Security and trust issues in fog computing: A survey

PY Zhang, MC Zhou, G Fortino - Future Generation Computer Systems, 2018 - Elsevier
Fog computing uses one or more collaborative end users or near-user edge devices to
perform storage, communication, control, configuration, measurement and management …

[PDF][PDF] Fog computing security and privacy issues, open challenges, and blockchain solution: An overview.

YI Alzoubi, A Al-Ahmad, A Jaradat - International Journal of Electrical …, 2021 - academia.edu
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance
the low latency IoT applications and meet the distribution nature of these devices. However …

On resilience in cloud computing: A survey of techniques across the cloud domain

T Welsh, E Benkhelifa - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cloud infrastructures are highly favoured as a computing delivery model worldwide, creating
a strong societal dependence. It is therefore vital to enhance their resilience, providing …

Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art

YI Alzoubi, VH Osmanaj, A Jaradat… - Security and …, 2021 - Wiley Online Library
Fog nodes are implemented near to end‐users Internet of Things (IoT) devices, which
mitigate the impact of low latency, location awareness, and geographic distribution …

Blockchain and the Industrial Internet of Things: A requirement taxonomy and systematic fit analysis

N Siegfried, T Rosenthal, A Benlian - Journal of Enterprise …, 2022 - emerald.com
Purpose The purpose of this paper is to investigate the suitability of Blockchain technology
for applications in the Industrial Internet of Things (IIOT). It provides a taxonomy of system …

Security challenges in fog-computing environment: a systematic appraisal of current developments

J Yakubu, SM Abdulhamid, HA Christopher… - Journal of Reliable …, 2019 - Springer
Fog computing is a new paradigm of computing that extends cloud-computing operations to
the edges of the network. The fog-computing services provide location sensitivity, reduced …

[PDF][PDF] Fog computing, applications, security and challenges, review

G Rahman, CC Wen - International Journal of Engineering & …, 2018 - academia.edu
The internet of things originates a world where on daily basis objects can join the internet
and interchange information and in addition process, store, gather them from the nearby …

FOCUS: A fog computing-based security system for the Internet of Things

S Alharbi, P Rodriguez, R Maharaja… - 2018 15th IEEE …, 2018 - ieeexplore.ieee.org
As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with
regard to the security and privacy of the IoT. Cyber attacks such as man-in-the-middle and …

An attribute credential based public key scheme for fog computing in digital manufacturing

X Yao, H Kong, H Liu, T Qiu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In order to meet low latency, service sensitive and location awareness requirements of
digital manufacturing, fog computing is introduced to be an intermediate layer between …

Fog computing complete review: Concepts, trends, architectures, technologies, simulators, security issues, applications, and open research fields

I Ahammad - SN Computer Science, 2023 - Springer
Regarding real-time data processing, technological innovations like the Internet of Things
(IoTs) need latency-sensitive computation. The interconnected devices in IoT systems …