Internet Computing7
Internet Computing7
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
2 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Learning Goals of the Lecture
Understand the concepts of cloud, fog, and edge computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
3 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Reference to the Teaching Material Provided
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
4 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Literature of the Lecture
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., and Ghalsasi, A. (2011):
Cloud Computing – The Business Perspective. In: Decision Support
Systems 51(1), p. 176-189.
Krcmar, H., Eckert, C., Roßnagel, A., Sunyaev, A., Wiesche, M. (2018):
Management sicherer Cloud-Services
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
5 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Motivation
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
6 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing?
Image source: [Cloud Computing] by Stormotion Team, Oktober 23rd 2017. Licensed under CC BY 2.0.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
7 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Poll
Low familiarity?
Medium familiarity?
High familiarity?
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
8 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Services Market Size 2016–2027
(in Billion Euro)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
9 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Market Leader End of 2024, ‘Hyperscaler’
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
11 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Germany as Important Region
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
12 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Cloud Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
13 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Cloud Computing
From examining the history of computing, the arrival of the cloud computing era
can be seen as an evolutionary development
Cloud computing has its roots in the advancements of several technologies:
Cloud Computing
Internet Systems
Hardware Technologies Distributed Management
(e.g., virtualization, (e.g., web services,
Computing (e.g., autonomic
multi-core chips) service-oriented (e.g., clusters, grids) computing, data center
architectures) automation)
Source: Voorsluys W, Broberg J, Buyya R (2011) Introduction to cloud computing. In: Buyya R, Broberg J,Goscinski A (eds) Cloud computing. Wiley, Hoboken, NJ, pp 3 – 42
Source: Iyer B, Henderson JC (2010) Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec 9(2):117 – 131.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
14 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Cloud Computing
The idea of providing computing as a service through networks dates back to the late
1960s and became a driving force behind the early development of the Internet
Vision became reality with emergence of ‘application service provisioning‘ during the 80s
Third-party providers deploy, manage, and remotely host packaged software applications through
centrally located servers and deliver them to organizations on a rental or lease arrangement
However, early application service providers failed due to insufficient bandwidth and
computing power
During the late 1990s: Tremendous investment and entry of new organizations in the
telecommunications industry that lead to a large increase in global fiber-optic networking,
dramatically reducing network latency and related costs
Source: Venters W, Whitley EA (2012) A critical review of cloud computing: researching desires and realities. J Inf Technol 27(3):179 – 197
Source: Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility.
Futur Gener Comput Syst 25(6):599 – 616
Source: Hogendorn C (2011) Excessive(?) entry of national telecom networks, 1990 – 2001. Telecommun Policy 35(11):920 – 932
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
15 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Cloud Computing
The improvement of networking was coupled with the emergence of
technologies and techniques to coordinate the large-scale, on-demand provision
of computing resources achieved by drawing on innovations around
‘grid computing’
‘utility computing’
virtualization of hardware
At the same time, organizations such as Alphabet (later parent company of
Google), Amazon, and Microsoft set up large data centers to transfer computing
processes from individual computers and private IT infrastructures to large
external and public data centers accessible over the Internet
Around 2007 became labeled as ‘cloud computing’
Source: Venters W, Whitley EA (2012) A critical review of cloud computing: researching desires and realities. J Inf Technol 27(3):179 – 197
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
16 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Cloud Computing
With cloud computing, a product-centric model for IT provisioning is transformed into a
global, distributed, service-centric model, leading to a disruptive shift from IT-as-a-product
to IT-as-a-service
Cloud computing has changed the way how IT services are invented, developed,
deployed, scaled, updated, maintained, and paid for
Cloud computing also provides the infrastructure that has powered key digital trends
including mobile computing, the Internet of Things, big data, and artificial intelligence,
thereby accelerating industry dynamics, disrupting existing business models, and fueling
the digital transformation
Defying initial concerns, cloud computing has become a critical IT infrastructure for almost
every aspect of our everyday lives, and it will continue to transform the world we live in on
multiple levels and in various ways
Source: Iyer B, Henderson JC (2010) Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec 9(2):117 – 131.
Source: Benlian A, Kettinger WJ, Sunyaev A, Winkler TJ (2018) Special section: The transformative value of cloud computing: a decoupling, platformization, and recombination
theoretical framework. J Manag Inf Syst 35(3):719 – 739
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
17 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Basics of Cloud Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
18 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
NIST’s Cloud Computing Definition
Definition
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
19 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing Stack
Applications
(SaaS, Web Services)
Platform Infrastructure
(PaaS, Application Server, Database)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
20 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-resources
On-demand Self-service
Ubiquitous Access
Multitenancy
Location Independence
Rapid Elasticity
Pay-per-use Billing
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
21 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
• All cloud offerings can be expressed as a service
Service-based IT-
resources • Each service comes with a Service Level Agreement,
defining functions and qualities
On-demand Self-service
Ubiquitous Access
Multitenancy
Location Independence
Rapid Elasticity
Pay-per-use Billing
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed on 22.03.2022.
Image source: [Laptop] by Mohammed Hassan, April 23th 2018. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
22 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
• A consumer can unilaterally provision computing
capabilities as needed automatically
On-demand Self-service • Without requiring human interaction with each service
provider
• Such as server time, network storage and user licenses
Ubiquitous Access
Multitenancy
Location Independence
Rapid Elasticity
Pay-per-use Billing
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed on 22.03.2022.
Image source: [Smartphone] by Velázquez Diego, March 20th 2017. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
23 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
On-demand Self-service
Multitenancy
Location Independence
Rapid Elasticity
Pay-per-use Billing
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed on 22.03.2022.
Image source: [Cloud Network] by Linforth Pete, July 20th 2019. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
24 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
On-demand Self-service
Ubiquitous Access
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
25 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
On-demand Self-service
Ubiquitous Access
Multitenancy
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
26 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
On-demand Self-service
Ubiquitous Access
Multitenancy
Location Independence
• Capabilities can be elastically provisioned and released, in some
cases automatically, to scale rapidly outward and inward
Rapid Elasticity commensurate with demand
• To the consumer, the capabilities available for provisioning often
appear to be unlimited and can be appropriated in any quantity at
Pay-per-use Billing any time
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed on 22.03.2022.
Image source: [Cloud Services] by Altmann Gerd, Oktober 21 th 2020. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
27 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Unique Characteristics of Cloud Services
Service-based IT-
resources
On-demand Self-service
Ubiquitous Access
Multitenancy
Location Independence
Rapid Elasticity
• Cloud systems automatically control and optimize resource use by leveraging a
metering capability at some level of abstraction appropriate to the type of
service
Pay-per-use Billing
• e.g., storage, processing, bandwidth, and active user accounts
• Resource usage can be monitored, controlled, and reported, providing
transparency for both the provider and consumer of the utilized service
Source: Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf. Accessed on 22.03.2022.
Image source: [Fast Computing] by Mohammed Hassan, March 2nd 2019. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
28 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models
Software
as a Service
Platform as a
Service
Infrastructure as a
Service
Image source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
29 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models — IaaS
Infrastructure as a service (IaaS) is a cloud
computing offering in which a vendor provides users
access to computing resources such as servers,
storage and networking
Organizations use their own platforms and
applications within a service provider’s infrastructure
Key features
Instead of purchasing hardware outright, users pay for IaaS on demand
Infrastructure is scalable depending on processing and storage needs
Saves enterprises the costs of buying and maintaining their own hardware
Enables the virtualization of administrative tasks, freeing up time for other work
Leading cloud providers offering IaaS are Amazon, IBM, Microsoft, Rackspace,
NTT, Oracle, and Fujitsu, among others
Image source: [Cloud Service Models] by IBM, n.d. Licensed under © IBM.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
30 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models — PaaS
Platform as a service (PaaS) is a cloud computing offering
that provides users with a cloud environment in which they
can develop, manage and deliver applications.
In addition to storage and other computing resources,
users are able to use a suite of prebuilt tools to develop,
customize and test their own applications.
