Demystifying Dew Computing: Concept, Architecture and Research Opportunities

© 2022 by IJCTT Journal
Volume-70 Issue-5
Year of Publication : 2022
Authors : Dada Olabisi, Sadiq Kolawole Abubakar, Abdulrahman Tosho Abdullahi
DOI :  10.14445/22312803/IJCTT-V70I5P105

How to Cite?

Dada Olabisi, Sadiq Kolawole Abubakar, Abdulrahman Tosho Abdullahi, "Demystifying Dew Computing: Concept, Architecture and Research Opportunities," International Journal of Computer Trends and Technology, vol. 70, no. 5, pp. 39-43, 2022. Crossref,

Over the last decades, the IT world has witnessed paradigm shifts from conventional client/server networks to Cloud computing, providing organizations opportunities to reduce capital expenditures (CapEx) and Operational Expenditures (OpEx). Other technologies such as Fog computing, Edge computing addresses some of Cloud computing challenges such as high latency, real-time process, security, and location awareness. Unfortunately, all technologies mentioned above are prone to service outages and interruption due to their dependency on the Internet. Dew computing filled the gaps by providing users with offline usage capabilities. During outages or service interruptions, Dew computing makes data accessibilities archivable through two distinct features interdependency and collaboration. Copies of original data saved on the local machine are available to serve offline requests, and all modifications synchronize with the Cloud server when the communication signal is restored. This paper explains the Dew computing concepts, architectural design, and open research opportunities.

Cloud Computing, Dew Computing, Edge Computing, Fog Computing, Server.


[1] K. A. Sadiq, A. F. Thompson, and O. A. Ayeni, Mitigating DDoS Attacks in Cloud Network using Fog and SDN?: A Conceptual Security Framework, Int. J. Appl. Inf. Syst., 13(32) (2020) 11–16.
[2] A. F. Thompson and K. A. Sadiq, An Improved IoHT Service Delivery using Fog Network.
[3] M. Satyanarayanan, The emergence of edge computing, Computer (Long. Beach. Calif)., 50(1) (2017) 30–39. doi: 10.1109/MC.2017.9.
[4] D. E. Fisher and S. Yang, Doing More with the Dew: A New Approach to Cloud-Dew Architecture, Open J. Cloud Comput., 3(1) (2016) .
[5] P. Utomo and Falahah, Dew computing: Concept and its implementation strategy, 2020 5th Int. Conf. Informatics Comput. ICIC (2020). doi: 10.1109/ICIC50835.2020.9288581.
[6] P. P. Ray, An Introduction to Dew Computing: Definition, Concept and Implications, IEEE Access, 6 (2017) 723–737. doi: 10.1109/ACCESS.2017.2775042.
[7] E. M. Dogo, A. F. Salami, C. O. Aigbavboa, and T. Nkonyana, Taking cloud computing to the extreme edge: A review of mist computing for smart cities and industry 4.0 in africa, EAI/Springer Innov. Commun. Comput., (2019) 107–132. doi: 10.1007/978-3-319-99061-3_7.
[8] K. A. Sadiq, F. S. Oyedepo, and J. K. Ayeni, A Lightweight Economic Denial of Sustainability ( EDOS ) DEFENCE, Eur. J. Comput. Sci. Inf. Technol., 8(3) (2020) 57–64.
[9] P. Kresimir and H. Zeljko, Cloud computing security issues and challenges Tetracom View project BusinessLogicIntegrationPlatform View project Kresimir Popovic Siemens 4 PUBLICATIONS 143 CITATIONS Cloud computing security issues and challenges, Ieeexplore.Ieee.Org, (2010). [Online]. Available:
[10] M. Ozcelik, N. Chalabianloo, and G. Gur, Software-Defined Edge Defense Against IoT-Based DDoS, in IEEE CIT 2017 - 17th IEEE International Conference on Computer and Information Technology, (2017) 308–313.doi: 10.1109/CIT.2017.61.
[11] E. C. Consortium and I. Internet, Edge Computing Reference, Alliance Ind. internet, (2017) 60 . [Online]. Available:
[12] Y. Wang, Definition and Categorization of Dew Computing, Open J. Cloud Comput., 3(1) (2016) 1–7. doi: 10.19210/1002.3.1.1.
[13] L. Zhou, H. Guo, and G. Deng, A fog computing based approach to DDoS mitigation in IIoT systems, Comput. Secur., 85 (2019) 51–62. doi: 10.1016/j.cose.2019.04.017.
[14] P. Zhang, M. Zhou, and G. Fortino, Security and trust issues in Fog computing?: A survey Security and trust issues in Fog computing?: a survey, Futur. Gener. Comput. Syst., (2018). doi: 10.1016/j.future.2018.05.008.
[15] M. Darwish, A. Ouda, and L. F. Capretz, Cloud-based DDoS Attacks and Defenses, (2011).
[16] S. Alharbi, P. Rodriguez, R. Maharaja, P. Iyer, N. Bose, and Z. Ye, FOCUS?: A Fog Computing-based Security System for the Internet of Things, (2018).
[17] M. Losavio and M. Losavio, ScienceDirect Fog Computing , Edge Computing and a return to privacy and personal autonomy Fog Computing , Edge Computing and a return to privacy and personal autonomy, Procedia Comput. Sci., 171 (2020) 1750–1759. doi: 10.1016/j.procs.2020.04.188.
[18] R. Maharaja, P. Iyer, and Z. Ye, A hybrid fog-cloud approach for securing the Internet of Things, Cluster Comput., (2019) 0123456789. doi: 10.1007/s10586-019-02935-z.
[19] R. Rapuzzi and M. Repetto, Building Situational Awareness for Network Threats in Fog / Edge Computing?: Emerging Paradigms Beyond the Security Perimeter Model, Futur. Gener. Comput. Syst., (2018) doi: 10.1016/j.future.2018.04.007.
[20] B. Paharia, Fog Computing as a defensive approach against Distributed Denial of Service ( DDoS ): a proposed architecture, 2018 9th Int. Conf. Comput. Commun. Netw. Technol., (2018) 1–7.
[21] B. Varghese and R. Buyya, Next generation cloud computing?: New trends and research directions, Futur. Gener. Comput. Syst., 79 (2018) 849–861. doi: 10.1016/j.future.2017.09.020.
[22] A. S. Sohal, R. Sandhu, S. K. Sood, and V. Chang, A Cybersecurity Framework to Identify Malicious Edge Device in Fog Computing and Cloud-ofThings Environments, Comput. Secur., (2017), doi: 10.1016/j.cose.2017.08.016.
[23] D. Fisher, S. Gloutnikov, Y. Xi, and S. Khan, Viability of Dew Computing for Multilayered Networks Keywords?:
[24] K. Skala, Cloud , Fog and Dew Computing?: A Distributed Hierarchy Grid Computing ( GC ) Cloud Computing ( CC ).
[25] DOS Attacks in Cloud Computing Environments are Growing On-Demand Self-Service Leading to BOTNETS Outbreak Broad Network Access and Rapid Elasticity Leading to More Immense, Flexible, and Sophisticated DDOS Attacks.