Security and privacy in fog computing: Challenges

M Mukherjee, R Matam, L Shu, L Maglaras… - IEEE …, 2017 - ieeexplore.ieee.org
IEEE Access, 2017ieeexplore.ieee.org
Fog computing paradigm extends the storage, networking, and computing facilities of the
cloud computing toward the edge of the networks while offloading the cloud data centers
and reducing service latency to the end users. However, the characteristics of fog computing
arise new security and privacy challenges. The existing security and privacy measurements
for cloud computing cannot be directly applied to the fog computing due to its features, such
as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an …
Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an overview of existing security and privacy concerns, particularly for the fog computing. Afterward, this survey highlights ongoing research effort, open challenges, and research trends in privacy and security issues for fog computing.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果