Key features
PaaS provides a platform with tools to test, develop and host applications in the same environment
Enables organizations to focus on development without having to worry about underlying
infrastructure
Providers manage security, operating systems, server software and backups
Facilitates collaborative work even if teams work remotely
Leading providers offering PaaS are Amazon, Microsoft, Alibaba, Google, IBM, and
Rackspace, among others
Image source: [Cloud Service Models] by IBM, n.d. Licensed under © IBM.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
31 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models — SaaS
Software as a service (SaaS) is a cloud
computing offering that provides users with
access to a vendor’s cloud-based software
Users do not install applications on their local
devices. Instead, the applications reside on a
remote cloud network accessed through the
web or an API
Through the application, users can store
and analyze data and collaborate on projects
Key features
SaaS provide users with software and applications via a subscription model
Users do not have to manage, install or upgrade software; SaaS providers manage this
Data is secure in the cloud; equipment failure does not result in loss of data
Applications are accessible from almost any internet-connected device, from virtually anywhere in
the world
Leading cloud providers offering SaaS are Salesforce, Microsoft, SAP, Oracle, Adobe
Systems, and IBM, among others
Image source: [Cloud Service Models] by IBM, n.d. Licensed under © IBM.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
32 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models — Everything as a Service
(XaaS)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
33 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Service Models — Everything as a Service
(XaaS)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
34 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Deployment Models
Public Private
Multi Hybrid
Virtual Community
Private
Source: Lins, S., & Sunyaev, A. (2018). Klassifikation von Cloud-Services. In H. Krcmar, C. Eckert, A. Roßnagel, A. Sunyaev, & M. Wiesche (Eds.), Management sicherer Cloud-Services (pp.
7–13). Wiesbaden: Springer Fachmedien Wiesbaden.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
35 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Chances and Challenges of Cloud Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
36 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Survey
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
37 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Reasons to Move Into the Cloud
Due to its inherent characteristics (e.g., on-demand self-service,
resource pooling, elasticity, and extensibility), cloud computing enables
persons and organizations to achieve diverse benefits and opportunities
Access to Leading
Edge IT
Low Entry Barriers Pay-as-you-go
Resources, Skills,
and Capabilities
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
38 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Example Risks and Challenges
Source: Ahmed M, Litchfield AT (2018) Taxonomy for identification of security issues in cloud computingenvironments. J Comput Inf Syst 58(1):79–88
Source: Bhattacherjee A, Park SC (2014) Why end-users move to the cloud: a migration-theoretic analysis.Eur J Inf Syst 23(3):357–372
Source: Trenz M, Huntgeburth J, Veit D (2018) Uncertainty in cloud service relationships. Inf Manag55(8):971–983
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
39 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Hot Topics in Cloud Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
40 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Poll
Cloud Gaming
AI as a Service
GAIA-X
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
41 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Gaming
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
42 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Gaming
Definition
Cloud gaming refers to a new way to deliver computer games to users, where
computationally complex games are executed on powerful cloud servers, the
rendered game scenes are streamed over the Internet to gamers with thin
clients on heterogeneous devices, and the control events from
their devices are sent back to cloud servers for interactions
Types of cloud gaming services:
(1) file-based: only a small fragment of the required data is transferred to the users’
devices before they start the game.
(2) command-based: the computer game is executed locally but the game’s logic
processing is outsourced on cloud servers.
(3) video-based gaming: entire outsourcing of all relevant gaming components,
including the game logic and graphic processing
Source: Ladewig, S; Lins, S; Sunyaev, A. (2019) Are We Ready to Play in the Cloud? Developing new Quality Certifications to Tackle Challenges of Cloud Gaming Services.
Proceedings of the CB
Source: Cai et al. (2016) “A Survey on Cloud Gaming: Future of Computer Games,” IEEE Access, vol. 4, pp. 7605–7620.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
43 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Gaming Benefits
Customers can provision various computer games on demand without
downloads, installations, or hardware upgrades
Game manufacturers do not have to worry about how to physically deliver the
computer game to the customer
It is no longer possible to make illegal copies of the software because only a
video stream of a live game is transferred
Image source: Ladewig, S; Lins, S; Sunyaev, A. (2019) Are We Ready to Play in the Cloud? Developing new Quality Certifications to Tackle Challenges of Cloud Gaming Services.
Proceedings of the CBI
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
44 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
AI as a Service (AIaaS)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
45 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Trouble with Using AI
Artificial Intelligence (AI) is undoubtedly one of the most actively debated technologies,
providing glaring opportunities to contribute to individuals’ well-being, the success and
innovativeness of organizations, and societies’ prosperity and advancement
One major challenge for organizations is the complex and demanding process of adopting
and integrating AI, which is rather considered “a journey and not a destination”
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
46 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The Emergence of Artificial Intelligence Services
Definition
Benefits Challenges
optimizing users’ core business with the trade-off between user control and ease of
support of cloud-based AI services use
achieving short time-to-market technical robustness and interoperability of
services
no need to rely on AI engineers data governance and protection mechanisms
achieving higher performance and trade-off between accuracy and fairness vs.
resilience generalizability
… …
Source: Lins et al. (2021) Artificial Intelligence as a Service – Classification and Research Directions. In: Business & Information Systems Engineering (forthcoming)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
47 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
AIaaS — Service Stack
AI software services that are ready-
to-use AI applications and building
blocks
Source: Lins et al. (2021) Artificial Intelligence as a Service – Classification and Research Directions. In: Business & Information Systems Engineering (forthcoming)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
48 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
GAIA-X
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
49 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
GAIA-X: A Federated Data Infrastructure for Europe
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
50 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
The GAIA-X Ecosystem Idea
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
51 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog & Edge Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
58 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Motivation
One of the biggest challenges for future trends and digital innovations like the Internet of
Things (IoT), embedded artificial intelligent, or ubiquitous computing is the management,
storage and processing of huge amounts of data
[1]
Millions of new devices, sensors and applications will be
going online in the next decade
Measuring, monitoring, analyzing, processing and
reacting are just a few examples of tasks that have to be
done with the data flood that will be generated by them
Current infrastructure will struggle to cope with the data [2]
flood
Image source [1]: [Internet of things] by jeferrb, May 25th 2015. Pixabay License.
Image source [2]: [Artificial intelligence] by Gordon Johnson, October 20th 2016. Pixabay License.
Source: Brogi A, Forti S (2017) QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J 4(5):1185–1192
Source: Madsen H, Burtschy B, Albeanu G, Popentiu-Vladicescu F (2013) Reliability in the utility computing era: towards reliable [2]
fog computing. Proc. international conference on systems, signals and image processing (IWSSIP)
Source: Bittencourt LF, Lopes MM, Petri I, Rana OF (2015) Towards virtual machine migration in fogcomputing. Paper presented at the 10th international conference on P2P, parallel, grid,
cloud andinternet computing (3PGCIC)
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
59 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Example Data Challenges
How to handle the up-coming data flood
of consuming and producing large data
1 2
amounts? Amount of data Latency
Rising amounts of data that High demand for low
How to deal with the high demand for a have to be processed latency when providing data
[2]
[1] [2]
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
61 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fundamentals of Fog and Edge Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
62 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog, Edge, and Cloud Computing
Cloud
Edge Edge
Image source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
adapted from Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies,applications and open issues. J Netw Comput Appl 98:27 – 42
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
63 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
NIST’s Fog Computing Definition
To cope with these challenges, fog computing presents a new
distributed architecture that helps to reduce latency and supports the
storage, management and processing of huge data amounts
Definition
Source: Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model (NIST SP 500-325).
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf. Accessed 17 Sept 2019
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
64 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Nodes
Definition
Fog nodes are either physical components or virtual components that are tightly
coupled with the smart end-devices or access networks and provide computing
resources to these devices.
A fog node typically…
provides some form of data management (i.e., computing or storage)
enables communication services between network’s edge layer and the fog computing service
or the centralized (cloud) computing resources
is aware of its geographical distribution and logical location
can be deployed in a centralized or decentralized manner
Fog nodes are either…
Physical: gateways, switches, routers, servers, …
Virtual: virtualized switches, virtual machines, cloudlets, …
Source: Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model (NIST SP 500-325).
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf. Accessed 17 Sept 2019
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
65 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Nodes — Examples
Cloud&Heat: Data Center in the ‚Box‘
Source: https://www.cloudandheat.com/wp-
content/uploads/2018/06/cebitCloudHeat-9511.jpg
Image source: Tordera et al. (2016): What is a Fog Node? A Tutorial on Current Concepts towards a Common Definition. https://arxiv.org/ftp/arxiv/papers/1611/1611.09193.pdf.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
66 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Computing’s Key Characteristics
Predominance of
Support for Mobility
Wireless Access
Source: Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model (NIST SP 500-325).
