Security and Privacy Issues of Fog Computing 


Vol. 42,  No. 1, pp. 257-267, Jan.  2017


PDF
  Abstract

With the development of IoT (Internet of Things) technology, the application area has been diversified and the number of users using this service also has increased greatly. Real time big data generated by many IoT devices is no longer suitable for processing in a cloud computing environment. To solve this issue, fog computing is suggested which minimizes response time and makes real time processing suitable. However, security requirement for new paradigm called fog computing is not established until now. In this paper, we define models for fog computing, and the security requirements for the defined model.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. Nam, H. Choi, H. Shin, H. Kwon, J. Jeong, C. Hahn, J. Hur, "Security and Privacy Issues of Fog Computing," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 257-267, 2017. DOI: .

[ACM Style]

Hyun-Jae Nam, Ho-Yeol Choi, Hyung-June Shin, Hyun-Soo Kwon, Jong-Min Jeong, Chang-Hee Hahn, and Jun-Beom Hur. 2017. Security and Privacy Issues of Fog Computing. The Journal of Korean Institute of Communications and Information Sciences, 42, 1, (2017), 257-267. DOI: .

[KICS Style]

Hyun-Jae Nam, Ho-Yeol Choi, Hyung-June Shin, Hyun-Soo Kwon, Jong-Min Jeong, Chang-Hee Hahn, Jun-Beom Hur, "Security and Privacy Issues of Fog Computing," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 257-267, 1. 2017.