Abstract

Cyber-Physical Systems(CPS) serves as an interdisciplinary effort that incorporates cyber vector as well as physical vector. The latter can generate exponentially growing amounts of data. How to process CPS big data systematically and efficiently is the key to the breakthrough of offering prospective and personalized services for each individual user and entity involved. In recent years, much research has been proactively conducted on advancing specific scenario or algorithm. However, few surveys value their integration. For good measure, the synthesis remains a fundamental challenge. Subsequently, we fill the gap in the literature by constructing cloud computing, fog computing and edge computing as a whole to inspire on new architectures and cross utilizations. Moreover, bringing the enthusiasm of traditionally solitude entities into play is crucial. In this exploratory study, we examine definitions of CPS as well as the three aforementioned computing paradigms and then shed new light on comprehensively established frameworks. We also survey on the application level of Cloud-Fog-Edge Computing in CPS respectively and dive into diversified algorithms and strategies to embed big data applications into a more intelligent and convenient society with current deficiencies and future research directions followed.

Highlights

  • With the upgrading of smartphones, tablets and televisions on a stable, sustained and coordinated development, the explosion of end devices inevitably produces massive amount of data, as well as the consequent data processing and data security requirements [1]

  • Framework for cloud-fog-edge computing in CPS As illustrated in Fig. 2, we introduced the holistic integration of cloud computing, fog computing and edge computing

  • Dynamic resource provisioning for CPS in fog computing In this subsection, we review the existing researches on fog computing

Read more

Summary

Introduction

With the upgrading of smartphones, tablets and televisions on a stable, sustained and coordinated development, the explosion of end devices inevitably produces massive amount of data, as well as the consequent data processing and data security requirements [1]. Cloud computing opens up new horizons for distributed computing methods and it creates an established, dynamic computing mode, which supplies information technology(IT) services as public computing resources It decomposes huge data computing and processing programs into enormous small programs through the cyber ‘cloud’, and processes and analyzes them through multiple servers to get results which will be sent back to the users [19]. In the standard definition document published by the National Institute of Standards and Technology(NIST), cloud computing is a mode which offers an available, convenient and ondemand network access to the shared pool, owning rich and powerful configurable computing resources [20] All these resources can be used immediately and take up few general commands along with the interaction with service providers [21, 22]. A feedback loop controlling principle is adopted, accessible to each layer in the system and serving as a interweaving thread that connects three layers together as a whole. [32] illustrates the scene where end clients have access to information via any person computer(PC) linked to the Internet and programming level is not open to client users as it objects to cloud centers, achieving the sharing and protecting of

Related Work
Thematic clusters
Method
Benefits of edge computing
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.