Edge versus Cloud: Evaluating Big Data Processing Paradigms for IoT Applications

Authors

  • Shivang Mishra
  • Shikha Tiwari

Keywords:

Big data, Cloud computing, Data governance, DataCloud, Edge computing, Federated learning, Fog computing, Hybrid architecture, IoT, Latency, Real-time processing, TinyML

Abstract

The explosive growth of Internet of Things (IoT) ecosystems across industries, from factory floors and hospital wards to smart farms and urban infrastructure, has fundamentally changed how data processing is perceived. Billions of connected devices now generate continuous streams of sensor data, telemetry, images, and events, creating a need for computing architectures that are fast, scalable, secure, and cost-effective. Two paradigms dominate today's deployments: edge computing, which processes data close to where it is generated, and cloud computing, which centralises massive computational power in global data centres. This study offers a structured comparison of both paradigms in the context of IoT big data. The study introduce a two-category taxonomy: Type 1 workloads requiring millisecond-level responses, and Type 2 workloads suited for large-scale batch analytics and argue that the optimal architecture depends heavily on the workload’s latency profile, privacy requirements, scale, and operational context. The analysis covers architecture, performance, security, cost, and governance dimensions, and is grounded in real-world case studies across industrial automation, smart cities, precision agriculture, and healthcare. The study concludes that a thoughtfully designed hybrid architecture combining edge autonomy with cloud depth is the most effective path forward for most production IoT systems.

References

European Telecommunications Standards Institute. Multi-access Edge Computing: Framework and Reference Architecture (ETSI GS MEC 003 V2.1.1). ETSI, 2019.

W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, 2016.

S. Tiwari, R. Kashyap, and V. Roy, “Integrating Deep Learning to Decode Meningeal Interleukin-17 T Cell Mechanisms in Salt-Sensitive Hypertension-Induced Cognitive Impairment,” in 2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0 (OTCON), Jun. 2024, pp. 1–6.

S. Tiwari, A. Pandey, H. Khamele, N. K. Rathore, and A. K. Sahu, “Blockchain-Powered Decentralized Platforms for Secure Healthcare Data Exchange,” in 2024 IEEE 4th International Conference on ICT in Business, Industry and Government (ICTBIG), Dec. 2024, pp. 1–6.

P. Kasralikar, O. R. Polu, B. Chamarthi, R. Veer Samara Sihman Bharattej Rupavath, S. Patel, and R. Tumati, “Blockchain for Securing AI-Driven Healthcare Systems: A Systematic Review and Future Research Perspectives,” Cureus, vol. 17, no. 4, p. e83136, Apr. 2025.

S. Sanz-Martos et al., “Drone Applications for Emergency and Urgent Care: A Systematic Review,” Prehospital and Disaster Medicine, vol. 37, no. 4, pp. 502–508, Jun. 2022.

R.-G. J. Pablo, D.-P. Roberto, S.-U. Victor, G.-R. Isabel, C. Paul, and O.-R. Elizabeth, “Big data in the healthcare system: a synergy with artificial intelligence and blockchain technology,” Journal of Integrative Bioinformatics, vol. 19, no. 1, Aug. 2021.

F. Bonomi, R. Milito, J. Zhu, and S. Addepalli. Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012.

Cisco Systems. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. Cisco White Paper, 2015.

W. Shi, H. Sun, J. Cao, Q. Zhang, and W. Li, “Edge Computing—An Emerging Computing Model for the Internet of Everything Era,” Journal of Computer Research and Development, vol. 54, no. 5, p. 907, May 2017.

G. Premsankar, M. Di Francesco, and T. Taleb, “Edge Computing for the Internet of Things: A Case Study,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1275–1284, Apr. 2018.

M. Satyanarayanan, “The emergence of edge computing,” Computer, vol. 50, no. 1, pp. 30–39, 2017.

ETSI. Cyber Security for Consumer Internet of Things: Baseline Requirements (ETSI EN 303 645 V2.1.1). ETSI, 2020.

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,” Future Gener. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009.

P. Mell, T. Grance, “The NIST Definition of Cloud Computing (NIST Special Publication 800-145). National Institute of Standards and Technology, 2011.

S. S. Gill, I. Chana, M. Singh, and R. Buyya, “RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services,” Concurrency and Computation: Practice and Experience, vol. 31, no. 1, p. e4834, Aug. 2018.

J. Kreps, N. Narkhede, and J. Rao, “Kafka: A distributed messaging system for log processing,” in Proc. NetDB Workshop, vol. 11, 2011, pp. 1–7.

M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, and I. Stoica, “Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing,” in Proc. 9th USENIX Symp. Netw. Syst. Design Implement. (NSDI), 2012.

T. Ahmad, M. Cavazza, Y. Matsuo, and H. Prendinger, “Detecting Human Actions in Drone Images Using YOLOv5 and Stochastic Gradient Boosting,” Sensors, vol. 22, no. 18, p. 7020, Sep. 2022.

A. Konert, J. Smereka, and L. Szarpak, “The Use of Drones in Emergency Medicine: Practical and Legal Aspects,” Emergency Medicine International, vol. 2019, pp. 1–5, Dec. 2019.

S. Tiwari, R. Mandhani, A. Lakra, and A. Patel, “AI and Blockchain Synergy for Advanced Health Data Processing in IoT,” in 2024 IEEE 4th International Conference on ICT in Business, Industry and Government (ICTBIG), Dec. 2024, pp. 1–6.

S. Tiwari, “Usage of drones as a medical application,” International Journal of Health Sciences, vol. 6, no. S1, May 2022.

S. Tiwari, “YOLOv5 Based Drone Detection and Identification,” NeuroQuantology, vol. 20, no. 13, pp. 2559–2563, 2022.

Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1738–1762, Aug. 2019.

S. Tiwari, P. Gupta, K. Panjwani, A. Shrivastava, and J. Kalwani, “Addressing Security Challenges in Artificial Intelligence Driven Clinical Environments,” in 2024 First International Conference on Data, Computation and Communication (ICDCC), Nov. 2024, pp. 586–592.

R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,” Future Generation Computer Systems, vol. 78, pp. 680–698, Jan. 2018.

A. Hard et al., “Federated Learning for Mobile Keyboard Prediction,” arXiv (Cornell University), Jan. 2018.

H. A. Younis et al., “A Systematic Review and Meta-Analysis of Artificial Intelligence Tools in Medicine and Healthcare: Applications, Considerations, Limitations, Motivation and Challenges,” Diagnostics, vol. 14, no. 1, p. 109, Jan. 2024.

Published

2026-05-13

How to Cite

Shivang Mishra, & Shikha Tiwari. (2026). Edge versus Cloud: Evaluating Big Data Processing Paradigms for IoT Applications. Journal of Knowledge in Data Science and Information Management, 22–36. Retrieved from https://matjournals.net/engineering/index.php/JoKDSIM/article/view/3558