Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/8238
Full metadata record
DC FieldValueLanguage
dc.contributor.authorYakubu, Jimoh-
dc.contributor.authorAbdulhamid, Shafi’i Muhammad-
dc.contributor.authorChristopher, Haruna Atabo-
dc.contributor.authorChiroma, Haruna-
dc.contributor.authorAbdullahi, Mohammed-
dc.date.accessioned2021-07-10T17:15:07Z-
dc.date.available2021-07-10T17:15:07Z-
dc.date.issued2019-05-12-
dc.identifier.citationhttps://doi.org/10.1007/s40860-019-00081-2en_US
dc.identifier.issn2199-4668-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/8238-
dc.description.abstractFog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.en_US
dc.language.isoenen_US
dc.publisherJournal of Reliable Intelligent Environmentsen_US
dc.relation.ispartofseries5:209–233;-
dc.subjectFog computingen_US
dc.subjectEdge computingen_US
dc.subject· Fog-computing securityen_US
dc.subjectFog-computing taxonomyen_US
dc.subjectCloud computingen_US
dc.subjectCloud-computing securityen_US
dc.titleSecurity Challenges in Fog Computing Environment: A Systematic Appraisal of Current Developmentsen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
8.pdfSecurity challenges in fog‑computing environment: a systematic appraisal of current developments1.08 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.