{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:44:33Z","timestamp":1753868673027,"version":"3.41.2"},"reference-count":22,"publisher":"Wiley","issue":"23","license":[{"start":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:00:00Z","timestamp":1593475200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2021,12,10]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Cloud bursting is a concept originating from the hybrid cloud computing paradigm. During workload spikes, the local resources of the private cloud are supplemented by resources in the public cloud. This technique could also be applied in a fog computing environment, in order to handle workload fluctuations, by offloading applications to the cloud. Toward this direction, in this article, we propose a strategy for the utilization of supplementary cloud resources, in order to assist in the processing of Internet of Things workflow jobs that arrive dynamically in a fog environment. As the cloud involves higher data transfer latency and monetary cost, our approach takes into account these two factors, in addition to the real\u2010time constraints of the workload. The proposed scheduling heuristic is based on the tradeoff between performance and monetary cost. During resource selection, different contribution factors of these two parameters are assessed. Furthermore, the proposed scheduling method is compared against a baseline policy that utilizes only the fog resources. The simulation experiments were carried out under different sizes of workflow input data and for workloads with soft and hard deadlines.<\/jats:p>","DOI":"10.1002\/cpe.5850","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T08:19:42Z","timestamp":1593505182000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Cost\u2010aware cloud bursting in a fog\u2010cloud environment with real\u2010time workflow applications"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7289-9682","authenticated-orcid":false,"given":"Georgios L.","family":"Stavrinides","sequence":"first","affiliation":[{"name":"Department of Informatics Aristotle University of Thessaloniki  Thessaloniki Greece"}]},{"given":"Helen D.","family":"Karatza","sequence":"additional","affiliation":[{"name":"Department of Informatics Aristotle University of Thessaloniki  Thessaloniki Greece"}]}],"member":"311","published-online":{"date-parts":[[2020,6,30]]},"reference":[{"key":"e_1_2_7_2_1","series-title":"Technical Report","volume-title":"Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are","author":"Cisco","year":"2015"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03859-9_8"},{"key":"e_1_2_7_4_1","unstructured":"OpenFogOpenFog Architecture Overview. Technical Report OPFWP001.0216. Needham MA: OpenFog Consortium Architecture Working Group;2016."},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.27"},{"volume-title":"Service\u2010Oriented Computing and System Integration: Software, IoT, Big Data, and AI as Services","year":"2018","author":"Chen Y","key":"e_1_2_7_6_1"},{"key":"e_1_2_7_7_1","first-page":"23","volume-title":"Proceedings of the IEEE 14th International Symposium on Autonomous Decentralized Systems (ISADS'19)","author":"Zhu J","year":"2019"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.019"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2018.11.006"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102015"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602571"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.112"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2019.00009"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500486"},{"key":"e_1_2_7_15_1","first-page":"1","volume-title":"Proceedings of the 18th Asia\u2010Pacific Network Operations and Management Symposium (APNOMS'16)","author":"Pham X.","year":"2016"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838022"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC30.2018.00016"},{"issue":"6","key":"e_1_2_7_18_1","first-page":"1171","article-title":"Optimal workload allocation in fog\u2010cloud computing toward balanced delay and power consumption","volume":"3","author":"Deng R","year":"2016","journal-title":"IEEE Internet Things J"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891130"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717742073"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7051-9"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30121-9_17"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2509"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.5850","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5850","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5850","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T13:14:41Z","timestamp":1693228481000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,30]]},"references-count":22,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2021,12,10]]}},"alternative-id":["10.1002\/cpe.5850"],"URL":"https:\/\/doi.org\/10.1002\/cpe.5850","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2020,6,30]]},"assertion":[{"value":"2020-02-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e5850"}}