The fog computing paradigm: scenarios and security issues

Stojmenovic, Ivan and Wen, Sheng 2014, The fog computing paradigm: scenarios and security issues, in FedCSIS 2014: Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE, Piscataway, N.J., pp. 1-8, doi: 10.15439/2014F503.

Attached Files
Name Description MIMEType Size Downloads

Title The fog computing paradigm: scenarios and security issues
Author(s) Stojmenovic, Ivan
Wen, Sheng
Conference name Computer Science and Information Systems. Federated Conference (2014: Warsaw, Poland)
Conference location Warsaw, Poland
Conference dates 2014/09/07 - 2014/09/10
Title of proceedings FedCSIS 2014: Proceedings of the Federated Conference on Computer Science and Information Systems
Publication date 2014
Series ACSIS: Annals of Computer Science and Information Systems
Start page 1
End page 8
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) Science & Technology
Computer Science, Information Systems
Computer Science, Theory & Methods
Computer Science
Fog Computing
Cloud Computing
Internet of Things
Software Defined Networks
Summary Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. In this article, we elaborate the motivation and advantages of Fog computing, and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state-of-the-art of Fog computing and similar work under the same umbrella. Security and privacy issues are further disclosed according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.
ISSN 2300-5963
Language eng
DOI 10.15439/2014F503
Field of Research 080303 Computer System Security
Socio Economic Objective 970110 Expanding Knowledge in Technology
HERDC Research category E2.1 Full written paper - non-refereed / Abstract reviewed
ERA Research output type E Conference publication
Copyright notice ©2014, IEEE
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 275 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 212 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Mon, 18 Jan 2016, 16:42:38 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact