Security analysis of fog computing environment for ensuring the security and privacy of information
In fog computing, the management, measurement, configuration, control, communication, and storage tasks are carried out collaboratively by one or more near‐user or end users. Fog computing is widely utilized in major application domains like centralized fog utilized in a shopping complex (UXFog), ag...
Gespeichert in:
Veröffentlicht in: | Transactions on emerging telecommunications technologies 2023-10, Vol.34 (10) |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In fog computing, the management, measurement, configuration, control, communication, and storage tasks are carried out collaboratively by one or more near‐user or end users. Fog computing is widely utilized in major application domains like centralized fog utilized in a shopping complex (UXFog), agriculture domain (FoAgro), health‐care domain (MediFog), vehicle parking system, and energy Lattices. The execution of fog computing at the system's edge provides the elevated quality of service (QoS), promotes area mindfulness, and minimal dormancy for the continuous and online streaming application areas. Fog networking is extremely concerned about wireless system security due to the prevalence of wireless communication in fog computing. Sniffer attacks, Jamming assaults, and several other intrusions are considered examples of security issues. While considering network storage issues, factors like interaction management, dynamic workload, and low dormancy are the most challenging aspects of designing the network model. Thus, privacy and security issues are crucial while designing the network model, accomplished through intrusion detection, access control and authentication methods. Therefore, the security analysis of fog computing based on authentication, access control and intrusion detection mechanisms are analyzed in this research to design a novel technique with enhanced security and privacy features for sharing and accessing information. |
---|---|
ISSN: | 2161-3915 2161-3915 |
DOI: | 10.1002/ett.4861 |