2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI) 2021
DOI: 10.1109/iiai-aai53430.2021.00125
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management of Fog Computing for Improving IoT Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Then, in the second layer, the risk factors are classified into the user side and the provider side, and in the third and subsequent layers, the user side is divided into the edge side (IoT device) and the cloud computing side, while the provider side is divided into system, operation, and others. In this way, we extracted 24 risk factors in detail from an exhaustive perspective [15].…”
Section: Risk Identifications Of Risk Factorsmentioning
confidence: 99%
“…Then, in the second layer, the risk factors are classified into the user side and the provider side, and in the third and subsequent layers, the user side is divided into the edge side (IoT device) and the cloud computing side, while the provider side is divided into system, operation, and others. In this way, we extracted 24 risk factors in detail from an exhaustive perspective [15].…”
Section: Risk Identifications Of Risk Factorsmentioning
confidence: 99%