publication . Article . Other literature type . 2017

Security and Privacy in Fog Computing: Challenges

Mukherjee, Mithun; Matam, Rakesh; Shu, Lei; Maglaras, Leandros; Ferrag, Mohamed Amine; Choudhury, Nikumani; Kumar, Vikas;
Open Access English
  • Published: 06 Sep 2017 Journal: IEEE Access, volume 5, pages 19,293-19,304 (issn: 2169-3536, Copyright policy)
  • Publisher: IEEE
  • Country: United Kingdom
open access article Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an overview of existing security and privacy concerns, particularly for the fog computing. Afterward, this survey h...
Persistent Identifiers
free text keywords: Fog, fog computing, fog networking, security, privacy, IoT, lcsh:Electrical engineering. Electronics. Nuclear engineering, lcsh:TK1-9971, Edge computing, Cloud computing security, Authentication, Electronic mail, Fog computing, Computer science, Utility computing, End user, Computer security, computer.software_genre, computer, Cloud computing, business.industry, business
Any information missing or wrong?Report an Issue