3.8 Article

An overview of cloud-fog computing: Architectures, applications with security challenges

Journal

SECURITY AND PRIVACY
Volume 2, Issue 4, Pages -

Publisher

WILEY
DOI: 10.1002/spy2.72

Keywords

cloud computing; fog computing; security challenges

Ask authors/readers for more resources

With the growing needs of data across the world, it almost hard to live without data a day. This is almost a blessing in disguise for the researchers working on different domains and dealing with huge amounts of data. The fog computing concept is aiming to change the scenarios created by cloud computing environments and also to make the data-centric clouds decentralized and localized. Fog devices contain only specific information that is frequently used in it and generally the size of the data in fog device is very less in comparison with cloud server. Fog stores only those data, which are frequently used by the users, rest it takes from the cloud itself. The motivation toward this field to make the data flow in various domain seamless and hassle free. Fog computing can be thought as an intermediate between the users and the cloud server, which connects end users easily and thus reduces the latency of the services. This paper discusses the three layered data flow architecture for fog computing and it proposes several novel architectures such as energy lattices, MediFog, UXFog, connected parking system, and FoAgro to utilize the concept of fog computing.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available