Fog computing and security issues: A review

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

66 Scopus citations

Abstract

The paradigm of fog computing has set new trends and heights in the modern world networking and have overcome the major technical complexities of cloud computing. It is not a replacement of cloud computing technology but it just adds feasible advanced characteristics to existing cloud computing paradigm.fog computing not only provide storage, networking and computing services but also provide a platform for IoT (internet of things). However, the fog computing technology also arise the threat to privacy and security of the data and services. The existing security and privacy mechanisms of the cloud computing cannot be applied to the fog computing directly due to its basic characteristics of large-scale geo-distribution, mobility and heterogeneity. This article provides an overview of the present existing issues and challenges in fog computing.

Original languageEnglish
Title of host publication2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings
EditorsFlorin Gheorghe Filip, Domnica Dzitac, Ioan Dzitac, Misu-Jan Manolescu, Simona Dzitac, Horea Oros
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages237-239
Number of pages3
ISBN (Electronic)9781538619346
DOIs
StatePublished - 19 Jun 2018
Event7th International Conference on Computers Communications and Control, ICCCC 2018 - Oradea, Romania
Duration: 8 May 201812 May 2018

Publication series

Name2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings

Conference

Conference7th International Conference on Computers Communications and Control, ICCCC 2018
Country/TerritoryRomania
CityOradea
Period8/05/1812/05/18

Keywords

  • Cloud Computing
  • DOS
  • Fog Computing
  • IDS
  • Security

Fingerprint

Dive into the research topics of 'Fog computing and security issues: A review'. Together they form a unique fingerprint.

Cite this