Abstract
AbstractFog nodes are implemented near to end‐users Internet of Things (IoT) devices, which mitigate the impact of low latency, location awareness, and geographic distribution unsupported features of many IoT applications. Moreover, Fog computing decreases the data offload into the Cloud, which decreases the response time. Despite these benefits, Fog computing faces many challenges in meeting security and privacy requirements. These challenges occur due to the limitations of Fog computing resources. In fact, Fog computing may add new security and privacy issues. Although many papers have discussed the Fog security and privacy issues recently, most of these papers have discussed these issues at a very high level. This paper provides a comprehensive understanding of Fog privacy and security issue. In this survey, we review the literature on Fog computing to draw the state‐of‐the‐art of the security and privacy issues raised by Fog computing. The findings of this survey reveal that studying Fog computing is still in its infant stage. Many questions are yet to be answered to address the privacy and security challenges of Fog computing.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.