Open Access   Article Go Back

Fog Computing and its Security Issues

Keerthi T.R.1 , Mohit Agarwal2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-09 , Page no. 87-90, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si9.8790

Online published on Apr 30, 2019

Copyright © Keerthi T.R., Mohit Agarwal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Keerthi T.R., Mohit Agarwal, “Fog Computing and its Security Issues,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.09, pp.87-90, 2019.

MLA Style Citation: Keerthi T.R., Mohit Agarwal "Fog Computing and its Security Issues." International Journal of Computer Sciences and Engineering 07.09 (2019): 87-90.

APA Style Citation: Keerthi T.R., Mohit Agarwal, (2019). Fog Computing and its Security Issues. International Journal of Computer Sciences and Engineering, 07(09), 87-90.

BibTex Style Citation:
@article{T.R._2019,
author = { Keerthi T.R., Mohit Agarwal},
title = {Fog Computing and its Security Issues},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {09},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {87-90},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=961},
doi = {https://doi.org/10.26438/ijcse/v7i9.8790}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.8790}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=961
TI - Fog Computing and its Security Issues
T2 - International Journal of Computer Sciences and Engineering
AU - Keerthi T.R., Mohit Agarwal
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 87-90
IS - 09
VL - 07
SN - 2347-2693
ER -

           

Abstract

Fog Computing is another worldview that increases the Cloud storage through figuring assets on the edges of a system. It is clearly well described as a cloud-like stage containing comparative information, computation and application administrations, yet is on a very basic level diverse in that it is decentralized. Furthermore, Fog computing are equipped for preparing a lot of information locally, work on-premise and are completely convenient. It can be on mixed equipment’s. These highlights make the Fog stage extremely reasonable for time and area for touchy applications. For instance, Internet of Things (IoT) Devices having lot of information and its required rapidly process for working. This large area of usefulness driven applications increases numerous confidentiality issues with respect to information, virtualization, isolation, organize, malware and observing. This paper reviews existing papers on Fog figuring applications to resolve regular security holes. Comparable advancements like Edge figuring, Cloudlets and Micro-server farms having same incorporated to give a comprehensive audit process. Most of Fog applications are roused by the longing for usefulness and end-user prerequisites, while the confidentiality aspects are frequently disregarded or measured as a bit of hindsight. This paper also determines the effect of those security issues and conceivable solution, giving prospect security-pertinent headings to those responsible for designing, emerging, and preserving Fog systems.

Key-Words / Index Term

Iot, Cloud, Fog, localized, Edge computing, Decoy, Hashing

References

[1] Lee, Kanghyo, et al. "On security and privacy issues of fog computing supported Internet of Things environment." Network of the Future (NOF), 2015 6th International Conference on the. IEEE, 2015.
[2] Wang, Yifan, Tetsutaro Uehara, and Ryoichi Sasaki. "Fog computing: issues and challenges in security and forensics." Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual. Vol.3, IEEE, 2015
[3] Yi, Shanhe, Zhengrui Qin, and Qun Li. "Security and privacy issues of fog computing: A survey." International Conference on Wireless Algorithms, Systems, and Applications. Springer International Publishing, 2015.
[4] Ben-Salem M., and Stolfo Angelos D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE symposium on security and privacy workshop (SPW) 2012.
[5] Arwinder Singh, Abhishek Gautam, Hemant Kumar, Er. C.K. Raina. "Decoy Technology in Fog Computing" International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 3, March 2017
[6] Thanh Dat Dang and Doan Hoang; A Data Protection Model for Fog Computing; IEEE Conference; 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC); 2017 IEEE; pp. 32-38.
[7] Hany F. Atlam, Robert J. Walters and Gary B. Wills; Fog computing and the internet of things: A Review; Big Data and Cognitive Computing; 2018,2,10; doi:10.3390/bdcc2020010
[8] Shubha Brata Nath, Harshit Gupta, Sandip Chakraborty, Soumya K Ghosh; A survey of fog computing and communication: Current researches and future directions; IEEE Communication Surveys and Tutorials; April 2018
[9] Sai Keerthi.Tulluru, Dr.Anuradha S.G. "Fog Computing a Paradigm: Scenarios And Security Issues"International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 5, Issue 4, April 2018
[10] Blesson Varghese, Nan Wang, Dimitrios S. Nikolopoulos and Rajkumar Buyya; Feasibility of Fog Computing; arXiv:1701.05451v1 [cs.DC] ; 19Jan 2017.
[11] Pengfei Hu, SahraouiDhelim, Huansheng Ning and Tie Qiu; Survey on Fog Computing: Architecture, Key Technologies, Applications and Open Issues; ELSEVIER Journal of Network and Computer Applications 98 (2017); DOI: 10.1016/j.jnca.2017.09.002; September 12, 2017
[12] Chiang, Mung, and Tao Zhang. "Fog and IoT: An overview of research opportunities." IEEE Internet of Things Journal 3.6 (2016): 854-864.