A REVIEW OF THREATS, ATTACKS AND SECURITY COUNTERMEASURES IN FOG COMPUTING

Not scheduled
15m
Abstract for Research Paper Information Security

Description

Abstract
The world currently is experiencing an upsurge growth in the number of devices that are connected to the internet. This development is being referred to as Internet of Things (IoT). This phenomenon has presented new challenges to the already existing cloud infrastructure and in turn led to development of an inter-mediating paradigm called Fog Computing. Fog computing as a subset of IoT is being used to improve on the challenges faced by the cloud computing infrastructure especially when it comes to latency and real-time feedback of processed data. Several research have been done addressing the issue of privacy in Fog Computing but few have tackled the specific threats, attacks and security countermeasures facing Fog Computing. Therefore, this paper addresses the threats, attacks and security measures related with Fog Computing. The methodology opted for this paper is a review of papers with keywords IoT, Fog Computing, Threats, attacks and solutions or countermeasures. The aim of this paper is to critically review the studies of Fog computing Security, analyzing threats, attacks and propose security countermeasures to make the IoT landscape secure. In addition this paper provides basic understanding of key concepts in IoT, Fog Computing and Cloud Computing.

Keywords: IoT, Cloud Computing, Fog Computing, Fog Computing Security

Primary authors

Mr Raphael Kaibiru (Machakos University) Ms Mercy Wairimu (Machakos University)

Presentation Materials

There are no materials yet.

Peer reviewing

Paper

Paper files: