Fog computing, applications , security and challenges, review

The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet o...

Full description

Bibliographic Details
Main Authors: Rahman, Gohar, Chai, Chuah Wen
Format: Article
Published: Science Publishing Corporation (SPC) 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/4270/
_version_ 1848888242617712640
author Rahman, Gohar
Chai, Chuah Wen
author_facet Rahman, Gohar
Chai, Chuah Wen
author_sort Rahman, Gohar
building UTHM Institutional Repository
collection Online Access
description The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented.
first_indexed 2025-11-15T20:07:10Z
format Article
id uthm-4270
institution Universiti Tun Hussein Onn Malaysia
institution_category Local University
last_indexed 2025-11-15T20:07:10Z
publishDate 2018
publisher Science Publishing Corporation (SPC)
recordtype eprints
repository_type Digital Repository
spelling uthm-42702021-12-01T08:35:27Z http://eprints.uthm.edu.my/4270/ Fog computing, applications , security and challenges, review Rahman, Gohar Chai, Chuah Wen T Technology (General) The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented. Science Publishing Corporation (SPC) 2018 Article PeerReviewed Rahman, Gohar and Chai, Chuah Wen (2018) Fog computing, applications , security and challenges, review. International Journal of Engineering & Technology, 7 (3). pp. 1615-1621. ISSN 2227-524X https://doi.org/10.14419/ijet.v7i3.12612
spellingShingle T Technology (General)
Rahman, Gohar
Chai, Chuah Wen
Fog computing, applications , security and challenges, review
title Fog computing, applications , security and challenges, review
title_full Fog computing, applications , security and challenges, review
title_fullStr Fog computing, applications , security and challenges, review
title_full_unstemmed Fog computing, applications , security and challenges, review
title_short Fog computing, applications , security and challenges, review
title_sort fog computing, applications , security and challenges, review
topic T Technology (General)
url http://eprints.uthm.edu.my/4270/
http://eprints.uthm.edu.my/4270/