REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS

A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service pr...

Full description

Saved in:
Bibliographic Details
Main Authors: Varun Varma Sangaraju, SV Achuta Rao, Amjan Shaik, Prasuna VG, Nagaraju P B S.R.K.R.
Format: Article
Language:English
Published: University of Kragujevac 2025-03-01
Series:Proceedings on Engineering Sciences
Subjects:
Online Access:https://pesjournal.net/journal/v7-n1/48.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850252597858926592
author Varun Varma Sangaraju
SV Achuta Rao
Amjan Shaik
Prasuna VG
Nagaraju P B S.R.K.R.
author_facet Varun Varma Sangaraju
SV Achuta Rao
Amjan Shaik
Prasuna VG
Nagaraju P B S.R.K.R.
author_sort Varun Varma Sangaraju
collection DOAJ
description A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service providers and organizations a significant advantage in developing better systems. Fog computing boasts a plethora of applications across various industries. However, fog computing adopts the same security and privacy issues as cloud computing. Fog computing security and privacy issues were researched extensively and presented in this paper. This research also discusses the possible security configurations existing for the fog computing environment.
format Article
id doaj-art-de98b6a026d2400e8dfe6e2f0a847105
institution OA Journals
issn 2620-2832
2683-4111
language English
publishDate 2025-03-01
publisher University of Kragujevac
record_format Article
series Proceedings on Engineering Sciences
spelling doaj-art-de98b6a026d2400e8dfe6e2f0a8471052025-08-20T01:57:35ZengUniversity of KragujevacProceedings on Engineering Sciences2620-28322683-41112025-03-017144745810.24874/PES07.01D.002REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONSVarun Varma Sangaraju 0SV Achuta Rao 1https://orcid.org/0000-0002-2074-1223Amjan Shaik 2https://orcid.org/0000-0001-7028-3868Prasuna VG 3https://orcid.org/0009-0007-0448-7580Nagaraju P B S.R.K.R.4https://orcid.org/0009-0001-9471-3217University of the Cumberlands, Williamsburg, KY, USA Sree Dattha Institute of Engineering and Science, Hyderabad, India St.Peters Engineering College, Maisammaguda, TS, India Satya Institute of Technology and Management, Vizag, AP, India Engineering College (A) Bhimavaram, AP, India A distributed computing model known as fog computing lies near the user for efficient data processing and analysis. Fog computing extends cloud computing and expands on the characteristics providing more features for the consumer's benefit. A flexible fog computing architecture gives service providers and organizations a significant advantage in developing better systems. Fog computing boasts a plethora of applications across various industries. However, fog computing adopts the same security and privacy issues as cloud computing. Fog computing security and privacy issues were researched extensively and presented in this paper. This research also discusses the possible security configurations existing for the fog computing environment.https://pesjournal.net/journal/v7-n1/48.pdffog computinginternet of thingscloud computinglow latency
spellingShingle Varun Varma Sangaraju
SV Achuta Rao
Amjan Shaik
Prasuna VG
Nagaraju P B S.R.K.R.
REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
Proceedings on Engineering Sciences
fog computing
internet of things
cloud computing
low latency
title REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
title_full REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
title_fullStr REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
title_full_unstemmed REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
title_short REVIEW ON FOG COMPUTING – APPLICATIONS, SECURITY, AND SOLUTIONS
title_sort review on fog computing applications security and solutions
topic fog computing
internet of things
cloud computing
low latency
url https://pesjournal.net/journal/v7-n1/48.pdf
work_keys_str_mv AT varunvarmasangaraju reviewonfogcomputingapplicationssecurityandsolutions
AT svachutarao reviewonfogcomputingapplicationssecurityandsolutions
AT amjanshaik reviewonfogcomputingapplicationssecurityandsolutions
AT prasunavg reviewonfogcomputingapplicationssecurityandsolutions
AT nagarajupbsrkr reviewonfogcomputingapplicationssecurityandsolutions