Affiliation:
1. Ramaiah Institute of Technology, India
2. Chaudhary Brahm Prakash Government Engineering College, India
3. M. S. Ramaiah Institute of Technology, India
Abstract
Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to end-users. In this chapter, the authors discuss the security and privacy issues concerned with fog computing. The issues present in cloud are also inherited by fog computing, but the same methods available for cloud computing are not applicable to fog computing due to its decentralized nature. The authors also discuss a few real-time applications like healthcare systems, intelligent food traceability, surveillance video stream processing, collection, and pre-processing of speech data. Finally, the concept of decoy technique and intrusion detection and prevention technique is covered.
Reference30 articles.
1. Mobile Edge Computing: Opportunities, solutions, and challenges
2. Alliance, C. S. (2016). The Treacherous 12 Cloud Computing Top Threats in 2016. Retrieved from https://downloads.cloudsecurityalliance.org/assets/ research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats. pdf
3. Fog Computing: A Platform for Internet of Things and Analytics
4. Fog computing and its role in the internet of things
5. Bonomi, Milito, Zhu, & Addepalli. (n.d.). Fog Computing and Its Role in the Internet of Things. Cisco Systems Inc.