首页> 外文会议>International Conference on Electronics and Sustainable Communication Systems >A Comparative Study on security breach in Fog computing and its impact
【24h】

A Comparative Study on security breach in Fog computing and its impact

机译:雾计算中的安全漏洞及其影响比较研究

获取原文

摘要

Budding technologies like IoT requires minimum latency for performing real-time applications. The IoT devices collect a huge amount of big data and stores in the cloud environment, because of its on-demand services and scalability. But processing the needed information of the IoT devices from the cloud computing environment is found to be time-sensitive one. To eradicate this issue fog computing environment was created which acts an intermediate between the IoT devices and cloud computing environment. The fog computing performs intermediate computation and storage which is needed by IoT devices and it eliminates the drawbacks of latency and bandwidth limitation faced by directly using cloud computing for storage and accessing. The fog computing even though more advantageous it is more exposed to security issues by its architecture. This paper concentrates more on the security issues met by fog computing and the present methods used by the researchers to secure fog with their pros and cons.
机译:物联网之类的互连技术需要最小的延迟来执行实时应用程序。物联网设备因其按需服务和可扩展性而收集了大量的大数据并存储在云环境中。但是,从云计算环境中处理IoT设备所需的信息被认为是时间敏感的。为了消除这个问题,创建了雾计算环境,该雾计算环境充当物联网设备和云计算环境之间的中介。雾计算执行物联网设备所需的中间计算和存储,它消除了直接使用云计算进行存储和访问所面临的延迟和带宽限制的缺点。雾计算虽然更有利,但其体系结构更容易遭受安全性问题的影响。本文将更多地集中在雾计算所遇到的安全性问题上,以及研究人员用来保护雾的优点和缺点的当前方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号