About Security Solutions in Fog Computing
The key for improving a system's performance, its security and reliability is to have the dataprocessed locally in remote data centers. Fog computing extends cloud computing through itsservices to devices and users at the edge of the network. Through this paper it is explored the fogcomputing e...
Main Authors: | Eugen Petac, Andreea-Oana Petac |
---|---|
Format: | Article |
Language: | English |
Published: |
Ovidius University Press
2016-01-01
|
Series: | Ovidius University Annals: Economic Sciences Series |
Subjects: | |
Online Access: | http://stec.univ-ovidius.ro/html/anale/ENG/2016/2016-I-full/Section-IV/23.PETAC_Eugen_paper2.pdf |
Similar Items
-
Security and Privacy in Fog Computing: Challenges
by: Mithun Mukherjee, et al.
Published: (2017-01-01) -
Fog Computing : Architecture and Security aspects
by: Bozios, Athanasios
Published: (2018) -
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
by: Abdullah Al-Noman Patwary, et al.
Published: (2021-05-01) -
FoG-Oriented Secure and Lightweight Data Aggregation in IoMT
by: Muhammad Azeem, et al.
Published: (2021-01-01) -
Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions
by: Ranesh Kumar Naha, et al.
Published: (2018-01-01)