Fog computing, applications , security and challenges, review
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet o...
Saved in:
Main Authors: | Rahman, Gohar, Chai, Chuah Wen |
---|---|
Format: | Article |
Published: |
Science Publishing Corporation (SPC)
2018
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/4270/ https://doi.org/10.14419/ijet.v7i3.12612 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
by: Rahman, Gohar
Published: (2023) -
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
by: Rahman, Gohar
Published: (2023) -
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018) -
A review of fog computing and machine learning: Concepts, applications, challenges, and open issues
by: Abdulkareem, K.H., et al.
Published: (2020) -
Blockchain technology as a Fog computing security and privacy solution: An overview
by: Alzoubi, Yehia Ibrahim, et al.
Published: (2022)