Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 3 Security solutions that can resolve twelve potential security issues in Fog implementations

From: Fog computing security: a review of current applications and security solutions

Security solution APT ACI AH DoS DB DL IA SAV MI IDD ANU STI
Data encryption           
Preventing cache attacks            
Network monitoring      
Malware protection          
Wireless security           
Secured vehicular networks        
Secured multi-tenancy          
Backup and recovery