CFP last date
20 May 2024
Reseach Article

Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues

by Muhammad Saad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 32
Year of Publication: 2018
Authors: Muhammad Saad

Muhammad Saad . Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues. International Journal of Computer Applications. 180, 32 ( Apr 2018), 7-9. DOI=10.5120/ijca2018916829

@article{ 10.5120/ijca2018916829,
author = { Muhammad Saad },
title = { Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 180 },
number = { 32 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 7-9 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2018916829 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T01:02:26.210891+05:30
%A Muhammad Saad
%T Fog Computing and Its Role in the Internet of Things: Concept, Security and Privacy Issues
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 32
%P 7-9
%D 2018
%I Foundation of Computer Science (FCS), NY, USA

The Internet has evolved in ways that we could never have imagined. In the beginning, advancements occurred slowly. Today, innovation and communication are happening at a remarkable rate. Now days, Internet has become the most important aspect of our life. Starting from desktop late 90s when one use to go to the device to resolve the problem to the era of smart devices early 20s when everybody carry the devices in its pocket to the new emerging era of internet of everything where we are going to connect each and every non connected device present on the planet. Even though cloud computing has played an efficient role in the computation and processing of these data, however, challenges, such as the security and privacy issues still cannot be resolved by using cloud computing. To overcome these limitations, the term fog computing has emerged to provide computing resources at the edge of the network. Fog computing is the extended version of cloud computing having the same data storage and computation capabilities but is fundamentally distributed in nature by providing services at the edge of the network. In this paper, I have given the brief description about the Fog computing, elaborate its complicated architecture, highlighted few feasible application and mentioned about the current security and privacy issues with the recommended security measures which we are going to face while deploying internet of things in to live environment.

  1. S.N.U.H. Shirazi, A Gouglidis, A. Farshad, and D.Hutchison, “Review and analysis of mobile edge computing and fog from a security and resilience perspective,” IEEE Journal on Selected Areas in Communications, 2017.
  2. S .Kahvazadeh, V .B. Souza, X. Masip – Bruin ,E. Marn-Tordera, J.Garcia,and R .Diaz, “Securing combined fog-to-cloud system through sdn approach,” in Proceedings of the 4th Workshop on Cross Cloud Infrastructures & Platforms.ACM,2017,p.2.
  3. Z. Wen, R. Yang, P. Garraghan, T. Lin, J. Xu, and M. Rovatsos, “Fog orchestration for internet of things services,” IEEE Internet Computing, vol. 21, no. 2, pp. 16–24, 2017.
  4. A. Munir, P. Kansakar, and S. U. Khan, “Ifciot: integrated fog cloud iot architectural paradigm for future internet of things,” arXiv preprint arXiv: 1701.08474, 2017.
  5. Z. Su, F. Biennier, Z. Lv, Y. Peng, H. Song, and J. Miao, “Toward architectural and protocol-level foundation for end-to-end trustworthiness in cloud/fog computing,” IEEE Transactions on Big Data, 2017.
  6. M. B. Mollah, M. A. K. Azad, and A. Vasilakos, “Secure data sharing and searching at the edge of cloud-assisted internet of things,” IEEE Cloud Computing, vol. 4, no. 1, pp. 34–42, 2017.
  7. Y.-Y. Shih, W.-H. Chung, A.-C. Pang, T.-C. Chiu, and H.-Y. Wei, “Enabling low-latency applications in fog-radio access networks,” IEEE Network, vol. 31, no. 1, pp. 52–58, 2017.
  8. A. S. Sohal, R. Sandhu, S. K. Sood, and V. Chang, “A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments,” Computers & Security, 2017.
  9. P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: Architecture, key technologies, applications and open issues,” Journal of Network and Computer Applications, 2017.
  10. M. Oppitz and P. Tomsu, “Fog computing,” in Inventing the Cloud Century. Springer, 2018, pp. 471–486.
  11. S. Khan, S. Parkinson, and Y. Qin, “Fog computing security: a review of current applications and security solutions,” Journal of Cloud Computing, vol. 6, no. 1, p. 19, 2017.
  12. B. L. R. Stojkoska and K. V. Trivodaliev, “A review of internet of things for smart home: Challenges and solutions,” Journal of Cleaner Production, vol. 140, pp. 1454–1464, 2017.
Index Terms

Computer Science
Information Sciences


Fog computing Internet of things (IoT) Interoperability Cache Attacks Malware Protection.