Survey of Load Balancing Strategies in Fog-Cloud Architectures for IoT Integration
Main Article Content
Abstract
The Internet of Things (IoT) innovations have experienced high growth and, therefore, generate a lot of real-time data, which requires processing frameworks with a considerable efficiency and scalability low latency system. Traditional cloud computing has many benefits, but it might not be able to meet the bandwidth and latency requirements of time-dependent Internet of Things devices. To solve these shortcomings, fog computing has come to redefine a related computing paradigm, which pushes computation and storage resources to network endpoints. Fog-cloud architecture, which combines fog with cloud, offers a hybrid capability that improves system scalability, responsiveness, and resource efficiency. Devices running on heterogeneous platforms gain greatly from IoT interaction with the cloud. Applications based on the Internet of Things produce vast amounts of data from various sensors. Decisions are made by analyzing this data. Nevertheless, use cases of IoT environments are dynamic and heterogeneous posing challenging issues in the distribution of work load in such a layered infrastructure. The provided study includes a thorough analysis of fog-cloud system load balancing solutions, including their categorization, performance metrics, and applicability. It also discusses many vital issues, including latency constraints, resource heterogeneity, energy efficiency, and provides future research meets the objectives of intelligent, adaptive, and context-sensitive load balancing in the next-generation IoT systems.
Article Details
Section
How to Cite
References
[1] C. Patel, “A Review of Multi-Channel CRM Strategies Using Big Data and Cloud Integration,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 8, no. 1, pp. 577–588, 2022.
[2] A. Parupalli and H. Kali, “An In-Depth Review of Cost Optimization Tactics in Multi-Cloud Frameworks,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 5, pp. 1043–1052, Jun. 2023, doi: 10.48175/IJARSCT-11937Q.
[3] S. K. Chintagunta and S. Amrale, “Enhancing Cloud Database Security Through Intelligent Threat Detection and Risk Mitigation,” TIJER--Int. Res. J, vol. 9, no. 10, pp. 49–55, 2022.
[4] L. Golightly, V. Chang, Q. A. Xu, X. Gao, and B. S. C. Liu, “Adoption of cloud computing as innovation in the organization,” Int. J. Eng. Bus. Manag., vol. 14, Nov. 2022, doi: 10.1177/18479790221093992.
[5] A. Goyal, “Enhancing Engineering Project Efficiency through Cross-Functional Collaboration and IoT Integration,” Int. J. Res. Anal. Rev., vol. 8, no. 4, pp. 396–402, 2021.
[6] A. R. Toorpu, S. K. Vududala, A. Nerella, and B. P. Madupati, “Hybrid AI Models for Privacy-Preserving Big Data Analytics in Distributed Environments,” in 2025 Global Conference in Emerging Technology (GINOTECH), IEEE, May 2025, pp. 1–8. doi: 10.1109/GINOTECH63460.2025.11076666.
[7] G. Maddali, “An Efficient Bio-Inspired Optimization Framework for Scalable Task Scheduling in Cloud Computing Environments,” Int. J. Curr. Eng. Technol., vol. 15, no. 3, pp. 229–238, 2025.
[8] H. Rashid Abdulqadir et al., “A Study of Moving from Cloud Computing to Fog Computing,” Qubahan Acad. J., vol. 1, no. 2, pp. 60–70, Apr. 2021, doi: 10.48161/qaj.v1n2a49.
[9] S. Singamsetty, “An Intelligent Framework for Secure and Fair Cloud Resource Distribution,” in 2025 7th International Conference on Innovative Data Communication Technologies and Application (ICIDCA), IEEE, Oct. 2025, pp. 686–690. doi: 10.1109/ICIDCA66325.2025.11280502.
[10] A. Saoud and A. Recioui, “Hybrid algorithm for cloud-fog system based load balancing in smart grids,” Bull. Electr. Eng. Informatics, vol. 11, no. 1, pp. 477–487, Feb. 2022, doi: 10.11591/eei.v11i1.3450.
[11] K. Shukla, N. Patel, and H. Mistry, “Securing the Cloud: Strategies and Innovations in Network Security for Modern Computing Environments,” Int. Res. J. Eng. Technol., vol. 11, no. 04, 2024.
[12] S. P. Bheri and G. Modalavalasa, “Advancements in Cloud Computing for Scalable Web Development: Security Challenges and Performance Optimization,” JCT Publ., vol. 13, no. 12, pp. 01–07, 2024.
