期刊
SECURITY AND PRIVACY
卷 4, 期 2, 页码 -出版社
WILEY
DOI: 10.1002/spy2.145
关键词
fog computing; Internet of Things; privacy; security
资金
- Projekt DEAL
Fog computing mitigates the impact of low latency and geographic distribution issues in IoT applications by implementing fog nodes near end-users, reducing data offload to the Cloud and improving response time. However, it faces challenges in meeting security and privacy requirements, with the need for more research and solutions.
Fog nodes are implemented near to end-users Internet of Things (IoT) devices, which mitigate the impact of low latency, location awareness, and geographic distribution unsupported features of many IoT applications. Moreover, Fog computing decreases the data offload into the Cloud, which decreases the response time. Despite these benefits, Fog computing faces many challenges in meeting security and privacy requirements. These challenges occur due to the limitations of Fog computing resources. In fact, Fog computing may add new security and privacy issues. Although many papers have discussed the Fog security and privacy issues recently, most of these papers have discussed these issues at a very high level. This paper provides a comprehensive understanding of Fog privacy and security issue. In this survey, we review the literature on Fog computing to draw the state-of-the-art of the security and privacy issues raised by Fog computing. The findings of this survey reveal that studying Fog computing is still in its infant stage. Many questions are yet to be answered to address the privacy and security challenges of Fog computing.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据