Toggle Main Menu Toggle Search

Open Access padlockePrints

Fog Computing Security Challenges and Future Directions [Energy and Security]

Lookup NU author(s): Dr Deepak Puthal, Dr Graham Morgan, Professor Raj Ranjan

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

© 2012 IEEE. The perception of fog computing is to bring a virtual presence into day-to-day objects. The lowest layer of the fog architecture is the Internet of Things (IoT), which created a revolution by changing ordinary objects into smart objects that automatically sense and process data. In the IoT, smart objects connected over the Internet communicate with each other and exchange data with the fog server to improve services to customers. There are some challenges to achieving the benefits of the IoT. This article discusses a three-layered fog architecture and highlights potential security threats and solutions at each layer. Finally, open research issues are discussed at all three layers of the fog hierarchy.


Publication metadata

Author(s): Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R

Publication type: Article

Publication status: Published

Journal: IEEE Consumer Electronics Magazine

Year: 2019

Volume: 8

Issue: 3

Pages: 92-96

Print publication date: 01/05/2019

Online publication date: 11/04/2019

Acceptance date: 02/04/2019

ISSN (print): 2162-2248

ISSN (electronic): 2162-2256

Publisher: IEEE

URL: https://doi.org/10.1109/MCE.2019.2893674

DOI: 10.1109/MCE.2019.2893674


Altmetrics

Altmetrics provided by Altmetric


Actions

Find at Newcastle University icon    Link to this publication


Share