2020
DOI: 10.5120/ijca2020920648
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing: Security Challenges and Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…A cross-chaining platform is required for blockchain enabling ecosystems (interconnected). Transparency is required in the design, development, and deployment of blockchain-aware fog-cloud data management for drones [47].…”
Section: Blockchain Cross-chaining Platform Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…A cross-chaining platform is required for blockchain enabling ecosystems (interconnected). Transparency is required in the design, development, and deployment of blockchain-aware fog-cloud data management for drones [47].…”
Section: Blockchain Cross-chaining Platform Limitationsmentioning
confidence: 99%
“…Scaling is the key to maintaining a distributed storage system and should focus on sharding and other meta storage. Thus, maintaining transparency and consistency of distributed applications during sharding is critical for a distributed storage system with elastic scaling [47,48]. Until recently, the only blockchainaware fog-cloud-based distributed storage strategy was static data sharding.…”
Section: Distributed Storage and Scalability Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Likewise, Cloud computing architecture when used with IoT devices may suffer from a critical challenge related to delay-sensitive applications such as online games and emergency services which might be ruined when unexpected delays occur. Consequently, fog computing (FC) has been proposed to overcome these drawbacks of Cloud computing traditional drawbacks [5], [6].…”
Section: Introductionmentioning
confidence: 99%
“…14,15 Therefore, security and privacy issues can be mitigated by providing novel solutions that can meet the special requirements of Fog computing. Recently, many papers have discussed the state-of-the-art of Fog security and privacy issues (eg, [16][17][18][19][20][21][22][23] ). However, most of these papers have discussed these issues at a very high level.…”
mentioning
confidence: 99%