- مبلغ: ۸۶,۰۰۰ تومان
- مبلغ: ۹۱,۰۰۰ تومان
Internet of Things (IoT) allows billions of physical objects to be connected to collect and exchange data for offering various applications, such as environmental monitoring, infrastructure management and home automation. On the other hand, IoT has unsupported features (e.g., low latency, location awareness and geographic distribution) that are critical for some IoT applications, including smart traffic lights, home energy management and augmented reality. To support these features, fog computing is integrated into IoT to extend computing, storage and networking resources to the network edge. Unfortunately, it is confronted with various security and privacy risks, which raise serious concerns towards users. In this survey, we review the architecture and features of fog computing and study critical roles of fog nodes, including real-time services, transient storage, data dissemination and decentralized computation. We also examine fog-assisted IoT applications based on different roles of fog nodes. Then, we present security and privacy threats towards IoT applications and discuss the security and privacy requirements in fog computing. Further, we demonstrate potential challenges to secure fog computing and review the state-of-the-art solutions used to address security and privacy issues in fog computing for IoT applications. Finally, by defining several open research issues, it is expected to draw more attention and efforts into this new architecture.
Fog computing is a new decentralized architecture that revolutionizes the cloud computing by extending storage, computing and networking resources to the network edge for supporting extremely large-scale IoT applications. However, it is also confronted with traditional security threats, which raise various new security and privacy challenges towards users. In this article, we have provided a comprehensive survey of securing fog computing for IoT applications. We have first reviewed the architecture and the features of fog computing. We have also discussed the roles of fog nodes in IoT applications, including real-time services, transient storage, data dissemination and decentralized computation, and examined several promising IoT applications according to different roles of fog nodes. We have presented the security and privacy threats in fog computing, including a series of security attacks and privacy exposure risks. Moveover, we have demonstrated the security and privacy challenges, reviewed the state-of-art solutions to secure fog computing in IoT applications, and showed our insights on the leaving problems to encourage further research on the security and privacy issues. Finally, we have identified several open research issues which should hold the most premise in terms of security and privacy issues in fog computing.