Source: Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. Paper presented at the international conference on wireless algorithms, systems, and applications
Source: Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. Paper presented at the first edition of the MCC workshop on mobile cloud computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
67 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Contextual Location Awareness and Low Latency
Contextual
location
awareness and
low latency
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
68 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Geographical Distribution
Geographical
distribution
Fog computing consists of many fog nodes that are distributed in the environment
Based on this distribution, fog nodes can track the location of the end-devices
Demanded by applications and services that…
need low latency for real-time decision making,
are location-based or
have special security requirements
Distributed endpoints and fog nodes ensure context awareness
Source: Refer to previous slide and reference list for further sources
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
69 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Autonomy and Heterogenity
Autonomy &
Heterogeneity
Autonomy: fog nodes can operate independently and make own decisions local
Fog computing has many heterogeneous fog nodes:
They can be virtual or physical
Their functions range from collecting data up to analyzing or processing huge
amounts of data and can change immediately
The variety of distributed environments, where fog computing is used (office
environment vs. outdoor environment)
Source: Refer to previous slide and reference list for further sources
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
70 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Interoperability and Federation
Interoperability
and Federation
Fog nodes must be able to interoperate and services must be federated across different
domains
Fog computing supports hierarchical structures. Nodes can be configured to deliver the
service as stand-alone fog node (organized vertically) or as federated node to form clusters
that provide horizontal scalability over disperse geolocations (organized horizontally)
Interoperability refers to that each fog node is able to provide and receive services from other
actors in the fog infrastructure and to use these services to operate effectively together
Source: Refer to previous slide and reference list for further sources
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
71 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Real-time Interactions
Real-time
Interactions
Source: Refer to previous slide and reference list for further sources
Image Source: [Google Self-Driving car] by Smoothgroover22, May 28th 2014. Licensed under CC BY-SA 2.0.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
72 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Key characteristics:
Scalability and Agility of Federated Fog Clusters
Scalability and
Agility of
Federated Fog
Clusters
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
73 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Additional Characteristics of Fog Computing
In addition to these six key characteristics, the following characteristics
are often associated with fog computing:
Predominance of wireless access: The large scale of wireless sensors in IoT
implementations demand distributed computing power
Support for mobility: Fog nodes can communicate directly with mobile devices
→ enables mobile data analytics (opportunity for IoT, smart city or smart
vehicles). Mobility is a key distinction between fog computing and cloud
computing.
Source: Refer to previous slide and reference list for further sources
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
74 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Computing Tasks & Roles
Source: Blume M, Lins S, Sunyaev A (2023) Uncovering Effective Roles and Tasks for Fog Systems. Proceedings of the 10th European Conference On Service-Oriented And Cloud
Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
76 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Computing Tasks & Roles
Source: Blume M, Lins S, Sunyaev A (2023) Uncovering Effective Roles and Tasks for Fog Systems. Proceedings of the 10th European Conference On Service-Oriented And Cloud
Computing
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
77 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog, Edge, and Cloud Computing
Cloud
Edge Edge
Image source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
adapted from Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies,applications and open issues. J Netw Comput Appl 98:27 – 42
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
78 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Edge Computing
Definition
Edge computing refers to the enabling technologies allowing computation to be
performed at the edge of the network, on downstream data on behalf of cloud
services and upstream data on behalf of IoT services.
Describes end-device layer, which are used for local computations or sensing
Sensors, actuators, or other smart devices
Main difference to fog computing: proximity of computation to the sensing
Example: Smartphone connected to sensors on the body (heart rate etc.)
Source: Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637 – 646
Source: Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018) Fog computing conceptual model (NIST SP 500-325).
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
79 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Enabling Technologies — Overview
Tagging Sensor Smart Miniaturization
Technologies Technologies Technologies Technologies
Identification Perception Intelligence Size
Image so urce: A dapted fr om [Wireless Sen sor Image so urce: [Kün stliche Intellige nz] b y
Image so urce: [Access co ntr ol] by Plank Image source: [Chip] by Altmann Gerd, June 3th
Susann e, July 3r d 2 019. Pixabay License.
Networ k] by Mohammed Mehdi Sale h, Apr il Altmann Ger d, May 1 1th 201 8. Pixabay 2020. Pixabay License.
16th 2019 . License.
To embed intelligence in
Tagging technologies Sensors collect data “Things become all kinds of physical
about the real world.
allow to track and count They smart” they are being objects, computer chips
virtually any physical can augment and equipped with data and sensors need to
object. complement human processing become ever so
senses. capabilities. smaller.
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Source: Swan M (2012) Sensor mania! The internet of things, wearable computing, objective metrics, and the quantified self 2.0. J Sens Actuator Netw 1(3):217 – 253
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
80 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
‘Things‘ in the Edge Layer
Smart devices tend to be multi-
Smart purpose ICT devices, operating as a
Devices single portal to access sets of popular
multiple application services that may
Image source: [Smart Objects] by Altmann Gerd, reside locally on the device or remotely
May 13t h 2018. Pixabay License.
on servers.
Smart
Smart Objects are physical Objects
objects augmented with Image source: [Smart Devices] by Altmann
sensing, processing, and Gerd, August 1th 2018. Pixabay License.
Edge
Image source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems Image source: Apapted from Recent advances in mobile edge computing and content cach
and Emerging Internet-Based Technologies, Springer By Sunitha Safavat, Naveen Naik Sapavath, Danda B.Rawat.
adapted from Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, https://www.sciencedirect.com/science/article/pii/S2352864819300227.
key technologies,applications and open issues. J Netw Comput Appl 98:27 – 42 Accessed on 22.03.2022.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
83 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Challenges of Fog and Edge Computing (1/4)
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Source: Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27 – 42
Source: Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. Paper presented at the international conference on wireless algorithms, systems, and
applications
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
84 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Challenges of Fog and Edge Computing (2/4)
1 Security
Computational and storage capabilities of
fog, edge, and cloud computing differ
significantly from each other
2 Heterogeneity Variation between and within different fog
and edge domains
Data is generated from different end devices,
3 Programming platform with various processors, having to interact
with each other
Network infrastructure of fog and edge
computing includes not only high-speed
4 Energy management
links, but also wireless access technologies
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Source: Mahmud R, Kotagiri R, Buyya R (2018) Fog computing: a taxonomy, survey and future directions. In: Di Martino B, Li K-C, Yang LT, Esposito A (eds) Internet of everything:
algorithms, methodologies, technologies and perspectives. Springer, Singapore, pp 103 – 130
Source: Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2018) A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE
Commun Surv Tutorials 20(1):416 – 464
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
85 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Challenges of Fog and Edge Computing (3/4)
1 Security
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
86 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Challenges of Fog and Edge Computing (4/4)
1 Security
4 Energy management
Source: Sunyaev, A (2020) Internet Computing. Principles of Distributed Systems and Emerging Internet-Based Technologies, Springer
Source: Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637 – 646
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
87 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog and Edge Computing Use Cases
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
88 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Public Fogs in Buses
Inter-State Bus Greyhound has launched “BLUE”,
an on-board Fog computing system over inter-
state buses for entertainment services
Fog server can be deployed inside the bus
Fog provides on-board video streaming, gaming
and social networking services to travellers using
WiFi
The on-board Fog server connects to the Cloud
through cellular networks to refresh the pre-
catched contents and update application services
Using its computing facility, the Fog server can
also collect and process user’s data, such as
number of travellers and their feedbacks, and
report to cloud
Source: Gao L., Luan T.H., Liu B., Zhou W., Yu S. (2017) Fog Computing and Its Applications in 5G. In: Xiang W., Zheng K., Shen X. (eds) 5G Mobile Communications. Springer, Cham.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
89 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Hilti Nuron
Resource management
software
Sensors in devices and
batteries automatically capture
information on location,
utilization, usage, errors and
performance status
Using fog nodes to
communicate with tools on the
construction side
Connect tools via fog nodes
Source: https://www.hilti.de/content/hilti/E3/DE/de/business/business/productivity/nuron -data-driven-services.html#nav/close
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
90 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Maritime Fog Computing
Ocean researchers contribute to a better understanding of global climate change, biodiversity
protection, ocean resource development, and intelligent maritime transportation.
Sensing and communication technologies, ranging from deep sea sensing to on-water maritime service,
such as marine pollution monitoring, search and rescue (SAR) at sea…
Research proposes to use cargo ships and passenger ships and coastal infrastructures (e.g.,
lighthouses and base stations on the shore) as maritime fog nodes
Source: C. Zhu, W. Zhang, Y. -H. Chiang, N. Ye, L. Du and J. An, "Software-Defined Maritime Fog Computing: Architecture, Advantages, and Feasibility," in
IEEE Network, vol. 36, no. 2, pp. 26-33, March/April 2022, doi: 10.1109/MNET.003.2100433.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
91 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Transportation — Decentralizing maintenance
Transport companies are under constant pressure not just to make deliveries on time but
to maintain their vehicles as well
Companies using edge devices onboard of trucks monitoring the condition of brake pads
and how much mileage a vehicle has
This produces valuable data but there is the problem of poor connectivity in areas where
there is no cellular coverage during transit
No cellular coverage means that data can’t be transmitted to the cloud
The fog computing solution is to send that data to a fog node and notify the driver if action
needs to be taken
→ Decentralizing maintenance in this way
helps to ensure that vehicles stay updated
and on the road.
