Sangaiah, and S. W. Baik, “Mobile edge computing based QoS optimization in medical healthcare applications,” International Journal of Information Management, vol. 45, pp. 308–318, Sep. 2018, doi: 10.1016/j.ijinfomgt.2018.08.004.
Z. Xiong, S. Feng, D. Niyato, P. Wang, and Z. Han, “Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain,” 2018 IEEE International Conference on Communications (ICC), May 2018, doi: 10.1109/icc.2018.8422517.
C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A comprehensive survey on FoG Computing: State-of-the-Art and Research challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 416–464, Nov. 2017, doi: 10.1109/comst.2017.2771153.
CRediT Author Statement
The author reviewed the results and approved the final version of the manuscript.
Acknowledgements
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics Declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of Data and Materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author Information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding Author
Prathap Mani
Department of Computer Science and Information Technology, American University of Kurdistan, Sumel, Iraq.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this Article
Prathap Mani, “Edge and Cloud Computing Architectures in IoT A Systematic Review on Applications Security and Resource Management”, Elaris Computing Nexus, pp. 011-021, 06 April 2025, doi: 10.XXXXX/ECN/2025002.