Abstract
Geographically dispersed Fog Computing architecture ubiquitously connected to a range of heterogeneous nodes at the edge of the network can provide cooperative flexible, and variable computations, communications, and storage services. Several fog computing methods, models, and techniques have been used to solve cloud issues. The fuzzy theory has also been used in many aspects of fog computing. Objectives: This work presents a systematic literature review of the use of fuzzy theory in Fog Computing, highlighting the main practical motivations, classification types in research approaches, fuzzy methods used, popular evaluation tools, open issues, and future trends. Methods: The investigations were systematically performed using fuzzy theory in fog computing, and four databases which are ScienceDirect, Web of Science (WoS), Scopus, and IEEE Xplore Digital Library from 2015 to 2022, were used to analyse their performance evaluation, architecture, and applications. Results: 94 articles were selected based on fuzzy theory in fog computing using different methods, models, and techniques, based on the proposed exclusion and inclusion criteria. The results of the taxonomy were divided into five major classes: task and resource management, intrusion detection systems, trust management, and healthcare services. Discussion: Applications requiring real-time, low latency, and quick responses are well suited for fog computing. These studies show that resource sharing improves the fog computing architecture by delivering reduced latency, distributed processing, improved scalability, better security, fault tolerance, and privacy. Conclusion: The majority of the time, research areas on fuzzy theory in fog computing are crucially significant. We conclude that this review will enhance research capacity, thereby expanding and creating new research domains.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.