This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.įog computing is a decentralized computing architecture whereby data is processed and stored between the source of origin and a cloud infrastructure. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. This paper surveys existing literature on Fog computing applications to identify common security gaps. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. These features make the Fog platform highly suitable for time and location-sensitive applications. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |