UTHM Institutional Repository

Fog computing, applications, security and challenges, review

Rahman, Gohar and Chuah, Chai Wen (2018) Fog computing, applications, security and challenges, review. International Journal of Engineering & Technology, 7 (3). pp. 1615-1621. ISSN 2227524X

[img] PDF

Download (434kB)


The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented.

Item Type: Article
Uncontrolled Keywords: Internet of things; cloud computing; fog computing; security
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Faculty of Computer Science and Information Technology > Department of Information Security
Depositing User: Mr. Mohammad Shaifulrip Ithnin
Date Deposited: 31 Jul 2019 00:59
Last Modified: 31 Jul 2019 00:59
URI: http://eprints.uthm.edu.my/id/eprint/11365
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item


Downloads per month over past year