REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service pr...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Kragujevac
2025-03-01
|
| Series: | Proceedings on Engineering Sciences |
| Subjects: | |
| Online Access: | https://pesjournal.net/journal/v7-n1/48.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850252597858926592 |
|---|---|
| author | Varun Varma Sangaraju SV Achuta Rao Amjan Shaik Prasuna VG Nagaraju P B S.R.K.R. |
| author_facet | Varun Varma Sangaraju SV Achuta Rao Amjan Shaik Prasuna VG Nagaraju P B S.R.K.R. |
| author_sort | Varun Varma Sangaraju |
| collection | DOAJ |
| description | A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service providers and organizations a significant advantage in developing better systems. Fog computing boasts a plethora of applications across various industries. However, fog computing adopts the same security and privacy issues as cloud computing. Fog computing security and privacy issues were researched extensively and presented in this paper. This research also discusses the possible security configurations existing for the fog computing environment. |
| format | Article |
| id | doaj-art-de98b6a026d2400e8dfe6e2f0a847105 |
| institution | OA Journals |
| issn | 2620-2832 2683-4111 |
| language | English |
| publishDate | 2025-03-01 |
| publisher | University of Kragujevac |
| record_format | Article |
| series | Proceedings on Engineering Sciences |
| spelling | doaj-art-de98b6a026d2400e8dfe6e2f0a8471052025-08-20T01:57:35ZengUniversity of KragujevacProceedings on Engineering Sciences2620-28322683-41112025-03-017144745810.24874/PES07.01D.002REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONSVarun Varma Sangaraju 0SV Achuta Rao 1https://orcid.org/0000-0002-2074-1223Amjan Shaik 2https://orcid.org/0000-0001-7028-3868Prasuna VG 3https://orcid.org/0009-0007-0448-7580Nagaraju P B S.R.K.R.4https://orcid.org/0009-0001-9471-3217University of the Cumberlands, Williamsburg, KY, USA Sree Dattha Institute of Engineering and Science, Hyderabad, India St.Peters Engineering College, Maisammaguda, TS, India Satya Institute of Technology and Management, Vizag, AP, India Engineering College (A) Bhimavaram, AP, India A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service providers and organizations a significant advantage in developing better systems. Fog computing boasts a plethora of applications across various industries. However, fog computing adopts the same security and privacy issues as cloud computing. Fog computing security and privacy issues were researched extensively and presented in this paper. This research also discusses the possible security configurations existing for the fog computing environment.https://pesjournal.net/journal/v7-n1/48.pdffog computinginternet of thingscloud computinglow latency |
| spellingShingle | Varun Varma Sangaraju SV Achuta Rao Amjan Shaik Prasuna VG Nagaraju P B S.R.K.R. REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS Proceedings on Engineering Sciences fog computing internet of things cloud computing low latency |
| title | REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS |
| title_full | REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS |
| title_fullStr | REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS |
| title_full_unstemmed | REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS |
| title_short | REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS |
| title_sort | review on fog computing applications security and solutions |
| topic | fog computing internet of things cloud computing low latency |
| url | https://pesjournal.net/journal/v7-n1/48.pdf |
| work_keys_str_mv | AT varunvarmasangaraju reviewonfogcomputingapplicationssecurityandsolutions AT svachutarao reviewonfogcomputingapplicationssecurityandsolutions AT amjanshaik reviewonfogcomputingapplicationssecurityandsolutions AT prasunavg reviewonfogcomputingapplicationssecurityandsolutions AT nagarajupbsrkr reviewonfogcomputingapplicationssecurityandsolutions |