Blockchain technology as a Fog computing security and privacy solution: An overview

YI Alzoubi, A Al-Ahmad, H Kahtan - Computer Communications, 2022 - Elsevier
The emergent of Fog computing as an extension of Cloud computing, from the center of the
internet architecture to the IoT end user's devices, aims to enhance the processing power of …

A systematic review of task scheduling approaches in fog computing

S Bansal, H Aggarwal… - Transactions on Emerging …, 2022 - Wiley Online Library
Due to increased use of IoT devices and data sensors a huge amount of data is being
produced for processing in real‐time. Fog computing has evolved as a solution for fast …

Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art

YI Alzoubi, VH Osmanaj, A Jaradat… - Security and …, 2021 - Wiley Online Library
Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which
mitigate the impact of low latency, location awareness, and geographic distribution …

Fog node discovery and selection: A systematic literature review

A Bukhari, FK Hussain, OK Hussain - Future Generation Computer Systems, 2022 - Elsevier
Fog computing is a new computing paradigm that extends cloud services by providing
computing resources in the form of fog nodes closer to the edge devices. Fog computing …

Fog computing security: A review

AK Jumani, J Shi, AA Laghari, Z Hu, A Nabi… - Security and …, 2023 - Wiley Online Library
Fog computing, also known as edge computing, is a decentralized computing architecture
that brings computing and data storage closer to the users and devices that need it. It offers …

An Evaluation of Key Adoption Factors towards Using the Fog Technology

O Ali, A Shrestha, A Jaradat, A Al-Ahmad - Big Data and Cognitive …, 2022 - mdpi.com
Fog technology is one of the recent improvements in cloud technology that is designed to
reduce some of its drawbacks. Fog technology architecture is often widely distributed to …

Systematic analysis of safety and security risks in smart homes

HU Khan, MK Alomari, S Khan, S Nazir, AQ Gill… - 2021 - qspace.qu.edu.qa
The revolution in Internet of Things (IoT)-based devices and applications has provided smart
applications for humans. These applications range from healthcare to traffic-flow …

[PDF][PDF] fog computing based security of IoT application

ML Bangare, PM Bangare, RS Apare… - Design …, 2021 - researchgate.net
As fog computing reduces data offloading to the Cloud, resulting in a faster reaction time.
Despite these advantages, fog computing has many difficulties when it comes to fulfilling …

Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting

T Ehsan, MU Sana, MU Ali, EC Montero… - IEEE …, 2024 - ieeexplore.ieee.org
Smart contracts are becoming increasingly popular for managing transactions or activities in
fog computing environments. However, the use of smart contracts for registration and …

Performance Analysis of a Keyword-Based Trust Management System for Fog Computing

AM Alwakeel - Applied Sciences, 2023 - mdpi.com
This study presents a novel keyword-based trust management system for fog computing
networks aimed at improving network efficiency and ensuring data integrity. The proposed …