Source: What is Fog Computing by Keary Tim. https://www.itprc.com/fog-computing/
Image source: [Self driving transport vehicle] by Linneakornehed, July 3th 2018. Licensed under CC BY-SA 4.0.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
92 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Computing in Health Care
A wide variety of research about monitoring, detection, diagnosis and visualization of
health maladies have been proposed in recent years
Cao et al. (2015) proposed FAST: A fog computing assisted distributed analytics system to
monitor fall for stroke mitigation
They implemented fall detection algorithms and incorporated them into fog-based
distributed fall detection system, which distribute the analytics throughout the network by
splitting the detection task between the edge devices (smart phones attached to the users)
and the server (servers in the cloud)
Source: Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge Computing: Vision and Challenges. IEEE Internet of Things Journal 3 (5):637-646. doi:10.1109/JIOT.2016.2579198
Image source: [First Aid] by Gordon Johnson, September 27th 2017. Pixabay License.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
93 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Manufacturing Execution Systems
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
94 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Vehicular Fog
Computing Based
Traffic Information
Delivery System to
Support Connected
Self-Driving Vehicles
in Intersection
Environment
Source: Youn J. (2020) Vehicular Fog Computing Based Traffic Information Delivery System to Support Connected Self-driving Vehicles in Intersection Environment. In:
Park J., Park DS., Jeong YS., Pan Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE 2018, CSA 2018. Lecture Notes in Electrical Engineering,
vol 536. Springer, Singapore
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
95 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Public Fogs in Shopping Centers
Quickly exchange information with fog nodes inside of a shopping center
Source: Gao L., Luan T.H., Liu B., Zhou W., Yu S. (2017) Fog Computing and Its Applications in 5G. In: Xiang W., Zheng K., Shen X. (eds) 5G Mobile Communications. Springer, Cham.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
96 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog Computing as an Integrated Large-Scale
Network for Localized Information Disseminations
Assuming that a store installs a fog server at
its parking lot with the purpose to distribute the
store flyer
In step 1, the store uploads flyers to the fog
server via wireless connections, and the fog
server distributes the flyers wirelessly to
vehicles driving through its coverage using
wireless communications
With the vehicle moving to different locations,
it can further disseminate the cached flyers to
other vehicles using wireless communications,
as depicted in step 2.
In step 3, the flyers can also be retrieved and
cached at other fog servers deployed at
different locations, e.g., bus stop, and further
propagated in the network
Source: Gao L., Luan T.H., Liu B., Zhou W., Yu S. (2017) Fog Computing and Its Applications in 5G. In: Xiang W., Zheng K., Shen X. (eds) 5G Mobile Communications. Springer, Cham.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
97 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Questions
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
98 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Questions
1. What are the main characteristics of cloud services?
2. What are the major reasons for organizations moving into the cloud?
3. Which risks that cloud service customers face, have been addressed by cloud
providers?
4. What are the key characteristics of fog and edge computing?
5. What is the role of a fog node in the fog computing environment?
6. Why is fog computing an add-on for the traditional cloud computing model?
7. What are the differences between edge computing and fog computing?
8. What are the challenges of fog and edge computing?
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
99 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Further Readings and References
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
100 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing Further Reading
Benlian, A., Kettinger, W. J., Sunyaev, A., Winkler, T. J., & GUEST
EDITORS. (2018). The transformative value of cloud computing: a
decoupling, platformization, and recombination theoretical framework.
Journal of management information systems, 35(3), 719-739.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P.
R. (2014). Security issues in cloud environments: a survey. International
Journal of Information Security, 13(2), 113-170.
Lins S, Schneider S, Sunyaev A (2019) Cloud-Service-Zertifizierung: Ein
Rahmenwerk und Kriterienkatalog zur Zertifizierung von Cloud-Services,
2nd edn. Springer, Berlin
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011).
Cloud computing—The business perspective. Decision support
systems, 51(1), 176-189.
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
101 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog and Edge Computing Further Reading
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in
the internet of things. Paper presented at the fi rst edition of the MCC
workshop on mobile cloud computing, Helsinki, 17 Aug 2012
Iorga M, Feldman L, Barton R, Martin MJ, Goren N, Mahmoudi C (2018)
Fog computing conceptual model (NIST SP 500-325).
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf.
Kai K, Cong W, Tao L (2016) Fog computing for vehicular ad-hoc networks:
paradigms, scenarios,and issues. J China Univ Posts Telecommun 23(2):56
– 96
Mahmood Z (2018) Fog computing: concepts, frameworks and
technologies, 1st edn. Springer, Cham
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a
survey. Paper presented at the international conference on wireless
algorithms, systems, and applications, Qufu,10 – 12 Aug 2015
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
102 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing References 1/4
Ahmed M, L itchfield AT (2 018) Taxo nomy for identification of security issues in cloud computing
Bur da D, Teuteberg F ( 2014) The role of trust a nd risk perceptions in cloud ar chiving — results
environ me nts. J Comput Inf Syst 58( 1):79–88
from an empirical study. J High Technol Manag Res 25 (2):172–187
Anisetti M, Ard agna C, Damiani E, Ga udenzi F ( 2017) A semi-automatic an d trustwo rth y sche me
Bur nham TA, Frels JK, Maha jan V ( 2003) Consumer switch ing costs: a typolog y, antece dents, and
for co ntin uous cloud service certifica tion . IEEE Tr ans Se rv Comput 10( 1):1–14
consequen ces. J Acad Mark Sci 31( 2):109
Ann ette JR, Banu WA, Chand ran PS (2015 ) Rend ering-as-a-service : taxo nomy and comparison.
Buyya R, Yeo CS, V enugop al S , Bro berg J, Bra ndic I ( 2009) Cloud computing and emerging IT
Pro ced ia Comput Sci 50:276–281
platforms: vision , hype, a nd reality for delivering computing as the 5th utility. Futur Ge ner
App s Run The World (2 017) Cloud applications r eve nue fr om lea ding ve ndors wor ldwid e in 20 15
Comput Syst 25(6 ):5 99–616
and 20 16 (in millio n U.S. do llars). https://www.sta tista.com/statistics/47 5844/cloud-app lica
Cafaro M, Aloisio G (20 11) Grids, cloud s, and vir tua lization. In : Cafaro M, Aloisio G (ed s) Gr ids,
tions-revenu es-worldwide-by-vendor /. Accessed 11 Dec 2018
clouds and vir tua lization. Co mp ute r communications a nd networ ks. Sp ringer, Londo n, pp 1–21
Ara sar atn am O (20 11) In tro duction to clo ud compu ting . In: Halpert B (ed) Au ditin g cloud
Carr N ( 2008) The big switch : rewiring the wo rld, from Edison to G oogle. W.W. Norton,
computing, a security and pr ivacy g uide. Wiley, Hobo ken , NJ, pp 1–13
New Yo rk, NY
Baja j A (20 00) A study of senior information systems manage rs decision models in ad opting new
Cloudscene (20 18) To p ten data center operators in Nor th America, EMEA, O cea nia and Asia for
computing architecture s. J AIS 1(1es):4
the Ja nuary to March 2018 per iod. https://clou dscene .com/top 10. Accessed 11 Dec 2 018
Bald win LP, Ir ani Z, Love P ED (20 01) Outsourcing information systems: dr awin g le ssons fro m a
Cusumano M (2 010) Cloud co mp utin g a nd SaaS as n ew computing platfo rms. Commun ACM 5 3
ban king case study. Eu r J In f Syst 10(1) :15–24
(4) :27–29
Bayramusta M, Nasir VA (2016) A fad or fu tur e o f IT?: a compr ehensive litera tur e r evie w on the
Dašić P, Dašić J, Crvenković B (201 6) Service mode ls for clou d computing: se arch a s a se rvice
cloud computing research. Int J In f Manag 36( 4):635–644
(Sa aS). Int J Eng Technol (IJET) 8(5) :23 66–237 3
Ben lian A, Hess T (2011 ) O pportunities and risks of software-as-a-service : findings fro m a survey
Dillon T, Wu C, Chan g E (2 010) Cloud co mp utin g: issu es and challen ges. Pape r p resented at the
of IT exe cutives. Decis Sup port S yst 52 (1):232–246
24th IEEE international conference on advanced information netwo rkin g a nd applications,
Ben lian A, Kettinger WJ, Sunyaev A, Winkler TJ (201 8) Special section: The transformative value
Per th, WA, 20–23 Apr 20 10
of clou d computing: a decoupling, platformizatio n, a nd recombination th eoretical framework. J
Doelitzscher F, Fischer C, Moska l D, Reich C, Kna hl M, Clarke N (20 12) Validating cloud
Manag Inf Syst 35( 3):719–739
infrastructur e chan ges by clo ud audits. Paper pr ese nte d a t the 8th IEEE world congress o n
Ben nett C, Timbrell GT (2000 ) A pplicatio n service providers: will the y succeed ? Inf Syst Fron t 2
service s, Hon olulu, HI, 24–29 June 2012
(2) :19 5–211
Durkee D ( 2010) Why cloud computing will ne ver be free. Commun ACM 5 3(5):62–69
Ber ma n F, Hey T (200 4) The scientific imp erative . In: Foster I, Kesselman C ( eds) The grid 2:
ENISA (2012) Cloud computing – ben efits, risks and recommenda tion s for info rmatio n security.
