2021
DOI: 10.11591/ijece.v11i6.pp5081-5088
|View full text |Cite
|
Sign up to set email alerts
|

Fog computing security and privacy issues, open challenges, and blockchain solution: An overview

Abstract: <span lang="EN-US">Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 50 publications
(92 reference statements)
0
14
0
Order By: Relevance
“…In addition, the aspects of modelling the infrastructure are also studied, e.g., [17][18][19]. The authors in [17] propose solutions to fog computing problems, including a blockchainenabled federated learning model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the aspects of modelling the infrastructure are also studied, e.g., [17][18][19]. The authors in [17] propose solutions to fog computing problems, including a blockchainenabled federated learning model.…”
Section: Related Workmentioning
confidence: 99%
“…Blockchain-related issues are discussed in [8] to provide persistency and audibility. In [18], the authors discuss security and privacy in an FC-enabled IoT environment. The reliability requirements are given in [19], including the implied latency when fog nodes work together.…”
Section: Related Workmentioning
confidence: 99%
“…At the national level, there is a larger influence on security [6]. As a result, security is quickly becoming one of the most important aspects in the success of any corporation or business, whether public or private [7]. Therefore, cybersecurity (CS) is required in the form of a collection of security policies that specify what represents appropriate and inappropriate actions of users in relation to the secure handling of information assets [8].…”
Section: Introductionmentioning
confidence: 99%
“…(6) For businesses, CS determines the areas of security vulnerability. (7) Another goal of CS is to reduce the possibility of cyberattacks, as well as to create a secure environment that is unfavorable to cybercriminals. There are also business criteria that define which CS must be used.…”
mentioning
confidence: 99%
“…It is the primary driving force behind the existing business. Because large data analytics is a computationally intensive operation, the user experience during large data analytics is influenced by the setup of different software and devices [57]- [66].…”
Section: Introductionmentioning
confidence: 99%