Optimized Resource Management and Security Enhancement in Fog Computing using Advanced Q-Learning Approaches
Received: 17 March 2025 | Revised: 17 April 2025 | Accepted: 22 April 2025 | Online: 4 June 2025
Corresponding author: Kusuma G. S.
Abstract
Fog computing enhances cloud computing functionalities at the network edge, providing diminished latency and improved data processing. Optimizing resource allocation and energy consumption in this dispersed infrastructure is essential for fulfilling the requirement for efficient operations. This research presents a novel energy-efficient resource optimization algorithm designed for data centers in fog computing settings. The suggested methodology utilizes the Enhanced Q-Learning (EQL) and Secure Q-Learning (SQL) algorithms to achieve dynamic resource allocation and ensure operational efficacy. The proposed technique addresses energy consumption issues and guarantees optimal resource utilization by integrating adaptive incentive functions and safe state-action mechanisms, while ensuring robust security. The simulation outcomes with CloudSim exhibit substantial enhancements in energy efficiency, system throughput, and resource optimization relative to conventional approaches.
Keywords:
fog computing, Q-learning, Reinforcement Learning (RL), Enhanced Q-Learning (EQL), Secure Q-Learning (SQL)Downloads
References
G. Khan, K. K. Gola, R. Kanauzia, and S. Kumar, "Secure Architecture to Support IoT based on Fog Computing," Procedia Computer Science, vol. 215, no. C, pp. 608–617, Jan. 2022.
P. Vashisht, S. B. Bajaj, and A. Narang, "Energy-Efficient Fog Computing: A Review and Future Directions," International Journal of Innovative Research in Computer Science and Technology, vol. 12, no. 2, pp. 135–139, Apr. 2024.
N. Ranjan, B. Balkhande, M. Ghuge, B. S. Dakhare, B. R. Singh, and A. Shukla, "Efficient and Secure Blockchain-Based Access Control for Fog-Assisted IoT Cloud in Electronic Medical Records Sharing," Journal of Electrical Systems, vol. 20, no. 1s, pp. 138–151, Mar. 2024.
A. N. Alvi, B. Ali, M. S. Saleh, M. Alkhathami, D. Alsadie, and B. Alghamdi, "Secure Computing for Fog-Enabled Industrial IoT," Sensors, vol. 24, no. 7, Apr. 2024, Art. no. 2098.
P. Kumar, G. P. Gupta, and R. Tripathi, "A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks," Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 10, pp. 9555–9572, Oct. 2021.
S. Sicari, A. Rizzardi, and A. Coen-Porisini, "Insights into security and privacy towards fog computing evolution," Computers & Security, vol. 120, Sep. 2022, Art. no. 102822.
C. Avasalcai, I. Murturi, and S. Dustdar, "Edge and Fog: A Survey, Use Cases, and Future Challenges," in Fog Computing: Theory and Practice, A. Zomaya, A. Abbas, and S. Khan, Eds. Hoboken, NJ, USA: John Wiley & Sons, Ltd, 2020, pp. 43–65.
A. Hazra, P. Rana, M. Adhikari, and T. Amgoth, "Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges," Computer Science Review, vol. 48, May 2023, Art. no. 100549.
T. Kim, S. Yoo, and Y. Kim, "Edge/Fog Computing Technologies for IoT Infrastructure," Sensors, vol. 21, no. 9, May 2021, Art. no. 3001.
K. Massey, N. Moazen, and T. Halabi, "Optimizing the Allocation of Secure Fog Resources based on QoS Requirements," in 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2021 7th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Washington, DC, USA, 2021, pp. 143–148.
V. K. Quy, N. V. Hau, D. V. Anh, and L. A. Ngoc, "Smart healthcare IoT applications based on fog computing: architecture, applications and challenges," Complex & Intelligent Systems, vol. 8, no. 5, pp. 3805–3815, Oct. 2022.
C. Awasthi, M. Nawal, and P. K. Mishra, "Security Concerns of Fog Computing in Field of Healthcare using Blockchain: A Review," in 2021 International Conference on Communication information and Computing Technology, Mumbai, India, 2021, pp. 1–5.
W. Wu, "Application and Effectiveness of IoT Edge and Fog Computing Technologies in Smart Energy Development with the Use of Encryption Algorithms and Security Systems," Computing and Informatics, vol. 43, no. 5, pp. 1029–1052, Oct. 2024.
A. M. Ghalwah and G. A. Al-Sultany, "Leveraging Community-based Approaches for Enhancing Resource Allocation in Fog Computing Environment," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 20372–20378, Feb. 2025.
M. Burhan et al., "A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions," IEEE Access, vol. 11, pp. 73303–73329, 2023.
Downloads
How to Cite
License
Copyright (c) 2025 Kusuma G. S., Manju Devi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.