blue print for a new compu ting infrastructu re. The Morgan Ka ufman n serie s in co mp ute r
Eur opean network a nd security a gency. https://resilience.enisa.europ a.e u/cloud-security-
architectu re and design. Mor gan Kaufman, S an Fra ncisco, CA, p p 1 3–24
and resilience/p ublicatio ns/cloud-computing-ben efits-risks-and-recommenda tion s-for-
Bha radwaj A, El Sawy OA , Pavlou PA, Venkatraman N (2 013) Digita l bu sine ss strategy: toward a
informationsecurity. Accessed 17 Sept 2019
next g eneration of insig hts. MIS Q 37(2) :47 1–482
Fernan des DAB, Soares LFB, Go me s JV, Freire MM, Inácio PRM ( 2014) Security issues in cloud
Bha ttacherjee A, Park S C (201 4) Wh y end-users mo ve to the cloud: a mig ration-theore tic analysis.
environ me nts: a survey. Int J Inf Secur 13( 2):113–170
Eur J Inf Syst 23(3):357–372
Foster I, Kesselman C ( 2004) The grid 2: b lueprint fo r a ne w computing infr astructure, 2nd edn.
Böh m M, Leimeister S, Riedl C, Krcmar H ( 2011) Cloud computing – outsourcing 2.0 or a n ew
Elsevier, S an Fra ncisco, CA
business mod el for IT pro visioning ? In: Keu per F, Oe cking C, Degenh ardt A (e ds) Ap plica tion
Foster I, Kesselman C, Tuecke S (200 1) The an ato my of the grid: enablin g scalable virtual
manag ement: challenge s – service creation – str ate gies. Gab ler, Wiesbade n, pp 31–56
org anizatio ns. In t J High Perform Comput App l 15 (3):200–222
Bun ker G , Thomso n D (2006 ) Delivering utility computing: b usin ess-driver IT optimizatio n.
Wiley, Chichester
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
103 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing References 2/4
Ga o F, Thieb es S, Sunyaev A (2 018) Reth inkin g the meanin g o f cloud co mp utin g for hea lth care: a
Ker n T, Lacity MC, Willco cks L (20 02) Netsou rcin g: r enting business applications and se rvices
taxonomic pe rsp ective and fu tur e r ese arch d irection s. J Med In ter net Res 2 0(7):e100 41
over a netwo rk. Prentice-Hall, New Y ork, NY
Ga rtn er (2018a ) Revenue of clo ud compu ting worldwide. https://de.sta tista.com/statistik/daten/
Kha n N, A l-Yasiri A (201 6) Ide ntifying clo ud security thre ats to strengthen cloud computing
stu die/19576 0/umfrage/umsatz-mit-cloud-computing-weltweit/. Accessed 9 Dec 201 8
ado ptio n framework. P rocedia Comput Sci 94:485–490
Ga rtn er (2018b ) Revenue s from p ublic cloud infrastructur e a s a se rvice (IaaS) market world wide
Killale a T ( 2008) Meet the virts. A CM Queu e 6 (1):14–18
from 2015 to 2 017, b y vendor (in million U.S. dollars). https://www.statista.com/statistics/
Klein rock L (2005 ) A vision for the internet. S T J Res 2 (1):4–5
754 826/wo rldwide-pub lic-cloud-infrastructur e-service s-vendor-revenu es/. A ccesse d 1 1 Dec
Kou atli I ( 2014) A comparative study o f the evo lutio n o f vulnerab ilities in IT systems and its
201 8
rela tion to th e n ew concept o f cloud co mp utin g. J Manag Hist 20(4) :40 9–433
Ge fen D, Kar ahanna E, Str aub DW (200 3) Tru st and TA M in online shopp ing: an integr ate d mod el.
Kro eke r KL (20 11) Grid computing’s future. Commun ACM 5 4(3):15–17
MIS Q 2 7(1):51–90
Kro tsiani M, Spa noudakis G, Klou kina s C ( 2015) Monitoring-based certification of cloud service
Go nza lez R, Ga sco J, Llop J ( 2009) Information systems outsou rcin g r easons an d r isks: an
security. Paper pre sen ted at th e O TM confederated interna tion al confere nce s “On the move to
empirical stud y. Int J Soc Sci 4( 3):180–191
meanin gfu l intern et systems” , Rhodes, 26–30 Oct 2 015
Gr ove r V , Kohli R ( 2012) Cocreating IT va lue: ne w capabilities a nd me trics for multifir m
Kumar N, DuPree L (201 1) Protection an d p riva cy of information asse ts in the cloud. In: Halpert B
environ me nts. MIS Q 36(1) :22 5–232
(ed ) A uditing clou d computing, a security a nd privacy guide. Wiley, Ho boken, NJ, pp 97–128
Gr oze v N, Buyya R ( 2014) Inter-cloud architectur es and ap plica tion br oke ring: taxonomy and
Kun z I, Stepha now P (201 7) A p rocess model to suppo rt continuous ce rtification of cloud services.
survey. Softw Pra ct Exp 44(3) :36 9–390
Pap er presented at the 31st IEEE interna tion al confere nce on ad van ced information networking
Hentschel R, Leyh C, Petznick A (201 8) Cur rent cloud challen ges in Ge rmany: the perspective of
and ap plica tion s, Taip ei, 27–29 Mar 2017
cloud service pro vide rs. J Cloud Comput 7(1 ):5
Lan sing J, Ben lian A, Sunyaev A (2 018) ‘Unblackb oxin g’ d ecision makers’ in ter pretations of IS
Hess T, Matt C, Ben lian A, Wiesböck F ( 2016) Op tion s for for mu latin g a dig ital transformation
certifications in the context of cloud service certifica tion s. J Asso c Inf Syst 19(1 1):1064–109 6
str ate gy. MIS Q Exec 1 5(2):123–139
Lee C, Wan G (20 10) In clud ing sub jective norm and te chn ology trust in the tech nology acceptance
Höfer CN, Kar agiannis G (20 11) Clo ud compu ting services: ta xon omy and comparison. J Inte rnet
model: a case of e-ticketing in Ch ina. SIGMIS Da tab ase 41 (4):40–51
Ser v Appl 2(2 ):8 1–94
Leimeister S, Böh m M, Riedl C, Krcmar H ( 2010) The business per spe ctive o f cloud co mp utin g:
Hogend orn C ( 2011) Excessive(?) entry of nationa l telecom networ ks, 19 90–200 1. Telecommun
actors, roles and value netwo rks. P aper presented at the 18 th Eur opean conference on information
Policy 3 5(11):920–932
systems, Pretoria, 7–9 June 2010
Hussain SA , Fatima M, Sa eed A, Raza I, Shahzad RK ( 2017) Multilevel classification of security
Lins S, Gr och ol P, Sch neider S, Sunyaev A (2 016a) Dyn amic certification of cloud service s: tru st,
concerns in cloud computing. Appl Comput Inform 1 3(1):57–65
but ve rify! IEEE Secur Priv 14( 2):66–71
ISO (200 4) Con for mity a ssessmen t – vocabulary and gene ral principles. https://www.iso.org/
Lins S, Teigele r H, S unyaev A (20 16b) Towa rds a brig ht future: e nhancing diffu sion of co ntin uous
sta ndard/293 16.html. Accessed 17 Sept 2 019
cloud service aud iting by th ird parties. Pape r p resented at the 24th Europe an con fer ence o n
ITCand or (20 18) Distribution of cloud pla tform as a service (P aaS) market re ven ues worldwide
information systems, Istanbul, 12–15 June 2016
from 2015 to June 20 18, by ve ndor. https://www.statista.com/statistics/54052 1/world wide clou d-platform-
Lins S, Schne ider S, Su nya ev A (201 8) Tru st is good , control is better: creating secure clo uds by
revenu e-share-by-vendor /. Accessed 11 Dec 2018
continuous auditing. IEE E Tran s Cloud Comput 6(3 ):8 90–903
Iye r B, Hen derson JC (2010 ) P reparin g for the fu tur e: und erstan ding th e seven capabilities o f cloud
Lins S, Schne ider S, Su nya ev A (201 9a) Clo ud-Ser vice-Zertifizieru ng: E in Rahmenwerk und
computing. MIS Q Exec 9(2 ):1 17–131
Kriterie nka talo g zur Zertifizieru ng von Clo ud-Ser vices, 2nd edn. S pringer , Berlin
Jones MA , Mothersbaug h DL, Be atty S E ( 2002) Why customers stay: measuring the underlying
Lins S, Schne ider S, Szefer J, Ibrahe em S, Sunyaev A (2 019b) Designing monitoring systems for
dimensions of services switching costs a nd ma naging their diffe rential strategic outcomes. J Bus
continuous ce rtification of cloud services: d eriving me ta-req uirements an d d esig n g uidelines.
