Author : Sai Keerthi.Tulluru 1
Date of Publication :25th April 2018
Abstract: Fog computing is a paradigm that extends cloud computing and services to the edge of the network. Fog computing provides data, storage, and application services to end users. In Fog computing user data is outsourced and user’s control over dated is handed over to fog node, which introduces same security threats as it is in cloud computing. Fog computing is well suited for real time analytics and big data .Security incidents regarding fog computing are posed by the hostile attack and main-in-the-middle attacks
Reference :
-
- Lee, Kanghyo, et al. "On security and privacy issues of fog computing supported Internet of Things environment." Network of the Future (NOF), 2015 6th International Conference on the. IEEE, 2015.
- Alrawais, Arwa, et al. "Fog Computing for the Internet of Things: Security and Privacy Issues." IEEE Internet Computing 21.2 (2017): 34-42
- Stojmenovic, Ivan, and Sheng Wen. "The fog computing paradigm: Scenarios and security issues." Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on. IEEE, 2014
- Wang, Yifan, Tetsutaro Uehara, and Ryoichi Sasaki. "Fog computing: issues and challenges in security and forensics." Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual. Vol. 3, IEEE, 2015
- Chiang, Mung, and Tao Zhang. "Fog and IoT: An overview of research opportunities." IEEE Internet of Things Journal 3.6 (2016): 854-864.
- Ashwini, Thogaricheti, and Mrs. Anuradha SG. "Fog Computing to protect real and sensitivity information in Cloud."
- Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog computing: A survey." International Conference on Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2015.