FOG COMPUTING BASED SECURITY OF IoT APPLICATION
Abstract
As fog computing reduces data offloading to the Cloud, resulting in a faster reaction time. Despite these advantages, fog computing has many difficulties when it comes to fulfilling security and privacy standards. These difficulties arise as a result of the resource constraints associated with Fog computing. Indeed, fog computing may exacerbate existing concerns about security and confidentiality. Although many publications have lately explored Fog security and privacy concerns, most of these studies addressed these problems at a fairly high level. This article offers an in-depth examination of the privacy and security concerns surrounding Fog. We conduct a study of fog computing literature to determine the security and confidentiality concerns presented by fog computing.