A Survey on Security Issues and Attacks of Fog Computing

Abstract

There is a link between the cloud and the Internet of Things (IoT). The layer that makes up the dispersed network environment is exactly what it is. Cloud computing is brought out to the edge of the network through the type of networking topology referred as fog computing. Users can benefit greatly from fog computing. Fog's primary role, similar to cloud computing, is to allow people mobility. Fog computing is becoming more and more popular, whereas at the same time, security dangers are growing every day. Users' identification & verification are crucial. The fact of fog computing cannot effectively utilize the security and privacy solutions provided by cloud computing must be emphasized. The risks, issues, and solutions linked to security in fog computing are outlined throughout this study. The poll then includes information on ongoing research projects as well as open security and safety concerns for fog computing

    Similar works