Research on Internet of Things security architecture based on fog computing

The traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. Fog computing is the infrastructure that can use process...

Full description

Bibliographic Details
Main Author: Trung Dong Mai
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2019-11-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147719888166
_version_ 1797765388707037184
author Trung Dong Mai
author_facet Trung Dong Mai
author_sort Trung Dong Mai
collection DOAJ
description The traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. Fog computing is the infrastructure that can use processing power anywhere in the cloud. Virtual computing extends the power of cloud computing to the edge of the network, enabling any computing device to host and process software services, analyzing and storing data closer to where data are generated. The architecture of the fog computing brings enormous processing power. Since its processing power is often located near the required equipment, the distance of data transmission is reduced and the delay is reduced. This article explores how to use the fog computing layer between the cloud data center and the end node layer to store and process large amounts of local data in a timely manner, speeding decision making and enabling Internet of Things manufacturers and software developers to limit their ability to send data. They reduced cloud computing costs and built a reasonable security architecture.
first_indexed 2024-03-12T20:09:27Z
format Article
id doaj.art-2d132eab4bd94b8d8e7c2ad21e903371
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T20:09:27Z
publishDate 2019-11-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-2d132eab4bd94b8d8e7c2ad21e9033712023-08-02T01:48:43ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-11-011510.1177/1550147719888166Research on Internet of Things security architecture based on fog computingTrung Dong MaiThe traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. Fog computing is the infrastructure that can use processing power anywhere in the cloud. Virtual computing extends the power of cloud computing to the edge of the network, enabling any computing device to host and process software services, analyzing and storing data closer to where data are generated. The architecture of the fog computing brings enormous processing power. Since its processing power is often located near the required equipment, the distance of data transmission is reduced and the delay is reduced. This article explores how to use the fog computing layer between the cloud data center and the end node layer to store and process large amounts of local data in a timely manner, speeding decision making and enabling Internet of Things manufacturers and software developers to limit their ability to send data. They reduced cloud computing costs and built a reasonable security architecture.https://doi.org/10.1177/1550147719888166
spellingShingle Trung Dong Mai
Research on Internet of Things security architecture based on fog computing
International Journal of Distributed Sensor Networks
title Research on Internet of Things security architecture based on fog computing
title_full Research on Internet of Things security architecture based on fog computing
title_fullStr Research on Internet of Things security architecture based on fog computing
title_full_unstemmed Research on Internet of Things security architecture based on fog computing
title_short Research on Internet of Things security architecture based on fog computing
title_sort research on internet of things security architecture based on fog computing
url https://doi.org/10.1177/1550147719888166
work_keys_str_mv AT trungdongmai researchoninternetofthingssecurityarchitecturebasedonfogcomputing