Res 55 (6):441–450
Commun Assoc Inf Syst 44:460–510
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
104 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing References 3/4
Linthicum DS (20 09) Clo ud compu ting an d S OA co nve rgence in you r e nte rprise: a ste p-by-ste p
See tha mr aju R ( 2013) Determinants of SaaS ERP syste ms adoption. Paper pr ese nte d a t the 17th
guid e: how to use SaaS , SOA , Mashups, and web 2.0 to bre ak down the IT gates. Add ison We sley,
Pacific Asia co nfe rence on info rmatio n systems, Jeju Isla nd, 18–22 June 2013
Boston, MA
Seh gal NK, Soh oni S, Xion g Y, Fritz D, Mulia W, Acken JM (2 011) A cr oss se ction of the issu es
Liu F, Tong J, Mao J, Bohn R, Messin a J, B adger L, Leaf D (2011 ) NIST cloud computing
and re sea rch activities related to bo th information secu rity and cloud co mp utin g. IETE Tech Re v
refere nce ar chitecture. h ttps://bigdatawg.nist.gov/_upload files/M0008_v1_7 256814 129.pdf.
28( 4):279–291
Accessed 11 Dec 20 18
Sha rma D, Dhote C, Potey MM ( 2016) Identity and access managemen t as security-as-a-service
Luftman J, Zadeh HS (2011) Ke y information te chn ology a nd ma nagement issues 2010–11: an
from clou ds. Procedia Comput Sci 79:170–174
interna tion al study. J Inf Techno l 26 (3):193–204
Sing h A , Chatter jee K ( 2017) Cloud secu rity issues and challenge s: a survey. J Netw Comput App l
Malluhi Q, Khan KM (2013 ) Trust in cloud service s: providing more controls to clie nts. Computer
79( C):88–115
46( 7):94–96
Sing h S , Jeong Y-S, Park JH ( 2016) A survey on cloud computing security. J Netw Comput App l
Marston S, Li Z, Band yop adhyay S, Zh ang J, Gh alsa si A (201 1) Clou d computing — the business
75( C):200–222
per spe ctive. Decis Sup port S yst 51 (1):176–189
Soa res J, Carapin ha J, Melo M, Monteiro R, Sar gento S (201 1) Building virtual private clouds with
Mell P, Gr ance T ( 2011) The NIST definitio n o f cloud co mp utin g. https://n vlpu bs.nist.go v/
network-aware cloud. Paper pre sen ted at th e 5 th interna tion al confere nce on ad van ced en gineerin g
nistpubs/Legacy/S P/n istspecialpublication800-145 .pd f. Accessed 17 Sept 2 019
computing and applications in sciences, Lisbon, 20–25 Nov 20 11
NIS T Cloud Co mp utin g S ecu rity Working Group (2 013) NIST clo ud compu ting security refere nce
Stepha now P, Ban se C ( 2017) Evaluating the performance of continuo us test-based cloud service
architectu re. https://csrc.n ist.gov/pu blica tion s/detail/sp /50 0-299 /dr aft. A ccesse d 1 0 Dec 2018
certification. Paper pre sen ted at th e 1 7th IEEE/ACM in ter national symposium on cluster, cloud
Pah l C ( 2015) Containerization and the PaaS cloud. IEE E Cloud Comput 2(3 ):2 4–31
and gr id computing, Madrid, 14–17 May 2 017
Par k S-T, Par k E-M, Seo J-H, Li G (201 6) Factors a ffectin g the continuous use o f cloud se rvice:
Stepha now P, Kha jehmoogah i K (201 7) Toward s continuous security certifica tion of so ftware-as-
focuse d o n security risks. Clust Comput 19( 1):485–495
aservice app lications using web ap plica tion testin g techniqu es. Paper pr ese nte d a t the 31st IEEE
Sar kar P, Young L (20 11) Sailing the clo ud: a case study o f perceptions and changing ro les in an
interna tion al confere nce on ad van ced information networking and applications, Taipei,
Australian University. Pa per presented at the 19th Euro pean conference on information systems,
27–29 Mar 2017
Helsinki, 9–11 June 2011
Stepha now P, Ban se C, Schütte J ( 2016) Ge nerating threat profiles for cloud se rvice certification
Schneid er S, Sun yae v A (2016 ) Determinan t factors of cloud-sourcing decisions: reflectin g o n the
systems. Paper pr ese nte d a t the 17th IEEE intern atio nal symposium o n h igh assura nce systems
IT outsourcing literature in th e e ra of cloud computing. J Inf Te chn ol 3 1(1):1–31
eng ineering , Orla ndo, FL, 7–9 Jan 2016
Schneid er S, Lan sing J, G ao F, Sunyaev A (2 014) A ta xon omic perspective on certification
Sub ash ini S, Kavitha V (20 11) A sur vey on se cur ity issues in service delivery mode ls of cloud
sch emes: development of a taxonomy for cloud se rvice certification cr iter ia. Pap er presented
computing. J Netw Comput App l 34 (1):1–11
at the 47 th Hawaii in ter national co nfe rence on system scien ces, Waikoloa , HI, 6–9 Jan 2014
Sun yae v A, S chn eider S (2013 ) Cloud services certification. Commun ACM 5 6(2):33–36
Schneid er S, Wollersheim J, Krcmar H, Sun yae v A (2018 ) How do require me nts evolve over time?
Susarla A, Bar ua A, Whinston AB (20 03) Un dersta nding the ser vice co mp onent of app lication
a case study investigating the ro le o f context and experien ces in the evolution of enterprise
service pr ovision: an empirical analysis of satisfaction with ASP services. MIS Q 27(1) :91–123
software req uirements. J Inf Technol 33( 2):151–170
Tan W, Fan Y, Gh oneim A, Hossain MA, Dustda r S (201 6) Fro m the se rvice-orie nte d a rch itecture
Schwarz A , Jayatila ka B, Hirschh eim R, Go les T ( 2009) A conjoint approa ch to understanding IT
to the web API eco nomy. IE EE Intern et Comput 20( 4):64–68
app lication service s outsourcing. J Assoc In f Syst 10(10 ):1
Teigeler H, Lin s S, S unyaev A (20 18) Dr iver s vs. inhibitors – what clinches con tinu ous service
Schwiegelshohn U, Bad ia RM, Bub ak M, Danelutto M, Dustda r S, Gagliar di F, G eiger A,
certification adop tion by clo ud ser vice providers? Pape r p resented at the 51th Hawaii internationa l
Hluchy L, Kra nzlmülle r D, Lau re E, Prio l T, Reinefeld A, Resch M, Re ute r A , Rienhoff O,
conference on system sciences, Hilton Waikoloa Village , HI, 3–6 Jan 2018
Rüter T, Sloo t P, Talia D, Ullmann K, Yah yap our R ( 2010) Per spe ctives on grid computing.
