Show simple item record

dc.contributor.authorMukherjee, Mithunen
dc.contributor.authorMatam, Rakeshen
dc.contributor.authorShu, Leien
dc.contributor.authorMaglaras, Leandrosen
dc.contributor.authorFerrag, Mohamed Amineen
dc.contributor.authorChoudhry, Nikumanien
dc.contributor.authorKumar, Vikasen
dc.date.accessioned2017-12-01T12:51:01Z
dc.date.available2017-12-01T12:51:01Z
dc.date.issued2017-09-06
dc.identifier.citationMukherjee, M. et al. (2017) Security and Privacy in Fog Computing: Challenges. IEEE Access, 5, pp. 19293-19304en
dc.identifier.urihttp://hdl.handle.net/2086/14958
dc.descriptionopen access articleen
dc.description.abstractFog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an overview of existing security and privacy concerns, particularly for the fog computing. Afterward, this survey highlights ongoing research effort, open challenges, and research trends in privacy and security issues for fog computing.en
dc.language.isoenen
dc.publisherIEEEen
dc.titleSecurity and Privacy in Fog Computing: Challengesen
dc.typeArticleen
dc.identifier.doihttps://dx.doi.org/10.1109/ACCESS.2017.2749422
dc.peerreviewedYesen
dc.fundern/aen
dc.projectidn/aen
dc.cclicenceCC-BY-NCen
dc.exception.reasonopen access articleen
dc.researchinstituteCyber Technology Institute (CTI)en


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record