Loading…

Security Architecture and Its Methodology for Fog Computing

With the rise of Internet of Things (IoT) based applications, cloud computing faced lots of challenges like bandwidth limitation and latency in real time applications. Therefore, fog computing came into existence. It is not a replacement of cloud computing but complements it. The services of fog com...

Full description

Saved in:
Bibliographic Details
Published in:ECS transactions 2022-04, Vol.107 (1), p.4549-4562
Main Authors: ., Shruti, Babbar, Himanshi, Rani, Shalli
Format: Article
Language:English
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With the rise of Internet of Things (IoT) based applications, cloud computing faced lots of challenges like bandwidth limitation and latency in real time applications. Therefore, fog computing came into existence. It is not a replacement of cloud computing but complements it. The services of fog computing are extended to the edge of the network making communication fast and secure. On the other hand, Software Defined Network (SDN) is also discussed, which is helpful in providing network virtualization. In this paper, study about fog computing and SDN, their characteristics, architecture, applications, key technologies of fog computing are over-viewed, and how fog computing in collaboration with these technologies will be deployed in different applications and areas. Along with it, security of fog computing and a methodology to secure a fog computing environment is proposed.
ISSN:1938-5862
1938-6737
DOI:10.1149/10701.4549ecst