2018
DOI: 10.1016/j.future.2018.05.008
|View full text |Cite
|
Sign up to set email alerts
|

Security and trust issues in Fog computing: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
126
0
3

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 299 publications
(130 citation statements)
references
References 61 publications
1
126
0
3
Order By: Relevance
“…Zhang et al [21] discussed and analyzed the architecture of fog computing and pointed out related potential security and trust issues. They comprehensively reported on how to solve these problems in the existing literature and discussed open challenges in security and trustworthiness of fog computing, research trends and future topics.…”
Section: Relevant Workmentioning
confidence: 99%
“…Zhang et al [21] discussed and analyzed the architecture of fog computing and pointed out related potential security and trust issues. They comprehensively reported on how to solve these problems in the existing literature and discussed open challenges in security and trustworthiness of fog computing, research trends and future topics.…”
Section: Relevant Workmentioning
confidence: 99%
“…Although there is some concrete progress in the NFV technologies, predominant focus has been on management and orchestration aspects. A comprehensive review of major security challenges for IoT, fog computing architecture and corresponding solutions in the IoT layered architecture is presented by Khan and Salah and Zhang et al Morabito et al proposed a lightweight gateway mechanism called “LegoIT” at the Edge/IoT networks and demonstrated security applications. Rapuzzi and Repetto articulated methods to build defense mechanisms with “situational awareness” for fog computing infrastructures.…”
Section: Related Workmentioning
confidence: 99%
“…Although there is some concrete progress in the NFV technologies, predominant focus has been on management and orchestration aspects. A comprehensive review of major security challenges for IoT, fog computing architecture and corresponding solutions in the IoT layered architecture is presented by Khan and Salah 23 and Zhang et al 24 Morabito et al 25 Chakrabarty et al 30 proposed "BlackSDN -a secure SDN IoT network architecture" as a solution to protect IoT, and they used "SDN-controller as root-of-trust" to run the encrypted communication between multiple parties. Basile et al 31 aimed to exemplify the "network-function-on-demand as a service" model of the NFV paradigm.…”
Section: Related Workmentioning
confidence: 99%
“…To address these challenges, Fog computing architecture is introduced. It brings the cloud services much closer to IoT devices/end‐devices . In Figure , we discuss the Fog computing architecture.…”
Section: Introductionmentioning
confidence: 99%
“…It brings the cloud services much closer to IoT devices/end-devices. [17][18][19][20] In Figure 2, we discuss the Fog computing architecture. The Fog computing architecture is a three-layer schema.…”
Section: Introductionmentioning
confidence: 99%