Modeling a Fog Computing Network Architecture for Secure IoT Data Processing

Authors

DOI:

https://doi.org/10.31861/sisiot2025.2.02017

Keywords:

fog computing, IoT, security, network, architecture

Abstract

This article presents a fog computing network architecture designed for secure processing of Internet of Things data. The proposed architecture consists of four layers: the cloud layer – a central server for analytics and long-term data storage; the proxy layer – responsible for caching, routing, and load balancing; four fog nodes that provide real-time data processing; and the device layer – representing Internet of Things endpoints. This structure enables flexible load distribution and enhances the system’s resilience to component failures. To verify the effectiveness of the developed architecture, simulations were performed in the iFogSim environment. Scenarios were created with different numbers of smart cameras (from 16 to 48). The modelling results showed that, with 16 cameras, the data processing latency of the proposed architecture was 286 ms, while in the traditional cloud-based architecture was 811 ms. These results demonstrate an overall 64.7% reduction in data processing latency in the developed architecture. The fog computing network architecture also achieved a 17-fold reduction in network resource utilization under minimum load (16 cameras) and a 4.3-fold reduction under maximum load (48 cameras). This translates to up to 90% savings in bandwidth and a significant decrease in the risk of network congestion. The proposed architecture ensures a high level of protection of users’ personal data through the local processing of video streams. Sensitive information is processed on fog nodes without being transmitted to external networks, which minimizes the risk of personal data leakage. The modeled fog computing network architecture provides a solid foundation for further development of fog computing technologies in the Internet of Things domain.

Downloads

Download data is not yet available.

Author Biographies

  • Yaroslav Malyuta, Ternopil Ivan Puluj National Technical University

    In 2025, I graduated with a bachelor's degree in Cybersecurity. Currently, I am studying for a master's degree in Cybersecurity and Information Protection at Ivan Pulyuy Ternopil National Technical University. Field of scientific interests: Internet of Things, Safety and Reliability.

  • Maryna Derkach, Ternopil Ivan Puluj National Technical University

    In 2019, I defended my dissertation for the degree of Candidate of Technical Sciences in Information Technologies. Currently, I work as an Associate Professor at the Department of Cybersecurity at Ivan Pulyuy Ternopil National Technical University. Field of scientific interests: IoT, Intelligent Robotic Systems, Biomedical Engineering, Safety and Reliability.

  • Taras Lobur, Ternopil Ivan Puluj National Technical University

    In 2013, I graduated from Kharkiv National University of Radio Electronics with a degree in Information and Communication Systems Security (specialist diploma). Currently, I work as a senior lecturer at the Department of Cybersecurity at Ivan Pulyuy Ternopil National Technical University. Field of scientific interests: Computer Networks, Safety and Reliability, IoT.

References

V. Kharchenko, A. L. Kor, and A. Rucinski, Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. Boca Raton, FL, USA: CRC Press, 2022.

M. Derkach, D. Matiuk, I. Skarga-Bandurova, T. Biloborodova, and N. Zagorodna, “A robust brain-computer interface for reliable cognitive state classification and device control,” in Proc. 14th Int. Conf. Dependable Systems, Services and Technologies (DESSERT), Oct. 2024, pp. 1–9.

A. Palamar, M. Palamar, and H. Osukhivska, “Real-time health monitoring computer system based on Internet of Medical Things,” in Proc. ITTAP, Nov. 2023, pp. 106–115.

I. S. Skarga-Bandurova and M. V. Derkach, “Investigation of the efficiency of using Kalman filter to predict the arrival time of local transport,” Herald of KHNTU, no. 4, p. 63, 2017.

S. Kumar, P. Tiwari, and M. Zymbler, “Internet of Things is a revolutionary approach for future technology enhancement: A review,” Journal of Big Data, vol. 6, art. no. 111, 2019.

A. Palamar, M. P. Karpinski, M. Palamar, H. Osukhivska, and M. Mytnyk, “Remote air pollution monitoring system based on Internet of Things,” in Proc. ITTAP, Nov. 2022, pp. 194–204.

R. M. Babakov et al., Internet of Things for Industry and Human Application, vol. 3. 2019, pp. 1–917.

T. Wang, G. Zhang, A. Liu, M. Bhuiyan, and Q. Jin, “A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4831–4843, 2019.

A. Stanko, W. Wieczorek, A. Mykytyshyn, O. Holotenko, and T. Lechachenko, “Realtime air quality management: Integrating IoT and fog computing for effective urban monitoring,” in Proc. CITI, 2nd ed., 2024.

M. Muneeb, K.-M. Ko, and Y.-H. Park, “A fog computing architecture with multi-layer for computing-intensive IoT applications,” Applied Sciences, vol. 11, no. 24, art. no. 11585, 2021.

O. Mishko, D. Matiuk, and M. Derkach, “Security of remote IoT system management by integrating firewall configuration into tunneled traffic,” Scientific Journal of TNTU (Ternopil), vol. 115, no. 3, pp. 122–129, 2024.

M. Waqdan, H. Louafi, and M. Mouhoub, “Security risk assessment in IoT environments: A taxonomy and survey,” Computers & Security, vol. 154, Jul. 2025.

Downloads


Abstract views: 180

Published

2025-12-30

Issue

Section

Articles

How to Cite

[1]
Y. Malyuta, M. Derkach, and T. Lobur, “Modeling a Fog Computing Network Architecture for Secure IoT Data Processing”, SISIOT, vol. 3, no. 2, p. 02017, Dec. 2025, doi: 10.31861/sisiot2025.2.02017.

Similar Articles

1-10 of 57

You may also start an advanced similarity search for this article.