Fog computing, applications , security and challenges, review

The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet o...

Full description

Saved in:
Bibliographic Details
Main Authors: Rahman, Gohar, Chai, Chuah Wen
Format: Article
Published: Science Publishing Corporation (SPC) 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/4270/
https://doi.org/10.14419/ijet.v7i3.12612
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uthm.eprints.4270
record_format eprints
spelling my.uthm.eprints.42702021-12-01T08:35:27Z http://eprints.uthm.edu.my/4270/ Fog computing, applications , security and challenges, review Rahman, Gohar Chai, Chuah Wen T Technology (General) The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented. Science Publishing Corporation (SPC) 2018 Article PeerReviewed Rahman, Gohar and Chai, Chuah Wen (2018) Fog computing, applications , security and challenges, review. International Journal of Engineering & Technology, 7 (3). pp. 1615-1621. ISSN 2227-524X https://doi.org/10.14419/ijet.v7i3.12612
institution Universiti Tun Hussein Onn Malaysia
building UTHM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tun Hussein Onn Malaysia
content_source UTHM Institutional Repository
url_provider http://eprints.uthm.edu.my/
topic T Technology (General)
spellingShingle T Technology (General)
Rahman, Gohar
Chai, Chuah Wen
Fog computing, applications , security and challenges, review
description The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented.
format Article
author Rahman, Gohar
Chai, Chuah Wen
author_facet Rahman, Gohar
Chai, Chuah Wen
author_sort Rahman, Gohar
title Fog computing, applications , security and challenges, review
title_short Fog computing, applications , security and challenges, review
title_full Fog computing, applications , security and challenges, review
title_fullStr Fog computing, applications , security and challenges, review
title_full_unstemmed Fog computing, applications , security and challenges, review
title_sort fog computing, applications , security and challenges, review
publisher Science Publishing Corporation (SPC)
publishDate 2018
url http://eprints.uthm.edu.my/4270/
https://doi.org/10.14419/ijet.v7i3.12612
_version_ 1738581229391839232
score 13.160551