Skip to main content

Advances, Systems and Applications

Table 3 Security solutions that can resolve twelve potential security issues in Fog implementations

From: Fog computing security: a review of current applications and security solutions

Security solution

APT

ACI

AH

DoS

DB

DL

IA

SAV

MI

IDD

ANU

STI

Data encryption

    

✓

✓

  

✓

✓

  

Preventing cache attacks

    

✓

 

✓

✓

    

Network monitoring

✓

✓

 

✓

✓

   

✓

✓

✓

✓

Malware protection

  

✓

  

✓

✓

✓

   

✓

Wireless security

✓

✓

  

✓

     

✓

 

Secured vehicular networks

✓

✓

✓

✓

       

✓

Secured multi-tenancy

 

✓

✓

 

✓

 

✓

 

✓

 

✓

✓

Backup and recovery

     

✓

   

✓