Security and Privacy in Fog Computing: Challenges

dc.cclicenceCC-BY-NCen
dc.contributor.authorMukherjee, Mithunen
dc.contributor.authorMatam, Rakeshen
dc.contributor.authorShu, Leien
dc.contributor.authorMaglaras, Leandrosen
dc.contributor.authorFerrag, Mohamed Amineen
dc.contributor.authorChoudhry, Nikumanien
dc.contributor.authorKumar, Vikasen
dc.date.accessioned2017-12-01T12:51:01Z
dc.date.available2017-12-01T12:51:01Z
dc.date.issued2017-09-06
dc.descriptionopen access articleen
dc.description.abstractFog computing paradigm extends the storage, networking, and computing facilities of the cloud computing toward the edge of the networks while offloading the cloud data centers and reducing service latency to the end users. However, the characteristics of fog computing arise new security and privacy challenges. The existing security and privacy measurements for cloud computing cannot be directly applied to the fog computing due to its features, such as mobility, heterogeneity, and large-scale geo-distribution. This paper provides an overview of existing security and privacy concerns, particularly for the fog computing. Afterward, this survey highlights ongoing research effort, open challenges, and research trends in privacy and security issues for fog computing.en
dc.exception.reasonopen access articleen
dc.fundern/aen
dc.identifier.citationMukherjee, M. et al. (2017) Security and Privacy in Fog Computing: Challenges. IEEE Access, 5, pp. 19293-19304en
dc.identifier.doihttps://doi.org/10.1109/ACCESS.2017.2749422
dc.identifier.urihttp://hdl.handle.net/2086/14958
dc.language.isoenen
dc.peerreviewedYesen
dc.projectidn/aen
dc.publisherIEEEen
dc.researchinstituteCyber Technology Institute (CTI)en
dc.titleSecurity and Privacy in Fog Computing: Challengesen
dc.typeArticleen

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.2 KB
Format:
Item-specific license agreed upon to submission
Description: