CHAPTER 4FOG COMPUTING AND ITS SECURITY ISSUES
JYOTIR MOY CHATTERJEE1, ISHAANI PRIYADARSHINI2, SHANKEYS3, AND DAC-NHUONG LE4
1Department of IT, LBEF, Kathmandu, Nepal
2Ishaani Priyadarshini, Newark
3National Institute of Technology, Raipur
4Haiphong University, Haiphong, Vietnam
Email: {jyotirm4@gmail.com, ishaanidisha@gmail.com, shankeygarg1793@gmail.com}, nhuongld@dhhp.edu.vn
Abstract
Fog computing is architecture that expands the cloud framework by providing computing utilities on the edges of a system. It very well may be portrayed as a cloud-like architecture having comparable information, calculation, archives and application administrations, however is generally diverse in that it’s distributed. Likewise, fog systems (fit for processing a lot of information locally) are completely compact, and can be installed on heterogeneous equipment. These highlights make the fog framework profoundly appropriate for time and area delicate applications. For instance, Internet of Things gadgets are required to rapidly process a lot of information. This extensive variety of usefulness-driven applications intensifies numerous security issues regarding information, virtualization, isolation, organization, malware and monitoring. Like Cloud, Fog gives information, process, archiving and application administrations to end clients. In this chapter, we expand the inspiration and points of interest of fog computing and examine its applications in a progression of genuine situations, such as ...
Get Security Designs for the Cloud, IoT, and Social Networking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.