TY - CHAP
T1 - Review
T2 - Security and privacy issues of fog computing for the internet of things (iot)
AU - Ekanayake, Binara N.B.
AU - Halgamuge, Malka N.
AU - Syed, Ali
N1 - Includes bibliographical references.
PY - 2018
Y1 - 2018
N2 - Internet of Things (IoT), devices, and remote data centers need to connect. The purpose of fog is to reduce the amount of data transported for processing, analysis, and storage, to speed-up the computing processes. The gap between, Fog computing technologies and devices need to narrow down as growth in business today relies on the ability to connect to digital channels for processing large amounts of data. Cloud computing is unfeasible for many internet of things applications, therefore fog computing is often seen as a viable alternative. Fog is suitable for many IoT services as it has enabled an extensive collection of benefits, such as decreased band width, reduced latency, and enhanced security. However, Fog devices that are placed at the edge of the internet have met numerous privacy and security threats. This study aims to examine and highlight the security and privacy issues of fog computing through a comprehensive review of recently published literature of fog computing and suggest solutions for identified problems. Data extracted from 34 peer-reviewed scientific publications (2011–2017) were studied, leading to the identification of 49 different issues that were raised, in relation to fog computing. This study revealed a general agreement among researchers about the novelty of Fog computing, and its early stages of development, and identifies several challenges that need to be met, before its wider application and use reaches its full potential.
AB - Internet of Things (IoT), devices, and remote data centers need to connect. The purpose of fog is to reduce the amount of data transported for processing, analysis, and storage, to speed-up the computing processes. The gap between, Fog computing technologies and devices need to narrow down as growth in business today relies on the ability to connect to digital channels for processing large amounts of data. Cloud computing is unfeasible for many internet of things applications, therefore fog computing is often seen as a viable alternative. Fog is suitable for many IoT services as it has enabled an extensive collection of benefits, such as decreased band width, reduced latency, and enhanced security. However, Fog devices that are placed at the edge of the internet have met numerous privacy and security threats. This study aims to examine and highlight the security and privacy issues of fog computing through a comprehensive review of recently published literature of fog computing and suggest solutions for identified problems. Data extracted from 34 peer-reviewed scientific publications (2011–2017) were studied, leading to the identification of 49 different issues that were raised, in relation to fog computing. This study revealed a general agreement among researchers about the novelty of Fog computing, and its early stages of development, and identifies several challenges that need to be met, before its wider application and use reaches its full potential.
KW - Big data
KW - Cloud computing
KW - Edge computing
KW - Fog computing
KW - IoT
KW - Mobile edge computing
KW - Privacy
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85065835499&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85065835499&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-70688-7_7
DO - 10.1007/978-3-319-70688-7_7
M3 - Chapter (peer-reviewed)
AN - SCOPUS:85065835499
SN - 9783319706870
T3 - Lecture Notes on Data Engineering and Communications Technologies
SP - 139
EP - 174
BT - Cognitive computing for big data systems over IoT
A2 - Sangaiah, Arun Kumar
A2 - , Arunkumar Thangavelu
A2 - Sundaram, Venkatesan Meenakshi
PB - Springer
CY - Cham, Switzerland
ER -