{"title":"路线图:迈向安全挑战,雾计算的预防机制","authors":"M. Ashraf, Iqra Ilyas, Farzana Younas","doi":"10.1109/icecce47252.2019.8940776","DOIUrl":null,"url":null,"abstract":"Fog computing could be a fashionable paradigm of delicate computing that prolong cloud to the edge of networks and offers expert knowledge access, computational power, storage, and networking. Fog Computing helps to make low latency network connections between devices and their isolating finish points. Its design, in turn, shrinks the quantity of information measure required once associated to cloud. Additionally, Fog systems are moveable, and may be put in on numerous hardware. Because of dominating trend of wireless networking in fog, security could be a massive concern to fog computing. Due to the current attributes and architecture of fog computing many other security threats also arise. This study consists to investigate the current research work on Fog computing to spot mutual security holes. During this paper we have discussed security challenges in fog computing and existing strategies to address security challenge over FOG environment. Consequently, the promising models has been recommended with facts to address security issues in Fog. Computing.","PeriodicalId":111615,"journal":{"name":"2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Roadmap: Towards Security Challenges, Prevention Mechanisms for Fog Computing\",\"authors\":\"M. Ashraf, Iqra Ilyas, Farzana Younas\",\"doi\":\"10.1109/icecce47252.2019.8940776\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fog computing could be a fashionable paradigm of delicate computing that prolong cloud to the edge of networks and offers expert knowledge access, computational power, storage, and networking. Fog Computing helps to make low latency network connections between devices and their isolating finish points. Its design, in turn, shrinks the quantity of information measure required once associated to cloud. Additionally, Fog systems are moveable, and may be put in on numerous hardware. Because of dominating trend of wireless networking in fog, security could be a massive concern to fog computing. Due to the current attributes and architecture of fog computing many other security threats also arise. This study consists to investigate the current research work on Fog computing to spot mutual security holes. During this paper we have discussed security challenges in fog computing and existing strategies to address security challenge over FOG environment. Consequently, the promising models has been recommended with facts to address security issues in Fog. Computing.\",\"PeriodicalId\":111615,\"journal\":{\"name\":\"2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)\",\"volume\":\"133 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icecce47252.2019.8940776\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icecce47252.2019.8940776","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Roadmap: Towards Security Challenges, Prevention Mechanisms for Fog Computing
Fog computing could be a fashionable paradigm of delicate computing that prolong cloud to the edge of networks and offers expert knowledge access, computational power, storage, and networking. Fog Computing helps to make low latency network connections between devices and their isolating finish points. Its design, in turn, shrinks the quantity of information measure required once associated to cloud. Additionally, Fog systems are moveable, and may be put in on numerous hardware. Because of dominating trend of wireless networking in fog, security could be a massive concern to fog computing. Due to the current attributes and architecture of fog computing many other security threats also arise. This study consists to investigate the current research work on Fog computing to spot mutual security holes. During this paper we have discussed security challenges in fog computing and existing strategies to address security challenge over FOG environment. Consequently, the promising models has been recommended with facts to address security issues in Fog. Computing.