2017
DOI: 10.1109/access.2017.2749422
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in Fog Computing: Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
246
0
2

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 433 publications
(248 citation statements)
references
References 51 publications
0
246
0
2
Order By: Relevance
“…For instance, Fog nodes can provide cryptographic services to devices that lack the processing power to perform complex computations [33]. Relevant services such as authentication and reputation-based trust management are also good candidates to be implemented by local Fog services running on stable and trusted computers [34]. Privacy policies can also be enforced by Fog nodes that decide which data can be transported outside of the local Fog environment.…”
Section: Discussion and Future Researchmentioning
confidence: 99%
“…For instance, Fog nodes can provide cryptographic services to devices that lack the processing power to perform complex computations [33]. Relevant services such as authentication and reputation-based trust management are also good candidates to be implemented by local Fog services running on stable and trusted computers [34]. Privacy policies can also be enforced by Fog nodes that decide which data can be transported outside of the local Fog environment.…”
Section: Discussion and Future Researchmentioning
confidence: 99%
“…Fog computing facilitates the operation of smart IoT devices in the IoT by using cloud computing data centers. Zhang et al presented the EMINC framework, to build a multidimensional index for cloud computing system, based on the combination of two popular multidimensional index, namely R‐tree and KD‐tree.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, trust must be ensured in a fog network for the collaboration of nodes in the network. The heterogeneous nature of fog nodes complicates the trust context in fog computing . Trust allows the fog nodes and/or clients, to predict the expected behaviour of its peers and thus can aid the decision‐making process.…”
Section: Fog Computing Aspectsmentioning
confidence: 99%
“…The behaviour of the objects may also vary with time. Thus, trust values must be calculated dynamically at defined intervals Subjective trust : depending on the characteristics of each object in the network, the security requirements also vary.…”
Section: Fog Computing Aspectsmentioning
confidence: 99%
See 1 more Smart Citation