Fog Computing 2020
DOI: 10.1002/9781119551713.ch5
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Issues in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 72 publications
0
14
0
Order By: Relevance
“…Several studies have discussed about trust and authentication issues in fog but, there is no complete solution to the trust and authentication problems in the fog computing 117 . Some recent studies have stated that trust platform mechanism (TPM) and secure element (SE) can be used in fog computing applications to provide trust utility 118 …”
Section: Open Issues In Fog Computingmentioning
confidence: 99%
“…Several studies have discussed about trust and authentication issues in fog but, there is no complete solution to the trust and authentication problems in the fog computing 117 . Some recent studies have stated that trust platform mechanism (TPM) and secure element (SE) can be used in fog computing applications to provide trust utility 118 …”
Section: Open Issues In Fog Computingmentioning
confidence: 99%
“…(i) Something you know (ii) something you have and (iii) something you are, are some known identification variables. Similarly, temporal variables to constraint an individual are (i) only for Identified User, (ii) only for Specified Time, and (iii) only at specified Geo-Location ( Ali et al, 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…1 . A detailed taxonomy as developed in Ali et al (2020) covers various other authentication schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we propose to build the data set with ample information which can be well perceive and understand. The visualization of such data set, make it easy to distinguish between normal and abnormal activity of a malware, instead of traditional inadequate data sets [21]. The advance and latest malware samples (e.g., fund transfer, Korplug, CTB locker, etc.)…”
Section: Introductionmentioning
confidence: 99%