dc.contributor.author |
Fakude, NC
|
|
dc.contributor.author |
Adigun, MO
|
|
dc.contributor.author |
Tarwireyi, P
|
|
dc.contributor.author |
Abu-Mahfouz, Adnan MI
|
|
dc.date.accessioned |
2020-04-23T09:56:48Z |
|
dc.date.available |
2020-04-23T09:56:48Z |
|
dc.date.issued |
2019-11 |
|
dc.identifier.citation |
Fakude, N.C. et al. 2019. Fog orchestrator as an enabler for security in fog computing: A review. IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 |
en_US |
dc.identifier.isbn |
978-1-7281-0040-1 |
|
dc.identifier.isbn |
978-1-7281-0041-8 |
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/9015896
|
|
dc.identifier.uri |
DOI: 10.1109/IMITEC45504.2019.9015896
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/11424
|
|
dc.description |
Presentation delivered at the IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 |
en_US |
dc.description.abstract |
Internet of Things (IoT) aims to bring every object such as smart cameras, wearable devices, environmental sensors, home appliances, and vehicles online. These "Things" generate an unprecedented amount of data and transmit it to the cloud for long-term processing and because existing data processing or analytics approaches are designed to deal with massive data and not real-time data, having millions of 'Things' generating and transferring data to the cloud is neither scalable nor suitable for real-time decision making. Therefore, the current infrastructure will not be able to handle the massive volume of data that will be generated by these devices, hence a new paradigm known as Fog Computing has been proposed. Fog computing extends the cloud platform model by providing computing resources at the edge of the network which results in better performance. However, researchers have raised challenges such as security and privacy, which arise from IoT-based Fog computing environments. Although technologies and solutions enabling connectivity and data delivery are growing rapidly, not enough attention has been given to the security of these computing paradigms and the associated IoT devices. Hence, this paper investigates and compare Fog Orchestrators that enable security in fog computing and further investigate the security techniques used in IoT-based Fog computing environments. This discussion shows that due to better performance brought by Fog Orchestrators, security and privacy models can be implemented in IoT-based fog environments. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;23184 |
|
dc.subject |
Fog Computing |
en_US |
dc.subject |
Fog Orchestrator |
en_US |
dc.subject |
Internet of Things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
Security and Privacy Model |
en_US |
dc.title |
Fog orchestrator as an enabler for security in fog computing: A review |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Fakude, N., Adigun, M., Tarwireyi, P., & Abu-Mahfouz, A. M. (2019). Fog orchestrator as an enabler for security in fog computing: A review. IEEE. http://hdl.handle.net/10204/11424 |
en_ZA |
dc.identifier.chicagocitation |
Fakude, NC, MO Adigun, P Tarwireyi, and Adnan MI Abu-Mahfouz. "Fog orchestrator as an enabler for security in fog computing: A review." (2019): http://hdl.handle.net/10204/11424 |
en_ZA |
dc.identifier.vancouvercitation |
Fakude N, Adigun M, Tarwireyi P, Abu-Mahfouz AM, Fog orchestrator as an enabler for security in fog computing: A review; IEEE; 2019. http://hdl.handle.net/10204/11424 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Fakude, NC
AU - Adigun, MO
AU - Tarwireyi, P
AU - Abu-Mahfouz, Adnan MI
AB - Internet of Things (IoT) aims to bring every object such as smart cameras, wearable devices, environmental sensors, home appliances, and vehicles online. These "Things" generate an unprecedented amount of data and transmit it to the cloud for long-term processing and because existing data processing or analytics approaches are designed to deal with massive data and not real-time data, having millions of 'Things' generating and transferring data to the cloud is neither scalable nor suitable for real-time decision making. Therefore, the current infrastructure will not be able to handle the massive volume of data that will be generated by these devices, hence a new paradigm known as Fog Computing has been proposed. Fog computing extends the cloud platform model by providing computing resources at the edge of the network which results in better performance. However, researchers have raised challenges such as security and privacy, which arise from IoT-based Fog computing environments. Although technologies and solutions enabling connectivity and data delivery are growing rapidly, not enough attention has been given to the security of these computing paradigms and the associated IoT devices. Hence, this paper investigates and compare Fog Orchestrators that enable security in fog computing and further investigate the security techniques used in IoT-based Fog computing environments. This discussion shows that due to better performance brought by Fog Orchestrators, security and privacy models can be implemented in IoT-based fog environments.
DA - 2019-11
DB - ResearchSpace
DP - CSIR
KW - Fog Computing
KW - Fog Orchestrator
KW - Internet of Things
KW - IoT
KW - Security and Privacy Model
LK - https://researchspace.csir.co.za
PY - 2019
SM - 978-1-7281-0040-1
SM - 978-1-7281-0041-8
T1 - Fog orchestrator as an enabler for security in fog computing: A review
TI - Fog orchestrator as an enabler for security in fog computing: A review
UR - http://hdl.handle.net/10204/11424
ER -
|
en_ZA |