An Overview of Fog Computing and Edge Computing Security and Privacy Issues
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud c...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-12-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/24/8226 |
_version_ | 1797500841797615616 |
---|---|
author | Ahmed M. Alwakeel |
author_facet | Ahmed M. Alwakeel |
author_sort | Ahmed M. Alwakeel |
collection | DOAJ |
description | With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues. |
first_indexed | 2024-03-10T03:09:39Z |
format | Article |
id | doaj.art-63e1bacc9ea649b4b0ffac33d12c4f74 |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-10T03:09:39Z |
publishDate | 2021-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-63e1bacc9ea649b4b0ffac33d12c4f742023-11-23T10:28:29ZengMDPI AGSensors1424-82202021-12-012124822610.3390/s21248226An Overview of Fog Computing and Edge Computing Security and Privacy IssuesAhmed M. Alwakeel0Sensor Network and Cellular Systems Research Center, University of Tabuk, Tabuk 71491, Saudi ArabiaWith the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues.https://www.mdpi.com/1424-8220/21/24/8226cloud computingfog computingedge computingcloud securityfog securityIoT |
spellingShingle | Ahmed M. Alwakeel An Overview of Fog Computing and Edge Computing Security and Privacy Issues Sensors cloud computing fog computing edge computing cloud security fog security IoT |
title | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_full | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_fullStr | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_full_unstemmed | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_short | An Overview of Fog Computing and Edge Computing Security and Privacy Issues |
title_sort | overview of fog computing and edge computing security and privacy issues |
topic | cloud computing fog computing edge computing cloud security fog security IoT |
url | https://www.mdpi.com/1424-8220/21/24/8226 |
work_keys_str_mv | AT ahmedmalwakeel anoverviewoffogcomputingandedgecomputingsecurityandprivacyissues AT ahmedmalwakeel overviewoffogcomputingandedgecomputingsecurityandprivacyissues |