Due to technology problems with cloud computing and it is unable to fulfill real-time application... more Due to technology problems with cloud computing and it is unable to fulfill real-time applications requirements such as (low latency, performance, and mobility support) and limited storage and computational power with Internet of Things (IoT) devices, Cisco company proposed a new concept call "Fog computing" or "Fog networking" that extend cloud computing to satisfy customer's needs.. However, fog computing faces some security challenges that inherited from cloud computing in addition to new issues that discovered with using fog services. These security issues need to be addressed with practical solutions to provide successful implementation of Fog System. Information technology Researchers and specialist organizations have proposed many solutions to protect systems from malicious activities like inside and outside network attacks. This paper will provide an overview of existing literature on Fog computing to identify common security threats, the impact of risks on the system, what are the current solutions and the effectiveness of solutions. This paper may help to provide a guide for expert concern on designing, developing, and maintaining Fog systems. I. INTRODUCTION Fog Computing is a new technology introduced by Cisco Company in 2014 to extend cloud computing services at the edge of the network. Fog computing aims to reduce latency and improve the efficiency of the network. It facilitates computing, networking and storage services between end-user devices and cloud computing data centres. Due to the fast-growing number of smart devices and applications that connected to cloud computing and consume its services, the new concept called the Internet of Things (IoT) come up to provide more advantages. With the Internet of Things technology, data can be handled efficiently rather than send them to cloud services. In simple words, fog IoT applications will make a smart decision to send data to the best place for processing. If the data is real-time and highly sensitive and need to process as fast as possible, it will send to the nearest fog node (The fog nodes will take different shape such as a router, gateway, switch, and Access Points These fog nodes can collaboratively share storage and computing facilities [1].).But if it can wait for a couple of minutes, it will send to set of fog nodes or cloud for best data analytics.
Due to technology problems with cloud computing and it is unable to fulfill real-time application... more Due to technology problems with cloud computing and it is unable to fulfill real-time applications requirements such as (low latency, performance, and mobility support) and limited storage and computational power with Internet of Things (IoT) devices, Cisco company proposed a new concept call "Fog computing" or "Fog networking" that extend cloud computing to satisfy customer's needs.. However, fog computing faces some security challenges that inherited from cloud computing in addition to new issues that discovered with using fog services. These security issues need to be addressed with practical solutions to provide successful implementation of Fog System. Information technology Researchers and specialist organizations have proposed many solutions to protect systems from malicious activities like inside and outside network attacks. This paper will provide an overview of existing literature on Fog computing to identify common security threats, the impact of risks on the system, what are the current solutions and the effectiveness of solutions. This paper may help to provide a guide for expert concern on designing, developing, and maintaining Fog systems. I. INTRODUCTION Fog Computing is a new technology introduced by Cisco Company in 2014 to extend cloud computing services at the edge of the network. Fog computing aims to reduce latency and improve the efficiency of the network. It facilitates computing, networking and storage services between end-user devices and cloud computing data centres. Due to the fast-growing number of smart devices and applications that connected to cloud computing and consume its services, the new concept called the Internet of Things (IoT) come up to provide more advantages. With the Internet of Things technology, data can be handled efficiently rather than send them to cloud services. In simple words, fog IoT applications will make a smart decision to send data to the best place for processing. If the data is real-time and highly sensitive and need to process as fast as possible, it will send to the nearest fog node (The fog nodes will take different shape such as a router, gateway, switch, and Access Points These fog nodes can collaboratively share storage and computing facilities [1].).But if it can wait for a couple of minutes, it will send to set of fog nodes or cloud for best data analytics.
Uploads
IRJCS Published Papers by Neda Bugshan