Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

Sensors (Basel). 2021 Dec 9;21(24):8226. doi: 10.3390/s21248226.

Abstract

With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues.

Keywords: IoT; cloud computing; cloud security; edge computing; fog computing; fog security; privacy of IoT.

MeSH terms

  • Cloud Computing*
  • Privacy*