Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Security challenges in fog-computing environment: a systematic appraisal of current developments

Security challenges in fog-computing environment: a systematic appraisal of current developments Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Journal of Reliable Intelligent Environments Springer Journals

Security challenges in fog-computing environment: a systematic appraisal of current developments

Loading next page...
 
/lp/springer-journals/security-challenges-in-fog-computing-environment-a-systematic-RXfcuGQvX0
Publisher
Springer Journals
Copyright
Copyright © 2019 by Springer Nature Switzerland AG
Subject
Computer Science; Performance and Reliability; Software Engineering/Programming and Operating Systems; Artificial Intelligence; Simulation and Modeling ; User Interfaces and Human Computer Interaction; Health Informatics
ISSN
2199-4668
eISSN
2199-4676
DOI
10.1007/s40860-019-00081-2
Publisher site
See Article on Publisher Site

Abstract

Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.

Journal

Journal of Reliable Intelligent EnvironmentsSpringer Journals

Published: May 3, 2019

References