A Roadmap: Towards Security Challenges, Prevention Mechanisms for Fog Computing

2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)(2019)

引用 0|浏览0
暂无评分
摘要
Fog computing could be a fashionable paradigm of delicate computing that prolong cloud to the edge of networks and offers expert knowledge access, computational power, storage, and networking. Fog Computing helps to make low latency network connections between devices and their isolating finish points. Its design, in turn, shrinks the quantity of information measure required once associated to cloud. Additionally, Fog systems are moveable, and may be put in on numerous hardware. Because of dominating trend of wireless networking in fog, security could be a massive concern to fog computing. Due to the current attributes and architecture of fog computing many other security threats also arise. This study consists to investigate the current research work on Fog computing to spot mutual security holes. During this paper we have discussed security challenges in fog computing and existing strategies to address security challenge over FOG environment. Consequently, the promising models has been recommended with facts to address security issues in Fog. Computing.
更多
查看译文
关键词
Fog computing,Internet of Things,Cloud of Things,Security Challenges,Security challenges in fog computing,Critical survey
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要