14Security and Privacy Issues and Solutions for Fog

Mithun Mukherjee1, Mohamed Amine Ferrag2, Leandros Maglaras3, Abdelouahid Derhab4, and Mohammad Aazam5

1Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis, Guangdong University of Petrochemical Technology, Maoming, China

2LabSTIC Laboratory, Department of Computer Science, Guelma University, Guelma, Algeria

3School of Computer Science and Informatics, Cyber Technology Institute, De Montfort University, Leicester, UK

4Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia

5Carnegie Mellon University, USA

14.1 Introduction

With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unprecedented rate. International Data Corporation expected that sensor‐enabled objects connected to network will rise to 30 billion by 2020 and the number of connected devices will increase ranging from 50 billion to 1 trillion consisting of 500 million sensors in US factories, 212 billion available sensors, 110 million connected cars with 5.5 billion sensors, 1.2 million connected homes with 200 million sensors [1]. To meet the massive amount of data processing, cloud computing [24] is viewed as an attractive choice while providing a cost‐effective solution with enough storage and computing resources in cloud data centers.

14.1.1 Major Limitations in Traditional Cloud Computing

Cloud computing ...

Get Fog and Fogonomics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.