Security and protection in fog computing
A review
Keywords:
internet of things, fog computing, cloud computing, privacy, securityAbstract
Rapid innovations in the fields of cloud computing in mobile phones, cloudlets, etc and fog and edge computing are a reason why IoT (Internet of Things) devices have seen a rapid surge. There are several limitations in the cloud computing paradigm such as bandwidth, location awareness, latency, constraints of resources and several other factors. To address these challenges, the term "fog computing" was coined. Here we discuss the layout and structure of fog paradigm which is followed by broadly analysing the characteristics of fog computing structure. Finally the paper is concluded by discussing security challenges and solutions in fog computing.
Downloads
References
Abbasi, B. Z., & Shah, M. A. (2017). Fog Computing: Security Issues, Solutions and Robust Practices. Research Gate, 1–8.
Abdalla, P. A., & Varol, A. (2019). Advantages to Disadvantages of Cloud Computing for Small-Sized Business. IEEE, 1–7.
Ádám Mann, Z. (2020). Notions of architecture in fog computing. Computing Springer, 51–73.
Adel, A. (2020). Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective. Journal of Big Data, 7, 1–29.
Alzoubi, Y. I., Osmanaj, V. H., Jaradat, A., & Al-Ahmad, A. (2020). Fog computing security and privacy for the Internet of Thing applications: State-of-the-art. Wiley, 1–26.
Arya, D. E. E. K. S. H. A., & Dave, M. A. Y. A. N. K. (N.D.). Security-Based Service Broker Policy For Fog Computing Environment. 8TH ICCCNT, 1–6.
Ashi , Z., Al-Fawa'reh, M., & Al-Fayoumi, M. (2020). Fog Computing: Security Challenges and Countermeasures. International Journal of Computer Applications , 175(115), 601–628.
Bousselham, M., Addaim, A., & Benamar, N. (2019). A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System. IEEE, 1–4.
Choudhary, A. kumar, & Rahamatkar, S. (2020). An Overview of Fog Computing: Architectures, Applications with Security Challenges. High Technology Letters, 26(10), 971–992.
Dang, T. D., & Hoang, D. (2017). A data protection model for fog computing . Second International Conference on Fog and Mobile Edge Computing (FMEC), 32–38.
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. (2021). International Journal of Electrical and Computer Engineering (IJECE), 11(6), 5081–5088.
H, S., & V, N. (2021). A Review on Fog Computing: Architecture, Fog with IoT, Algorithms and Research Challenges. ScienceDirect, 7, 162– 176.
Iorga, M., & Goren, N. (2018). Fog Computing Conceptual Model .NIST SP 500-325 , 1–14.
Kumar Singh, J., & kumar Goel, A. (2021). Study on fog computing: security & privacy challenges in terms of IoT. Journal of Physics: Conference Series, 1–11.
Lisbon, A., & Kavitha. (n.d.). A Study on Cloud and Fog Computing Security Issues and Solutions. International Journal of Innovative Research in Advanced Engineering (IJIRAE), 4(3), 17–22.
M J, E., Jose, J., & Jose, D. (2019). A Fog Based Security Model For Electronic Medical Records In the Cloud Database. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(7), 2552–2560.
M. Alwakeel, A. (2021). An Overview of Fog Computing and Edge Computing Security and Privacy Issues. SENSORS, 21, 1–20.
Parikh, S., Dave, D., & Patel, R. (2019). Security and Privacy Issues in Cloud, Fog and Edge Computing. ELSEVIER, 160, 734–739.
Patwary, A. A.-N., Fu, A., & Naha, R. K. (2020). Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review. IEEE, 10, 1–34.
Puthal, D., Mohanty, S. P., & Bhavake, S. A. (2019). Fog Computing Security Challenges and Future Directions. IEEE Consumer Electronics Magazine, 1–8.
R, R., & Kumar, R. A. (n.d.). Possible Solutions on Security and Privacy Issues in Fog Computing. Institute of Scholars, 234–240.
Rahman , G., & Wen, C. C. (2018). Fog Computing, Applications , Security and Challenges, Review. International Journal of Engineering & Technology, 7(3), 1615–1621.
Rahman, G., & Wen, C. C. (2018). Fog Computing, Applications , Security and Challenges, Review. International Journal of Engineering & Technology, 7(3), 1615–1621.
Rahul , S., & Aron, R. (2021). Fog Computing Architecture, Application and Resource Allocation: A Review.Workshop on Computer Networks & Communications, 31–42.
Romana, R., Lopeza, J., & Mambob, M. (2018). Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Generation Computer Systems, 78, 680–698.
Roy, S. H. L. O. K., & JIYANI, A. N. K. I. T. A. (2018). Security and Privacy Issues of FOG Computing: A Survey. IRE Journals, 1(9), 107–109.
Saad, M. (2018). Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues . International Journal of Computer Applications, 180(32), 7–9.
Sharma, N., & Prabha, C. (2021). Computing paradigms: An overview. 2021 Asian Conference on Innovation in Technology (ASIANCON), 1– 6.
Usha, G., Kannimuthu, S., & Karthikeyan, H. (2019). Augmentation and Orchestration of Security Techniques in Fog Computing. International Journal of Recent Technology and Engineering (IJRTE), 8(2S4), 143–148.
Verma, U., & Bhardwajb, D. (2018). Security Challenges for Fog Computing enabled Internet of Things from Authentication perspective. Proceedings of International Conference on Computational Intelligence & IoT (ICCIIoT), 382–387.
Yassein, M. B., Hmeidi, I., Shatnawi , F., & Rawasheh, S. (2020). Fog Computing: Characteristics, Challenges and Issues. International Conference on Mathematics and Computers in Science and Engineering (MACISE), 240–245.
Zhang, P., K. Liu, J., & Yu, F. R. (2018). A Survey on Access Control in Fog Computing. IEEE Communications Magazine , 144.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.