“…First, in order to improve the confidentiality, Data Encryption and the use of Sandboxes to isolate executions, data and communications, are commonly applied [25]. Secondly, for reducing the data loss, specific protocols are used to send information to fog nodes or to cloud environments, by means of Version Control and Configuration Management approaches [87,88]. Third, File Permissions, User Access Controls, Checksum and Hashing methods are applied to increase the data integrity, detecting and preventing unauthorized alteration of the information over its entire life cycle [89].…”