Confidentiality and Safekeeping Problems and Techniques in Fog Computing

Confidentiality and Safekeeping Problems and Techniques in Fog Computing

Nida Kauser Khanum, Pankaj Lathar, G. M. Siddesh
Copyright: © 2019 |Pages: 24
DOI: 10.4018/978-1-5225-6070-8.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to end-users. In this chapter, the authors discuss the security and privacy issues concerned with fog computing. The issues present in cloud are also inherited by fog computing, but the same methods available for cloud computing are not applicable to fog computing due to its decentralized nature. The authors also discuss a few real-time applications like healthcare systems, intelligent food traceability, surveillance video stream processing, collection, and pre-processing of speech data. Finally, the concept of decoy technique and intrusion detection and prevention technique is covered.
Chapter Preview
Top

Architecture Of Fog Computing

Fog computing has a very basic and simple architecture that consists of three tiers (Sarkar, Chatterjee & Misra, forthcoming). Figure 1 shows the architecture and components included in fog computing. This architecture is widely used and each of the tiers are discussed below:

Complete Chapter List

Search this Book:
Reset