Cargando…
An Overview of Fog Computing and Edge Computing Security and Privacy Issues
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud c...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8708798/ https://www.ncbi.nlm.nih.gov/pubmed/34960320 http://dx.doi.org/10.3390/s21248226 |
_version_ | 1784622775862820864 |
---|---|
author | Alwakeel, Ahmed M. |
author_facet | Alwakeel, Ahmed M. |
author_sort | Alwakeel, Ahmed M. |
collection | PubMed |
description | With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues. |
format | Online Article Text |
id | pubmed-8708798 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87087982021-12-25 An Overview of Fog Computing and Edge Computing Security and Privacy Issues Alwakeel, Ahmed M. Sensors (Basel) Article With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues. MDPI 2021-12-09 /pmc/articles/PMC8708798/ /pubmed/34960320 http://dx.doi.org/10.3390/s21248226 Text en © 2021 by the author. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Alwakeel, Ahmed M. An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_full | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_fullStr | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_full_unstemmed | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_short | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_sort | overview of fog computing and edge computing security and privacy issues |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8708798/ https://www.ncbi.nlm.nih.gov/pubmed/34960320 http://dx.doi.org/10.3390/s21248226 |
work_keys_str_mv | AT alwakeelahmedm anoverviewoffogcomputingandedgecomputingsecurityandprivacyissues AT alwakeelahmedm overviewoffogcomputingandedgecomputingsecurityandprivacyissues |