An Overview on the Applications and Security Issues of Fog Computing

被引:1
|
作者
Bi, Fangming [1 ]
Miao, Xuzhi [1 ]
Chen, Wei [1 ,2 ]
Fang, Weidong [1 ,2 ]
Zhang, Wuxiong [1 ,2 ]
Wang, Deyu [1 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Shanghai 200000, Peoples R China
基金
中国博士后科学基金;
关键词
fog computing; internet of things; distributed systems; security; BIG DATA; CLOUD; INTERNET; 5G; COMMUNICATION; ARCHITECTURE; FRAMEWORK; PRIVACY;
D O I
10.1109/Cybermatics_2018.2018.00298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing extends cloud computing paradigms to the edge of the network, enabling a new generation of applications and services. This paper mainly elaborates the related background and characteristics of fog computing, discusses the concept and hierarchical structure of fog computing services, compares the advantages of cloud computing and fog computing, analyzes the existing techniques and applications of fog computing, and analyzes possible security issues in fog computing and solutions to some of the security issues.
引用
收藏
页码:1792 / 1797
页数:6
相关论文
共 50 条
  • [1] Fog Computing: Overview, Architecture, Security Issues and Applications
    Dasari, Kishore
    Rayaprolu, Mounika
    [J]. ICCCE 2018, 2019, 500 : 11 - 18
  • [2] An Overview of Security Issues in Fog Computing
    Luqman, Mohammad
    Faridi, Arman Rasool
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1157 - 1162
  • [3] An overview of Fog computing and its security issues
    Stojmenovic, Ivan
    Wen, Sheng
    Huang, Xinyi
    Luan, Hao
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2991 - 3005
  • [4] An Overview of Fog Computing and Edge Computing Security and Privacy Issues
    Alwakeel, Ahmed M.
    [J]. SENSORS, 2021, 21 (24)
  • [5] Security Issues With Fog Computing
    Miatra, Ayati
    Kumar, Sumit
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 123 - 128
  • [6] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [7] An overview of cloud-fog computing: Architectures, applications with security challenges
    Kunal, Sourav
    Saha, Arijit
    Amin, Ruhul
    [J]. SECURITY AND PRIVACY, 2019, 2 (04):
  • [8] Concepts, issues, and applications of fog computing
    雾计算的概念, 相关研究与应用
    [J]. Jia, Weijia (jiawj@sjtu.edu.cn), 2018, Editorial Board of Journal on Communications (39):
  • [9] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [10] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59