FOG COMPUTING BASED SECURITY OF IoT APPLICATION

  • Dr. Manoj L.Bangare, Dr. Pushpa M. Bangare, Dr. Ravindra S. Apare, Dr. Sunil L. Bangare
Keywords: IoT, Security, Privacy, Fog

Abstract

As fog computing reduces data offloading to the Cloud, resulting in a faster reaction time. Despite these advantages, fog computing has many difficulties when it comes to fulfilling security and privacy standards. These difficulties arise as a result of the resource constraints associated with Fog computing. Indeed, fog computing may exacerbate existing concerns about security and confidentiality. Although many publications have lately explored Fog security and privacy concerns, most of these studies addressed these problems at a fairly high level. This article offers an in-depth examination of the privacy and security concerns surrounding Fog. We conduct a study of fog computing literature to determine the security and confidentiality concerns presented by fog computing.

Published
2021-08-08
How to Cite
Dr. Ravindra S. Apare, Dr. Sunil L. Bangare, D. M. L. D. P. M. B. (2021). FOG COMPUTING BASED SECURITY OF IoT APPLICATION. Design Engineering, 7542-7549. Retrieved from http://thedesignengineering.com/index.php/DE/article/view/3262
Section
Articles