2015
DOI: 10.1002/cpe.3485
|View full text |Cite
|
Sign up to set email alerts
|

An overview of Fog computing and its security issues

Abstract: Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
158
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 322 publications
(158 citation statements)
references
References 33 publications
0
158
0
Order By: Relevance
“…Cloud Security Alliance [18] have identified twelve critical security issues, including other researchers such as [6,19,20]. These issues directly impact distributed, shared and on-demand nature of cloud computing.…”
Section: Review Methodsologymentioning
confidence: 99%
See 1 more Smart Citation
“…Cloud Security Alliance [18] have identified twelve critical security issues, including other researchers such as [6,19,20]. These issues directly impact distributed, shared and on-demand nature of cloud computing.…”
Section: Review Methodsologymentioning
confidence: 99%
“…Insecure authentication protocols between Fog platforms and end-user devices have been identified as a main security concern of Fog computing by [19]. The author's claim that the IoT devices, especially in smart grids, are prone to data tampering and spoofing attacks and can be prevented with the help of a Public Key Infrastructure (PKI), DiffieHellman key exchange, Intrusion detection techniques and monitoring for modified input values.…”
Section: Authentication In Fog Platformmentioning
confidence: 99%
“…Despite the numerous bene its of Fog computing implementation in IoT systems, there are numerous challenges that must be considered. Even there are works that discuss privacy and security issues in Fog computing [1,3,11,13,18,26,[28][29][30]32], these aspects still can be considered as understudied. The development of novel security and privacy mechanism according to the Fog computing paradigm and their implementation will enable Fog computing vision to show its full potential in IoT systems.…”
Section: Security and Privacy Issues In Fog Computingmentioning
confidence: 99%
“…Most valuable data may still be transmitted through cloud networks, but much of the traffic would be kept off of those networks. Ivan Stojmenovic et.al, studied man-in-the-middle attack in Fog computing and stealthy features of this attack by observing Processor and memory consumption on Fog device [9]. Also discussed authentication and authorization techniques that can be implemented in Fog computing.…”
Section: Security Features In Fog Computingmentioning
confidence: 99%