Abstract

Internet of Things (IoT) aims to bring every object such as smart cameras, wearable devices, environmental sensors, home appliances, and vehicles online. These “Things” generate an unprecedented amount of data and transmit it to the cloud for long-term processing and because existing data processing or analytics approaches are designed to deal with massive data and not real-time data, having millions of “Things” generating and transferring data to the cloud is neither scalable nor suitable for real-time decision making. Therefore, the current infrastructure will not be able to handle the massive volume of data that will be generated by these devices, hence a new paradigm known as Fog Computing has been proposed. Fog computing extends the cloud platform model by providing computing resources at the edge of the network which results in better performance. However, researchers have raised challenges such as security and privacy, which arise from IoT-based Fog computing environments. Although technologies and solutions enabling connectivity and data delivery are growing rapidly, not enough attention has been given to the security of these computing paradigms and the associated IoT devices. Hence, this paper investigates and compare Fog Orchestrators that enable security in fog computing and further investigate the security techniques used in IoT-based Fog computing environments. This discussion shows that due to better performance brought by Fog Orchestrators, security and privacy models can be implemented in IoT-based fog environments.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.