Optimal service provisioning for the scalable fog/edge computing environment

Jonghwa Choi, Sanghyun Ahn

Research output: Contribution to journalArticlepeer-review

8 Scopus citations


In recent years, we observed the proliferation of cloud data centers (CDCs) and the Internet of Things (IoT). Cloud computing based on CDCs has the drawback of unpredictable response times due to variant delays between service requestors (IoT devices and end devices) and CDCs. This deficiency of cloud computing is especially problematic in providing IoT services with strict timing requirements and as a result, gives birth to fog/edge computing (FEC) whose responsiveness is achieved by placing service images near service requestors. In FEC, the computing nodes located close to service requestors are called fog/edge nodes (FENs). In addition, for an FEN to execute a specific service, it has to be provisioned with the corresponding service image. Most of the previous work on the service provisioning in the FEC environment deals with determining an appropriate FEN satisfying the requirements like delay, CPU and storage from the perspective of one or more service requests. In this paper, we determined how to optimally place service images in consideration of the pre-obtained service demands which may be collected during the prior time interval. The proposed FEC environment is scalable in the sense that the resources of FENs are effectively utilized thanks to the optimal provisioning of services on FENs. We propose two approaches to provision service images on FENs. In order to validate the performance of the proposed mechanisms, intensive simulations were carried out for various service demand scenarios.

Original languageEnglish
Article number1506
Pages (from-to)1-21
Number of pages21
Issue number4
StatePublished - 2 Feb 2021


  • Fog/edge computing
  • Internet of Things (IoT)
  • Service offloading
  • Service placement
  • Service provisioning


Dive into the research topics of 'Optimal service provisioning for the scalable fog/edge computing environment'. Together they form a unique fingerprint.

Cite this