Futur Ge ner Comput Syst 26(8 ):1 104–111 5
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
105 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Cloud Computing References 4/4
Thiebes S, Kleib er G, Sunyaev A ( 2017) Cancer genomics re sea rch in the clo ud: a taxonomy of
gen ome d ata sets. Paper pr ese nte d a t the 4th intern atio nal wor kshop on gen ome p riva cy and
security, Orland o, FL, 15 O ct 2017
Tiwa na A, Kon synski B, Bush A A ( 2010) Research commentary—platform evo lutio n: coevolution
of platfor m architectu re, go ver nance, an d e nvir onmental dyn amics. Inf S yst Res 2 1(4):675–687
Top Th reats Working Gro up (2016) The treacherou s 12. Clou d computing top th reats in 2016 .
https://d own loads.cloud securityalliance.org/asse ts/research/top-threats/Trea che rous-
12_ Clou dCo mp utin g_Top-Threats.p df. Accessed 17 Sept 2019
Trenz M, Huntgebur th JC, Veit DJ (20 13) Th e r ole of uncertainty in cloud computing co ntin uance:
anteceden ts, mitigators, and conseque nce s. Paper pre sen ted at th e 2 1st Europ ean co nfe rence on
information systems, Utrecht, 5–8 June 2013
Trenz M, Huntgebur th J, Veit D ( 2018) Uncertainty in clo ud ser vice relationships: un coverin g the
differential effect o f three socia l influen ce pro cesses on po ten tial and curre nt users. Inf Manag
55( 8):971–983
Ven katesh V, Morr is MG, Davis G B, Davis FD (200 3) User acce pta nce of information techno logy:
toward a unified view. MIS Q 27(3) :42 5–478
Ven ter s W, Whitley EA (2 012) A cr itical review of clo ud compu ting : researching de sire s and
rea lities. J In f Tech nol 27(3):179–197
Voo rslu ys W, Bro berg J, Buyya R ( 2011) Introduction to cloud computing. In: Buyya R, Bro berg J,
Go scinski A (eds) Cloud co mp utin g. Wiley, Hoboken, NJ, pp 3–42
Wang B, Li B , Li H (20 14) Or uta: p riva cy-pre ser ving pu blic aud iting for shared data in th e cloud .
IEEE Trans Cloud Comput 2(1 ):4 3–56
Weinha rdt C, Ana ndasiva m A, Blau B, Bor issov N, Meinl T, Michalk W, Stößer J ( 2009) Cloud
computing–a classifica tion , business mode ls, and research directions. Bus Inf Syst Eng 1
(5) :39 1–399
Whitman M, Matto rd H ( 2011) Cloud-based IT govern ance. In: Halpert B (ed) Au ditin g cloud
computing: a security and pr ivacy g uide. Wiley, Hobo ken , NJ, pp 33–55
Windho rst I, Sunyaev A ( 2013) Dyn amic certification of cloud service s. Paper pre sen ted at th e 8 th
interna tion al confere nce on availab ility, re liability and security, Reg ensburg, 2–6 Sept 2013
Yoo Y, Hen frid sson O, Lyytinen K (2010 ) Research comme nta ry—the new o rganizing logic of
digital innovation: an agenda for information syste ms research. Inf Syst Res 21(4):724 –735
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
106 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog and Edge Computing References 1/3
Aazam M, Zeadally S, Harras KA (20 18) Fo g computing architectu re, evalua tion , and future Feng J, Liu Z, Wu C, Ji Y (2017 ) A VE: au ton omous vehicular edg e computing framework with
resear ch dire ctions. IEEE Commun Mag 56(5 ):4 6 – 52 ACO-based sch eduling. IE EE Tra ns Veh Technol 66( 12):10660 – 106 75
Alra wais A, Alho tha ily A, Hu C, Cheng X (201 7) Fog computing for the intern et of thin gs: se cur ity Fernan do N, Loke S W, Rahayu W (2019) Computing with nea rby mobile de vices: a work sharin g
and pr ivacy issues. IEEE Inte rnet Comput 21( 2):34 – 42 algo rith m for mobile edge-clouds. IEEE Trans Clou d Comput 7(2 ):3 29 – 343
Ber mb ach D, Palla s F, Pére z DG, Pleb ani P, Anderson M, Ka t R, Tai S (2 017) A research Ga rcia Lo pez P, Montresor A, Epe ma D, Datta A, Higashino T, Iamnitchi A, Bar cello s M, Felber
per spe ctive o n fog computing. P aper presented at the intern atio nal con fer ence o n service- P,Rivier e E (201 5) Edge-centric computing: vision and challeng es. ACM SIGCOMM
orie nte d computing, Malaga, 13 – 16 Nov 20 17 ComputCo mmun Rev 45 (5):37 – 42
Bittencourt LF, Lo pes MM, Pe tri I, Rana OF (2015) Towards virtual machine migration in Gr and View Research Inc. (2019 ) E dge co mp utin g mar ket size worth $ 28.84 billion by 20 25
fogcomputing. P aper presented at the 10 th interna tion al confere nce on P2 P, par allel, gr id, cloud |CAG R 54% . https://www.gra ndviewr ese arch.com/press-rele ase /glo bal-edg e-computing-market.
and intern et computing (3PG CIC), Kra kow, 4 – 6 Nov 201 5 Accessed 12 June 2019
Bon omi F, Milito R, Zhu J, Add epalli S (201 2) Fog computing and its role in the internet of things. Gu an Y, Sha o J, Wei G, Xie M (2018) Data security a nd privacy in fog computing. IEE E
Pap er presented at the fi rst edition of the MCC worksh op on mo bile clou d computing, Netw32 (5):106 – 111
Helsinki,17 Aug 20 12
Hao Z, No vak E, Yi S, Li Q ( 2017) Challeng es and software ar chitecture fo r fog computing. IEEE
Bro gi A, For ti S (2017 ) Q oS-aware dep loymen t of IoT applications throu gh the fog. IEE E Interne t Internet Comput 21( 2):44 – 53
Things J 4(5) :11 85 – 119 2
Hu P, Dhelim S, Ning H, Qiu T ( 2017) Sur vey on fo g computing: architecture , key technologie s,
Byers CC (2017) Ar chitectural imperatives for fo g computing: use cases, req uirements, and app lications and open issues. J Netw Comput App l 98:27 – 42
architectu ral techniq ues for fog-ena bled Io T networks. IEE E Commun Mag 55(8 ):1 4 – 20
Iorga M, Feldman L, Barton R, Martin MJ, G oren N, Mahmoud i C ( 2017) Fog co mp utin g
Chang C, Srir ama SN, Buyya R ( 2017) Indie fog: an ef fi cient fog-computing infrastru cture for conceptual model (NIST SP 800-191 ).
the internet of things. Computer 50(9 ):9 2 – 98 https://n vlpu bs.nist.go v/nistp ubs/Sp ecia lPublications/NIST.SP.500 -325 .pd f. Accessed 17 Sept
201 9
Chiang M, Zhang T (2016) Fog and IoT: an overview of research oppor tun ities. IEEE Internet
Things J 3(6) :85 4 – 864 Iorga M, Feldman L, Barton R, Martin MJ, G oren N, Mahmoud i C ( 2018) Fog
computingconceptual model (NIST SP 500-325 ).
Chin WS, Kim H-s, Heo YJ, Jang JW (2 015) A co nte xt-based future netwo rk infrastructur e for https://n vlpu bs.nist.go v/nistp ubs/Sp ecia lPublications/NIST.SP.500 -325 .pd f. Accessed 17 Sept
IoT services. Procedia Comput Sci 56:266 – 270 201 9
da Silva RA , da Fonseca NL (2018 ) Resource allocation mech anism for a fog-cloud Jalali F, Hinton K, Ayre R, Alpcan T, Tucker RS (2016 ) Fog computing may help to sa ve ene rgy
infrastructur e.P aper pre sen ted at th e IEEE intern atio nal con fer ence o n communications ( ICC), in cloud co mp utin g. IEEE J Sel Are as Commun 34( 5):1728 – 173 9
Kan sas City, MO, 20 – 24 May 2 018
Jiang Y, Huan g Z, Tsang DHK (20 18) Ch allenges and solutions in fog co mp utin g o rch estration.
Deteco n International GmbH (2019 ) E dge co mp utin g ermög licht inno vative Anwend ungsfä lle. IEEE Netw 32( 3):122 – 129
https://www.detecon.com/de /wissen /ed ge-computing-ermoe glich t-inno vative-anwend ungsfa elle.
