Fog computing, applications , security and challenges, review
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet o...
Main Authors: | Rahman, Gohar, Chai, Chuah Wen |
---|---|
Format: | Article |
Published: |
Science Publishing Corporation (SPC)
2018
|
Subjects: |
Similar Items
-
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
by: Rahman, Gohar
Published: (2023) -
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
by: Rahman, Gohar
Published: (2023) -
RtFog: A real-time FPGA-based fog node with remote dynamically reconfigurable application plane for fog analytics redeployment
by: Tan, Tze Hon, et al.
Published: (2022) -
An FPGA-based IP core subscription-oriented fog computing platform
by: Tan, Tze Hon, et al.
Published: (2022) -
Fog computing security: a review of current applications and security solutions
by: Saad Khan, et al.
Published: (2017-08-01)