Advances, Systems and Applications
From: Fog computing security: a review of current applications and security solutions
Security solution | APT | ACI | AH | DoS | DB | DL | IA | SAV | MI | IDD | ANU | STI |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Data encryption | ✓ | ✓ | ✓ | ✓ | ||||||||
Preventing cache attacks | ✓ | ✓ | ✓ | |||||||||
Network monitoring | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ||||
Malware protection | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Wireless security | ✓ | ✓ | ✓ | ✓ | ||||||||
Secured vehicular networks | ✓ | ✓ | ✓ | ✓ | ✓ | |||||||
Secured multi-tenancy | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | |||||
Backup and recovery | ✓ | ✓ |