Skip to main content

Advances, Systems and Applications

Table 3 Security solutions that can resolve twelve potential security issues in Fog implementations

From: Fog computing security: a review of current applications and security solutions

Security solution

APT

ACI

AH

DoS

DB

DL

IA

SAV

MI

IDD

ANU

STI

Data encryption

    

  

  

Preventing cache attacks

    

 

    

Network monitoring

 

   

Malware protection

  

  

   

Wireless security

  

     

 

Secured vehicular networks

       

Secured multi-tenancy

 

 

 

 

 

Backup and recovery