2020
DOI: 10.1109/mic.2020.2979161
|View full text |Cite
|
Sign up to set email alerts
|

Fog Computing as Privacy Enabler

Abstract: Despite broad discussions on privacy challenges arising from fog computing, the authors argue that privacy and security requirements might actually drive the adoption of fog computing. They present four patterns of fog computing fostering data privacy and the security of business secrets, complementing existing cryptographic approaches. Their practical application is illuminated on the basis of three case studies.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 12 publications
0
23
0
Order By: Relevance
“…In this paper, we propose using a detour when routing IoT data to edge and cloud compute nodes. We consider such environments as an ideal case for applying detours because: i) The IoT data are not routed through other (peer) users, but rather through the available edge compute nodes which can actually improve privacy [28], [29]. ii) The difference in the capacity of paths with detours can be so large (e.g., due to the different bandwidth limits between Internet and cloud providers), that utilizing such paths may lead to significant benefits (as shown in Section V).…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we propose using a detour when routing IoT data to edge and cloud compute nodes. We consider such environments as an ideal case for applying detours because: i) The IoT data are not routed through other (peer) users, but rather through the available edge compute nodes which can actually improve privacy [28], [29]. ii) The difference in the capacity of paths with detours can be so large (e.g., due to the different bandwidth limits between Internet and cloud providers), that utilizing such paths may lead to significant benefits (as shown in Section V).…”
Section: Discussionmentioning
confidence: 99%
“…In 2016, several benchmarks utilized on the UK's national supercomputer ARCHER were presented 6 . These benchmarks are a combination of real applications (DFT, molecular mechanics-based, CFD, and climate modeling) developed by the UK Met Office and synthetic benchmarks from the HPC Challenge.…”
Section: A Brief Timeline Of Performance Benchmarkingmentioning
confidence: 99%
“…This is because billions of devices and sensors are connected to the Internet, and the data generated by these sources cannot be transferred and processed in geographically distant cloud data centers without incurring considerable communication delays (4). Therefore, the next disruption in the computing landscape is to distribute infrastructure resources and application services further, to bring computing closer to the edge of the network and data sources (5,6). In this article, we use the term "edge computing" to refer to the use of resources located at the edge of a network, such as routers and gateways or dedicated micro data centers, to either provide applications with acceleration by co-hosting services in cooperation with the cloud or by hosting them natively or entirely on edge resources (7).…”
Section: Introductionmentioning
confidence: 99%
“…This reduces the amount and the distance of data transmitted to the Cloud and consequently reduces the impact of security and privacy issues of IoT applications. 5,43 Fog computing improves time to action and reduces response time, thus responding faster and locally to security and privacy threats. 44,45 Moreover, Fog nodes can serve as proxies of the IoT devices.…”
Section: Fog To Enhance Security and Privacy Of Iot Applicationsmentioning
confidence: 99%