{"id":"https://openalex.org/W7119043245","doi":"https://doi.org/10.48550/arxiv.2601.01125","title":"Performance and Security Aware Distributed Service Placement in Fog Computing","display_name":"Performance and Security Aware Distributed Service Placement in Fog Computing","publication_year":2026,"publication_date":"2026-01-03","ids":{"openalex":"https://openalex.org/W7119043245","doi":"https://doi.org/10.48550/arxiv.2601.01125"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.01125","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01125","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.01125","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045308844","display_name":"Maziar Goudarzi","orcid":"https://orcid.org/0000-0002-1272-4589"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Goudarzi, Mohammad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070360947","display_name":"Arash Shaghaghi","orcid":"https://orcid.org/0000-0001-6630-9519"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shaghaghi, Arash","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357180","display_name":"Zhiyu Wang","orcid":"https://orcid.org/0000-0002-0041-2924"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Zhiyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122213841","display_name":"Rajkumar Buyya","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Buyya, Rajkumar","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045308844"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.949999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.949999988079071,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.012000000104308128,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.006200000178068876,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5428000092506409},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5060999989509583},{"id":"https://openalex.org/keywords/security-domain","display_name":"Security domain","score":0.4726000130176544},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4607999920845032},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.4237000048160553},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.38839998841285706},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3862000107765198},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.382099986076355},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.3492000102996826},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.3409999907016754}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7613999843597412},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5428000092506409},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5221999883651733},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5060999989509583},{"id":"https://openalex.org/C2780264999","wikidata":"https://www.wikidata.org/wiki/Q7445032","display_name":"Security domain","level":2,"score":0.4726000130176544},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4607999920845032},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.4237000048160553},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.38839998841285706},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3862000107765198},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.382099986076355},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3702000081539154},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.3492000102996826},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.33820000290870667},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3296999931335449},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.32829999923706055},{"id":"https://openalex.org/C2986652147","wikidata":"https://www.wikidata.org/wiki/Q21809931","display_name":"Fog computing","level":3,"score":0.3278000056743622},{"id":"https://openalex.org/C2778160497","wikidata":"https://www.wikidata.org/wiki/Q869830","display_name":"Service-level agreement","level":3,"score":0.32269999384880066},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C19012869","wikidata":"https://www.wikidata.org/wiki/Q578372","display_name":"Response time","level":2,"score":0.3125},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.28130000829696655},{"id":"https://openalex.org/C2778915421","wikidata":"https://www.wikidata.org/wiki/Q3643177","display_name":"Performance improvement","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27239999175071716},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.2628999948501587},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.2596000134944916},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.2538999915122986},{"id":"https://openalex.org/C181889124","wikidata":"https://www.wikidata.org/wiki/Q380204","display_name":"Service level","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.01125","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01125","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.01125","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.01125","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,75,100],"rapid":[1],"proliferation":[2],"of":[3,46,65,97],"IoT":[4,187],"applications":[5],"has":[6],"intensified":[7],"the":[8,43,94,117,180],"demand":[9],"for":[10,62],"efficient":[11],"and":[12,24,54,69,121,149,174,198,212],"secure":[13],"service":[14,30,66,195],"placement":[15,31,199],"in":[16,72,209],"Fog":[17,73,98],"computing.":[18,74],"However,":[19],"heterogeneous":[20],"resources,":[21],"dynamic":[22],"workloads,":[23],"diverse":[25],"security":[26,44,70,90,95,101,119,200],"requirements":[27],"make":[28],"optimal":[29],"highly":[32],"challenging.":[33],"Most":[34],"solutions":[35,130,224],"focus":[36],"primarily":[37],"on":[38,185],"performance":[39,134,235],"metrics":[40],"while":[41,87,229],"overlooking":[42],"implications":[45],"deployment":[47],"decisions.":[48],"This":[49],"paper":[50],"proposes":[51],"a":[52,80,89,104,138,150,206,213],"Security":[53],"Performance-Aware":[55],"Distributed":[56],"Deep":[57],"Reinforcement":[58],"Learning":[59],"(SPA-DDRL)":[60],"framework":[61],"joint":[63],"optimization":[64,83,156],"response":[67,196,210],"time":[68,197,211],"compliance":[71],"problem":[76],"is":[77],"formulated":[78],"as":[79],"weighted":[81],"multi-objective":[82],"task,":[84],"minimizing":[85],"latency":[86],"maximizing":[88],"score":[91,102],"derived":[92],"from":[93],"capabilities":[96],"nodes.":[99],"features":[103],"new":[105],"three-tier":[106],"hierarchy,":[107],"where":[108,142],"configuration-level":[109],"checks":[110],"verify":[111],"proper":[112],"settings,":[113],"capability-level":[114],"assessments":[115],"evaluate":[116],"resource":[118],"features,":[120],"control-level":[122],"evaluations":[123],"enforce":[124],"stringent":[125],"policies,":[126],"thereby":[127],"ensuring":[128],"compliant":[129],"that":[131,190],"align":[132],"with":[133],"objectives.":[135],"SPA-DDRL":[136,191],"adopts":[137],"distributed":[139],"broker-learner":[140],"architecture":[141],"multiple":[143],"brokers":[144],"perform":[145],"autonomous":[146],"service-placement":[147],"decisions":[148],"centralized":[151],"learner":[152],"coordinates":[153],"global":[154],"policy":[155],"through":[157],"shared":[158],"prioritized":[159],"experiences.":[160],"It":[161,218],"integrates":[162],"three":[163],"key":[164],"improvements,":[165],"including":[166],"Long":[167],"Short-Term":[168],"Memory":[169],"networks,":[170],"Prioritized":[171],"Experience":[172],"Replay,":[173],"off-policy":[175],"correction":[176],"mechanisms":[177],"to":[178,202],"improve":[179],"agent's":[181],"performance.":[182],"Experiments":[183],"based":[184],"real":[186],"workloads":[188],"show":[189,234],"significantly":[192],"improves":[193],"both":[194],"compared":[201],"current":[203],"approaches,":[204],"achieving":[205],"16.3%":[207],"improvement":[208],"33%":[214],"faster":[215],"convergence":[216],"rate.":[217],"also":[219],"maintains":[220],"consistent,":[221],"feasible,":[222],"security-compliant":[223],"across":[225],"all":[226],"system":[227],"scales,":[228],"baseline":[230],"techniques":[231],"fail":[232],"or":[233],"degradation.":[236]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
