The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Confidentiality and Safekeeping Problems and Techniques in Fog Computing
Abstract
Fog computing is an extension of cloud computing, and it is one of the most important architypes in the current world. Fog computing is like cloud computing as it provides data storage, computation, processing, and application services to end-users. In this chapter, the authors discuss the security and privacy issues concerned with fog computing. The issues present in cloud are also inherited by fog computing, but the same methods available for cloud computing are not applicable to fog computing due to its decentralized nature. The authors also discuss a few real-time applications like healthcare systems, intelligent food traceability, surveillance video stream processing, collection, and pre-processing of speech data. Finally, the concept of decoy technique and intrusion detection and prevention technique is covered.
Related Content
Sushruta Mishra, Sunil Kumar Mohapatra, Brojo Kishore Mishra, Soumya Sahoo.
© 2021.
24 pages.
|
Carlos Santos, Helena InĂ¡cio, Rui Pedro Marques.
© 2021.
16 pages.
|
Akash Chowdhury, Swastik Mukherjee, Sourav Banerjee.
© 2021.
26 pages.
|
Stojan Kitanov, Toni Janevski.
© 2021.
28 pages.
|
Ramesh C. Poonia, Linesh Raja.
© 2021.
27 pages.
|
Jens Kohler, Thomas Specht.
© 2021.
27 pages.
|
Jagdish Chandra Patni.
© 2021.
15 pages.
|
|
|