4.5 Article

Insights into security and privacy towards fog computing evolution

期刊

COMPUTERS & SECURITY
卷 120, 期 -, 页码 -

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2022.102822

关键词

Fog computing; Internet of things; Security; Privacy; Cloud computing; Fog networking

向作者/读者索取更多资源

This paper analyzes the evolution of fog computing and IoT methodologies, discussing the advantages and challenges of moving security and privacy tasks to the network edge. It provides an overview of the requirements for secure and privacy-aware IoT-based fog computing infrastructures.
The incremental diffusion of the Internet of Things (IoT) technologies and applications represents the out-come of a world ever more connected by means of heterogeneous and mobile devices. IoT scenarios imply the presence of multiple data producers (e.g., sensors, actuators, RFID, NFC) and consumers (e.g., end-user devices, such as smartphones, tablets, and PCs). A variety of standards and protocols must cooperate to efficiently gather, process, and share the information. The fog computing paradigm, due to its distributed nature, represents a viable solution to cope with interoperability, scalability, security, and privacy issues, which naturally emerge, since it operates as an intermediate layer between data consumers/producers and traditional cloud systems. This paper analyzes the evolution in the modeling of new methodologies, related to fog computing and IoT, showing how moving security and privacy tasks toward the edge of the network provide both advantages and new challenges to be faced in this research field. The proposed dis-cussion provides an overview of requirements for the realization of secure and privacy-aware IoT-based fog computing infrastructures.(c) 2022 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据