Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective
نویسندگان
چکیده
منابع مشابه
Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملSecurity and Privacy Issues of Fog Computing: A Survey
Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.
متن کاملData Security and Privacy in the IoT
Deploying existing data security solutions to the Internet of Things (IoT) is not straightforward because of device heterogeneity, highly dynamic and possibly unprotected environments, and large scale. In this paper, after outlining key challenges in data security and privacy, we summarize research directions for securing IoT data, including efficient and scalable encryption protocols, software...
متن کاملApplying Security Policies in Small Business Utilizing Cloud Computing Technologies
Over a decade ago, cloud computing became an important topic for small and large businesses alike. The new concept promises scalability, security, cost reduction, portability, and availability. While addressing this issue over the past several years, there have been intensive discussions about the importance of cloud computing technologies. Therefore, this paper reviews the transition from trad...
متن کاملSecurity and privacy threats in IoT architectures
In this paper, we describe an overall architecture for Internet of Things (IoT) and analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture, with attacker centric and system centric approaches. Our strong view is that IoT will be an important part of the global huge ICT infrastructure (“future Internet”) humanity will be strongly relying o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Big Data
سال: 2020
ISSN: 2196-1115
DOI: 10.1186/s40537-020-00372-z