Modeling a Fog Computing Network Architecture for Secure IoT Data Processing
DOI:
https://doi.org/10.31861/sisiot2025.2.02017Keywords:
fog computing, IoT, security, network, architectureAbstract
This article presents a fog computing network architecture designed for secure processing of Internet of Things data. The proposed architecture consists of four layers: the cloud layer – a central server for analytics and long-term data storage; the proxy layer – responsible for caching, routing, and load balancing; four fog nodes that provide real-time data processing; and the device layer – representing Internet of Things endpoints. This structure enables flexible load distribution and enhances the system’s resilience to component failures. To verify the effectiveness of the developed architecture, simulations were performed in the iFogSim environment. Scenarios were created with different numbers of smart cameras (from 16 to 48). The modelling results showed that, with 16 cameras, the data processing latency of the proposed architecture was 286 ms, while in the traditional cloud-based architecture was 811 ms. These results demonstrate an overall 64.7% reduction in data processing latency in the developed architecture. The fog computing network architecture also achieved a 17-fold reduction in network resource utilization under minimum load (16 cameras) and a 4.3-fold reduction under maximum load (48 cameras). This translates to up to 90% savings in bandwidth and a significant decrease in the risk of network congestion. The proposed architecture ensures a high level of protection of users’ personal data through the local processing of video streams. Sensitive information is processed on fog nodes without being transmitted to external networks, which minimizes the risk of personal data leakage. The modeled fog computing network architecture provides a solid foundation for further development of fog computing technologies in the Internet of Things domain.
Downloads
References
V. Kharchenko, A. L. Kor, and A. Rucinski, Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. Boca Raton, FL, USA: CRC Press, 2022.
M. Derkach, D. Matiuk, I. Skarga-Bandurova, T. Biloborodova, and N. Zagorodna, “A robust brain-computer interface for reliable cognitive state classification and device control,” in Proc. 14th Int. Conf. Dependable Systems, Services and Technologies (DESSERT), Oct. 2024, pp. 1–9.
A. Palamar, M. Palamar, and H. Osukhivska, “Real-time health monitoring computer system based on Internet of Medical Things,” in Proc. ITTAP, Nov. 2023, pp. 106–115.
I. S. Skarga-Bandurova and M. V. Derkach, “Investigation of the efficiency of using Kalman filter to predict the arrival time of local transport,” Herald of KHNTU, no. 4, p. 63, 2017.
S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: A review,” Journal of Big Data, vol. 6, art. no. 111, 2019.
A. Palamar, M. P. Karpinski, M. Palamar, H. Osukhivska, and M. Mytnyk, “Remote air pollution monitoring system based on Internet of Things,” in Proc. ITTAP, Nov. 2022, pp. 194–204.
R. M. Babakov et al., Internet of Things for Industry and Human Application, vol. 3. 2019, pp. 1–917.
T. Wang, G. Zhang, A. Liu, M. Bhuiyan, and Q. Jin, “A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4831–4843, 2019.
A. Stanko, W. Wieczorek, A. Mykytyshyn, O. Holotenko, and T. Lechachenko, “Realtime air quality management: Integrating IoT and fog computing for effective urban monitoring,” in Proc. CITI, 2nd ed., 2024.
M. Muneeb, K.-M. Ko, and Y.-H. Park, “A fog computing architecture with multi-layer for computing-intensive IoT applications,” Applied Sciences, vol. 11, no. 24, art. no. 11585, 2021.
O. Mishko, D. Matiuk, and M. Derkach, “Security of remote IoT system management by integrating firewall configuration into tunneled traffic,” Scientific Journal of TNTU (Ternopil), vol. 115, no. 3, pp. 122–129, 2024.
M. Waqdan, H. Louafi, and M. Mouhoub, “Security risk assessment in IoT environments: A taxonomy and survey,” Computers & Security, vol. 154, Jul. 2025.
Published
Issue
Section
License
Copyright (c) 2025 Security of Infocommunication Systems and Internet of Things

This work is licensed under a Creative Commons Attribution 4.0 International License.







