Fig. 4From: Fog computing security: a review of current applications and security solutionsFog Computing Platform and the deployment of security solutions on various components of the Fog system. This figure shows how and where proposed security solutions can be placed and help in eliminating various security flawsBack to article page