A Survey on Fog Computing Security Issues and Challenges

P, Kavita, B, Vinayak, B, Pranav and N.P, Neha A Survey on Fog Computing Security Issues and Challenges. International Journal of Modern Trends in Engineering and Science, 2017, vol. 04, n. 05, pp. 66-68. [Journal article (Paginated)]

[thumbnail of A SURVEY ON FOG COMPUTING SECURITY ISSUES AND CHALLENGES.pdf]
Preview
Text
A SURVEY ON FOG COMPUTING SECURITY ISSUES AND CHALLENGES.pdf

Download (370kB) | Preview

English abstract

Fog computing is a paradigm that extends Cloud computing and services to the edge of the network which eliminates the limitations such as abeyance, curtailed mobility, absenteeism of location awareness, security short comings etc. This survey paper gives an overview of fog computing, its benefits, challenges, architectural components, security and privacy issues. Also discusses about the encryption algorithms, techniques, security requirements and the key challenges for fog computing.

Item type: Journal article (Paginated)
Keywords: Fog computing; Sensors; Cloud; Big data; CISCO; VPN
Subjects: B. Information use and sociology of information
I. Information treatment for information services
L. Information technology and library technology
L. Information technology and library technology > LB. Computer networking.
Depositing user: Kavita P
Date deposited: 13 Sep 2020 08:51
Last modified: 13 Sep 2020 08:51
URI: http://hdl.handle.net/10760/40451

References

White paper by CISCO on ,”Fog Computing and the Internet of Things: Extend the cloud to where the things are,” pp-1-6,2015.

White paper by CISCO on ,”Cisco Fog Computing solutions: Unleash the power of the Internet of Things,” pp-1-6,2015.

A joint white paper by Symantec and Vmware on “ Securing the cloud for the Enterprise”

Evan Stojmenovic, Sheng Wen, “The Fog Computing paradigm: scenarios and security issues”, proceedings of the IEEE Federated Conference on Computer Science and Information Systems, 2014,pp. 1-8.

Tadapaneni, N. R. (2017). Different Types of Cloud Service Models. Available at SSRN 3614630.

M.T. Dlamini, H. S. Venter, J.H.P. Eloff, “Security of Cloud Computing seeing through the Fog”

Salvatore J. Stalfo, Malek Ben Salem, Angelos D. Keromytis, “ Fog Computing: mitigating insider data theft attacks in the cloud”, pp. 125- 128, IEEE Security and Privacy Workshops, position paper, 2012

Tadapaneni, N. R. (2016). Overview and Opportunities of Edge Computing. Social Science Research Network.

Chirag Modi, Dhiren Patel, BhaveshBorisaniya, Avi Patel, MuttukrishnanRajarajan, “ A survey on security issues and solutions of different layers of cloud computing”, Springer Science+ Business MediaNew York, 2012, Pp. 561-592

Weisong Shi, Jie Cow, Quan Zhang, Youhuizi Li, LanyuXu,”Edge Computing: Vision and Challenges”, IEEE Internet of Things Journal, Vol.3, No. 5, October, 2016, Pp. 637-646

KshamataShenoy, Prachibhokare, Unnatipai,”Fog Computing: Future of Cloud Computing”, International Journal of Science and Research(IJSR), Volume 4 Issue 6, June 2015, ISSN: 2319-7064, pp.55-56

PanimalarS, A., Dharani, N., Aiswarya, R., & Shailesh, P. (2017). Cloud Data Security Using Elliptic Curve Cryptography.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item