Accessed 12 Sep t 2019 Kai K, Con g W, Tao L (20 16) Fo g computing for ve hicu lar ad-hoc netwo rks: p aradigms,
sce narios, an d issues. J China Univ Posts Telecommun 23( 2):56 – 96
Fakeeh KA (2016 ) P riva cy and se cur ity problems in fog computing. Commun App l Electron 4
(6) :19 293 – 193 04 Kha n S , Parkinson S, Q in Y ( 2017) Fog co mp utin g security: a review of cu rrent applications
and security solutions. J Cloud Comput 6(1 ):1 9
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
107 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog and Edge Computing References 2/3
Lu R, Lian g X , Li X, Lin X, Shen X (201 2) EPPA: an ef fi cient and pr ivacy-pre ser ving Nish io T, Shin kuma R, Takahashi T, Manda yam NB (2013) Se rvice-orie nte d h ete rogene ous
agg regation sche me for secu re smart grid commu nica tion s. IEE E Tran s Para llel Distrib Syst resour ce sharing for optimizin g service late ncy in mo bile clou d. Pap er presented at the 1 st
23( 9):1621 – 163 1 interna tion al workshop on mobile cloud co mp utin g a nd networ king , Bang alore, 29 July 2013
Lua n TH, Ga o L , Li Z, Xiang Y, We i G , Sun L (201 5) Fog computing: focusing on mobile users a t Okafor K, On oniwu G, Go undar S, Chijindu V, Chidiebe le U ( 2018) Towards complex
the edge. arX iv pre print. arX iv:1502 01815:1 – 11 dynamicfo g network o rch estration using embedd ed neural switch. Int J Comput App l 40:1 – 18
Madakam S, Bhagat P (2018) Fog computing in the IoT en viro nment: principles, feature s, and Op enFog Consortium ( 2017a) Op enFog refere nce ar chitecture fo r fog computing.
models. In: Ma hmood Z (ed ) Fog computing: concepts, frameworks and technolog ies. Spring er, https://iiconsortium.org/pdf/OpenFog_ Refere nce _Architecture _2_09_ 17.pdf. Acce ssed 17 Sept
Cham, pp 23 – 43 201 9
Madsen H, Bur tschy B, Albe anu G, Pop entiu-Vlad icescu F ( 2013) Reliability in the utility Op enFog Consortium ( 2017b) Size and impact of fo g computing market.
computing era: toward s reliab le fog computing. P aper presented at the 20 th interna tion al https://www.ope nfo gco nso rtiu m.org /wp-content/u ploads/451-Research-rep ort-on-5-year-Market-
conference on systems, sign als and image pr oce ssing (IWSSIP), Bu cha rest, 7 – 9 July 201 3 Sizing-of-Fog-Oct-201 7.p df. Accessed 20 Ja n 2 019
Mahmood Z (2018) Fog computing: concepts, frameworks and technologie s, 1st edn. S pringer , Ou eis J, Strinati EC, Ba rbarossa S ( 2015) The fo g b alancing: lo ad distribu tion for sma ll cell clo ud
Cham computing. P aper presented at the 81 st IEE E vehicular technolog y conference (VTC Spr ing),
Gla sgo w, 11 – 14 May 2 015
Mahmood Z, Ramachandr an M (20 18) Fo g computing: co nce pts, p rinciples an d r elated
par adigms. In: Mahmood Z (ed) Fog compu ting : concepts, fra me wor ks and te chn ologies. Polito SG , Chamania M, Jukan A (200 9) Extend ing the inter-domain PCE framework for authen-
Spr inger, Cha m, pp 3 – 21 tica tion and au tho riza tion in GMPL S n etworks. Pap er presented at the IEEE
interna tion alco nfe rence on communicatio ns, Dr esd en, 14 – 18 June 2009
Mahmud R, Kotagir i R, Buyya R ( 2018) Fog co mp utin g: a taxo nomy, su rve y and future
dire ctions. In: Di Martino B, Li K-C, Yan g L T, Esp osito A (eds) In ter net of everythin g: Pre den JS, Tammemäe K, Jan tsch A , Leie r M, Riid A, Calis E (201 5) The be ne fi ts of self-
algo rith ms,meth odologie s, technolo gies an d p erspectives. Spr inger, Singapo re, pp 10 3 – 130 awaren ess and atte ntio n in fog and mist computing. Computer 48(7 ):3 7 – 45
Martin JP , Kand asa my A, Chand raseka ran K, Joseph CT (201 9) Elucidating the challen ges for San aei Z, Abo lfazli S, Ga ni A, Buyya R ( 2014) Heterogen eity in mo bile clou d computing:
the praxis of fo g computing: an aspect-based stu dy. In t J Commun Syst 32( 7):e3926 taxonomy an d o pen ch allenges. IEEE Commun Sur v Tutorials 1 6(1):369 – 392
Modi C, Patel D, Bor isan iya B, Patel H, P ate l A, Rajaraja n M (2013) A survey of intrusion Sar kar S, Misra S (201 6) The oretica l mode lling of fog co mp utin g: a gree n computing par adigm
detection techniq ues in cloud. J Netw Comput App l 36( 1):42 – 57 to sup port IoT applications. Iet Netw 5(2 ):2 3 – 29
Moura dian C, Naboulsi D, Yan gui S, Glitho RH, Morrow MJ, Pola kos PA (20 18) A Shi W, Cao J, Zhang Q, Li Y , Xu L (2016 ) E dge co mp utin g: visio n a nd cha llenges. IEEE Internet
comprehe nsive survey on fog co mp utin g: sta te-of-the-art and research challenge s. IEE E Things J 3(5) :63 7 – 646
Commun Sur v Tutorials 2 0(1):416 – 464
Shr opshire J ( 2014) Extending the clo ud with fo g: security challenge s & oppor tun ities. P aper
Mukherjee M, Matam R, Shu L, Maglar as L, Ferrag MA, Chou dhury N, Kumar V (2017) Se cur ity pre sen ted at th e 2 0th Amer icas co nfe rence on info rmatio n systems, Savann ah, G A, 7 – 10 Aug
and pr ivacy in fog computing: challen ges. IEEE Access 5 :19 293 – 193 04 201 4
Negash B, Rahmani AM, Liljeb erg P, Jan tsch A (2 018) Fog compu ting funda me nta ls in th e Stojmenovic I, Wen S (2014 ) The fog co mp utin g p aradigm: scenar ios and security issu es. Paper
interne t-of-things. In: Rahmani AM, Liljeb erg P, Pre den J-S, Jan tsch A (e ds) Fog computing in pre sen ted at th e fede rated con fer ence o n computer scie nce an d in for ma tion systems, Warsaw,
the internet of things: intellige nce at th e e dge. S pringer , Cham, pp 3 – 13 7 – 10 Sep t 2014
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
108 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)
Fog and Edge Computing References 3/3
Tammemäe K, Jan tsch A , Kuu sik A, Pre den J-S, Õu napuu E (201 8) Self-aware fog co mp utin g in
private and secu re sph eres. In: Rahmani AM, Liljeb erg P, Pre den J-S, Jan tsch A (e ds) Fog
computing in the intern et of thin gs: intelligence at the edge . Sprin ger, Cham, pp 71 – 99
Taneja M, Davy A (201 7) Resour ce aware placement of IoT a pplicatio n mod ules in fog-cloud
computing parad igm. Pape r p resented at the IFIP/IEE E symposium on integr ate d n etwork and
service mana gement ( IM), Lisb on, 8 – 12 May 2 017
Torder a EM, Masip-Bru in X , Gar cía-Almiñan a J, Jukan A, Ren G-J, Zhu J, Farre J ( 2016) What
is a fog node a tutorial on cu rrent con cep ts toward s a co mmon de fi nition. arX iv pre print.
arX iv:1611 09193:1 – 22
Vaq uero LM, Rodero-Merino L (20 14) Fin ding yo ur way in the fog: toward s a co mp rehensive de
fi nition of fog computing. SIG CO MM Comput Commun Rev 44 (5):27 – 32
Var ghese B, Wang N, Bar bhuiya S, Kilpatrick P, Nikolopou los DS (2016) Challen ges an d
opp ortunities in edge computing. Paper pre sen ted at th e IEEE intern atio nal con fer ence o n smart
cloud (SmartCloud), New York, NY, 1 8 – 20 Nov 20 16
Vatanp arvar K, Al Faruqu e MA (2018 ) Control-as-a-service in cyb er-physica l en ergy systems
over fog compu ting . In: Rahmani AM, Liljeb erg P, Pre den J-S, Jan tsch A (e ds) Fog computing in
the internet of things: intellige nce at th e e dge. S pringer , Cham, pp 123 – 144
Wang Y, Ueh ara T, Sasaki R (2015) Fog computing: issues an d challe nges in security and
forensics.Pap er pre sen ted at th e 3 9th IEEE ann ual compu ter software an d a pplicatio ns
conference, Taichun g, 1 – 5 July 201 5
Ye D, Wu M, Tang S, Yu R (2016) Scalab le fog computing with service of fl oad ing in bus
networks. Paper pr ese nte d a t the 3rd IE EE inte rnational conference on cyber security and cloud
computing (CSCloud), Bejin g, 2 5 – 27 June 2016
Yi S, Q in Z, Li Q ( 2015) Security a nd privacy issues of fog computing: a survey. Pape r p resented
at the intern atio nal con fer ence o n wirele ss algorithms, systems, and applications, Qu fu, 1 0 – 12
Aug 20 15
Prof. Dr. Ali Sunyaev — AI: Internet Computing Applied Informatics and Formal Description Methods (AIFB)
109 3 July 2025
Prof. Dr. Sebastian Lins Critical Information Infrastructures (cii)