Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Muhammad Saad

Muhammad Saad. Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues. International Journal of Computer Applications 180(32):7-9, April 2018. BibTeX

	author = {Muhammad Saad},
	title = {Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2018},
	volume = {180},
	number = {32},
	month = {Apr},
	year = {2018},
	issn = {0975-8887},
	pages = {7-9},
	numpages = {3},
	url = {},
	doi = {10.5120/ijca2018916829},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The Internet has evolved in ways that we could never have imagined. In the beginning, advancements occurred slowly. Today, innovation and communication are happening at a remarkable rate. Now days, Internet has become the most important aspect of our life. Starting from desktop late 90s when one use to go to the device to resolve the problem to the era of smart devices early 20s when everybody carry the devices in its pocket to the new emerging era of internet of everything where we are going to connect each and every non connected device present on the planet.

Even though cloud computing has played an efficient role in the computation and processing of these data, however, challenges, such as the security and privacy issues still cannot be resolved by using cloud computing. To overcome these limitations, the term fog computing has emerged to provide computing resources at the edge of the network. Fog computing is the extended version of cloud computing having the same data storage and computation capabilities but is fundamentally distributed in nature by providing services at the edge of the network.

In this paper, I have given the brief description about the Fog computing, elaborate its complicated architecture, highlighted few feasible application and mentioned about the current security and privacy issues with the recommended security measures which we are going to face while deploying internet of things in to live environment.


  1. S.N.U.H. Shirazi, A Gouglidis, A. Farshad, and D.Hutchison, “Review and analysis of mobile edge computing and fog from a security and resilience perspective,” IEEE Journal on Selected Areas in Communications, 2017.
  2. S .Kahvazadeh, V .B. Souza, X. Masip – Bruin ,E. Marn-Tordera, J.Garcia,and R .Diaz, “Securing combined fog-to-cloud system through sdn approach,” in Proceedings of the 4th Workshop on Cross Cloud Infrastructures & Platforms.ACM,2017,p.2.
  3. Z. Wen, R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for internet of things services,” IEEE Internet Computing, vol. 21, no. 2, pp. 16–24, 2017.
  4. A. Munir, P. Kansakar, and S. U. Khan, “Ifciot: integrated fog cloud iot architectural paradigm for future internet of things,” arXiv preprint arXiv: 1701.08474, 2017.
  5. Z. Su, F. Biennier, Z. Lv, Y. Peng, H. Song, and J. Miao, “Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing,” IEEE Transactions on Big Data, 2017.
  6. M. B. Mollah, M. A. K. Azad, and A. Vasilakos, “Secure data sharing and searching at the edge of cloud-assisted internet of things,” IEEE Cloud Computing, vol. 4, no. 1, pp. 34–42, 2017.
  7. Y.-Y. Shih, W.-H. Chung, A.-C. Pang, T.-C. Chiu, and H.-Y. Wei, “Enabling low-latency applications in fog-radio access networks,” IEEE Network, vol. 31, no. 1, pp. 52–58, 2017.
  8. A. S. Sohal, R. Sandhu, S. K. Sood, and V. Chang, “A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments,” Computers & Security, 2017.
  9. P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: Architecture, key technologies, applications and open issues,” Journal of Network and Computer Applications, 2017.
  10. M. Oppitz and P. Tomsu, “Fog computing,” in Inventing the Cloud Century. Springer, 2018, pp. 471–486.
  11. S. Khan, S. Parkinson, and Y. Qin, “Fog computing security: a review of current applications and security solutions,” Journal of Cloud Computing, vol. 6, no. 1, p. 19, 2017.
  12. B. L. R. Stojkoska and K. V. Trivodaliev, “A review of internet of things for smart home: Challenges and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017.


Fog computing, Internet of things (IoT), Interoperability, Cache Attacks, Malware Protection.