z-logo
open-access-imgOpen Access
A survey on fog computing: research challenges in security and privacy issues
Author(s) -
T Veerraju,
K. Suresh Kumar
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.7.10710
Subject(s) - fog computing , cloud computing , computer science , edge computing , computer security , server , latency (audio) , cloud computing security , the internet , enhanced data rates for gsm evolution , low latency (capital markets) , internet of things , computer network , telecommunications , world wide web , operating system
With the rapid advancement of Internet of Things has enabled to combine the intercommunication and interconnection between seamless networks. Cloud computing provides backend solutions and one among the most prominent technologies for the users, still cannot be solved all the problems such as latency of real time applications. However, a new computing paradigm comes in to the picture. Many of the researchers focused on this exemplar known as Fog/Edge computing, which has been planned to the extension of cloud services. Fog provides the services to the edge of the networks, which makes communication, computation and storage for end users through fog devices and for servers like controllers. We analyze the study, which aims to augment low bandwidth, latency along with the privacy and security.   The major problem in the Fog computing is security due to the limited resources. In this paper, we investigated the protection issues and confrontation of Fog and also provide countermeasures on security for different attacks. We focused the future security directions and challenges to address in fog networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here