[13] C. Martín, D. Garrido, L. Llopis, B. Rubio, and M. Díaz, “Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture,” Comput. Stand. Interfaces, vol. 81, p. 103600, Apr. 2022, doi: 10.1016/j.csi.2021.103600.
[14] B. Y. Akhil Reddy Bairi, Venkatesha Prabhu Rambabu, “AI-Enhanced Test Prioritization in Continuous Integration for SaaS Platforms,” Am. J. Auton. Syst. Robot. Eng., vol. 2, pp. 110–145, 2022.
[15] K. M. R. Seetharaman, “Internet of Things (IoT) Applications in SAP: A Survey of Trends, Challenges, and Opportunities,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, pp. 499–508, Mar. 2021, doi: 10.48175/IJARSCT-6268B.
[16] H. F. Atlam, R. J. Walters, and G. B. Wills, “Fog Computing and the Internet of Things: A Review,” Big Data Cogn. Comput., vol. 2, no. 2, p. 10, Apr. 2018, doi: 10.3390/bdcc2020010.
[17] T. Shah, “Cloud-Based Data Warehousing for Marketing Agility: Lessons from FinTech Migrations to Snowflake and AWS,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 4, no. 4, pp. 1–11, 2024.
[18] P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues,” J. Netw. Comput. Appl., vol. 98, pp. 27–42, Nov. 2017, doi: 10.1016/j.jnca.2017.09.002.
[19] A. Gupta, “What Is The Right Security Posture? A Perspective on Cloud Computing Security Threats and Risk Assessment,” Int. J. Emerg. Res. Eng. Technol., vol. 4, no. 4, 2023, doi: 10.63282/3050-922X.IJERET-V4I4P112.
[20] N. R. Barot, “Transparency-Driven Operational Intelligence: A New Data Governance Model for High-Risk Industrial Automation,” J. Inf. Syst. Eng. Manag., vol. 10, no. 63s, pp. 1019–1028, Dec. 2025, doi: 10.52783/jisem.v10i63s.13975.
[21] V. Prajapati, “Role of Identity and Access Management in Zero Trust Architecture for Cloud Security: Challenges and Solutions,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 3, pp. 6–18, Mar. 2025, doi: 10.48175/IJARSCT-23902.
[22] C.-Y. Weng, C.-T. Li, C.-L. Chen, C.-C. Lee, and Y.-Y. Deng, “A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services,” IEEE Access, vol. 9, 2021, doi: 10.1109/ACCESS.2021.3123234.
[23] B. Madupati, M. M. Mohammed, L. Upadhyay, D. P. Guda, K. Kaushik, and M. Soni, “Integrating Artificial Intelligence with Cybersecurity for Resilient Wireless Communication Against Advanced Threats,” in 2025 International Conference on Artificial Intelligence and Machine Vision (AIMV), IEEE, Aug. 2025, pp. 1–5. doi: 10.1109/AIMV66517.2025.11203666.
[24] M. Vijarania, S. Gupta, A. Agrawal, M. O. Adigun, S. A. Ajagbe, and J. B. Awotunde, “Energy Efficient Load-Balancing Mechanism in Integrated IoT–Fog–Cloud Environment,” Electronics, vol. 12, no. 11, p. 2543, Jun. 2023, doi: 10.3390/electronics12112543.
[25] S. Kabade and A. Sharma, “Intelligent Automation in Pension Service Purchases with AI and Cloud Integration for Operational Excellence,” Int. J. Adv. Res. Sci. Commun. Technol., pp. 725–735, Dec. 2024, doi: 10.48175/IJARSCT-14100J.
[26] B. Pourghebleh and V. Hayyolalam, “A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things,” Cluster Comput., vol. 23, no. 2, pp. 641–661, Jun. 2020, doi: 10.1007/s10586-019-02950-0.
[27] S. Bhat, S. R. Sirikonda, V. Katoch, and R. Jain, “Carbon-Kube: A Kubernetes-Native Framework for Multi-Objective Carbon-Aware Scheduling of Big Data Pipelines,” in 2026 9th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), IEEE, Feb. 2026, pp. 1–6. doi: 10.1109/IEMENTech202669403.2026.11434192.
[28] A. Kushwaha, P. Pathak, and S. Gupta, “Review of optimize load balancing algorithms in cloud,” Int. J. Distrib. Cloud Comput., vol. 4, no. 2, pp. 1–9, 2016.
[29] H. Ravilla, J. Yarra, and S. Dilip, “Role of SOQL and Database Optimization in Large-Scale Salesforce Implementations,” Int. J. Eng. Archit., vol. 3, no. 1, pp. 13–31, Feb. 2026, doi: 10.58425/ijea.v3i1.481.
[30] M. A. Shahid, N. Islam, M. M. Alam, M. M. Su’ud, and S. Musa, “A Comprehensive Study of Load Balancing Approaches in the Cloud Computing Environment and a Novel Fault Tolerance Approach,” IEEE Access, vol. 8, pp. 130500–130526, 2020, doi: 10.1109/ACCESS.2020.3009184.
[31] H. S. Chandu, “A Review of IoT-Based Home Security Solutions: Focusing on Arduino Applications,” TIJER – Int. Res. J., vol. 11, no. 10, pp. a391–a396, 2024.
[32] H. B. Dama, “A Survey of MySQL Database Administration Techniques and Best Practices,” ESP J. Eng. Technol. Adv., vol. 6, no. 1, pp. 89–98, 2026.
[33] R. Gao, X. Xie, and Q. Guo, “K-TAHP: A Kubernetes Load Balancing Strategy Base on TOPSIS+AHP,” IEEE Access, vol. 11, 2023, doi: 10.1109/ACCESS.2023.3313643.
[34] S. Garg, “Next-Gen Smart City Operations with AIOps & IoT : A Comprehensive look at Optimizing Urban Infrastructure,” J. Adv. Dev. Res., vol. 12, no. 1, 2021.
[35] H. S. Chandu, “Enhancing Manufacturing Efficiency: Predictive Maintenance Models Utilizing IoT Sensor Data,” IJSART, vol. 10, no. 9, 2024.
[36] S. Garg, “AI/ML Driven Proactive Performance Monitoring, Resource Allocation and Effective Cost Management in SAAS Operations,” Int. J. Core Eng. Manag., vol. 6, no. 6, pp. 263–273, 2019.
[37] J. Thomas, “The Effect and Challenges of the Internet of Things (IoT) on the Management of Supply Chains,” Int. J. Res. Anal. Rev., vol. 8, no. 3, pp. 874–878, 2021.
[38] D. B and A. S. Dhas, “A Systematic Literature Review on Dynamic Load Balancing Techniques in Cloud Computing Environment: Techniques, Challenges, and Future Prospects,” in 2025 International Conference on Machine Learning and Autonomous Systems (ICMLAS), 2025, pp. 1440–1446. doi: 10.1109/ICMLAS64557.2025.10968023.
[39] S. Chowdhury and A. Katangur, “Optimizing Cloud Computing Performance Through Integration of a Threshold-Based Load Balancing Algorithm With Multiple Service Broker Policies,” IEEE Trans. Cloud Comput., vol. 13, no. 2, Apr. 2025, doi: 10.1109/TCC.2025.3563848.
[40] D. Van Anh and V.-H. Nguyen, “Leveraging Priority Queueing in IoT-Edge-Fog-Cloud Infrastructures for Efficient Healthcare Monitoring,” IEEE Access, vol. 13, 2025, doi: 10.1109/ACCESS.2025.3565679.
[41] A. Nayak, S. S. Tripathy, S. Bebortta, and B. Tripathy, “An Intelligent Study Towards Nature-Inspired Load Balancing Framework for Fog-Cloud Environments,” in 2024 IEEE International Conference for Women in Innovation, Technology & Entrepreneurship (ICWITE), IEEE, Feb. 2024. doi: 10.1109/ICWITE59797.2024.10503194.
[42] R. Kumar, N. Agrawal, and S. Tapaswi, “Improved Load Balancing and Partitioning Model for Cloud Networks,” in 2024 OITS International Conference on Information Technology (OCIT), IEEE, Dec. 2024. doi: 10.1109/OCIT65031.2024.00144.
[43] M. Vachhani, Z. Patel, D. Garg, K. Patel, and M. Patel, “Enhancing Cloud Computing Efficiency: Dynamic and Predictive Resource Allocation and Load Balancing Strategies,” in 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS), IEEE, Dec. 2024. doi: 10.1109/ICICNIS64247.2024.10823380.