14Security and Privacy Issues and Solutions for Fog
Mithun Mukherjee1, Mohamed Amine Ferrag2, Leandros Maglaras3, Abdelouahid Derhab4, and Mohammad Aazam5
1Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis, Guangdong University of Petrochemical Technology, Maoming, China
2LabSTIC Laboratory, Department of Computer Science, Guelma University, Guelma, Algeria
3School of Computer Science and Informatics, Cyber Technology Institute, De Montfort University, Leicester, UK
4Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia
5Carnegie Mellon University, USA
14.1 Introduction
With the advancement in computing and wireless technologies, the world has witnessed a growing number of connected devices to the Internet at an unprecedented rate. International Data Corporation expected that sensor‐enabled objects connected to network will rise to 30 billion by 2020 and the number of connected devices will increase ranging from 50 billion to 1 trillion consisting of 500 million sensors in US factories, 212 billion available sensors, 110 million connected cars with 5.5 billion sensors, 1.2 million connected homes with 200 million sensors [1]. To meet the massive amount of data processing, cloud computing [2–4] is viewed as an attractive choice while providing a cost‐effective solution with enough storage and computing resources in cloud data centers.
14.1.1 Major Limitations in Traditional Cloud Computing
Cloud computing ...
Get Fog and Fogonomics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.