Show simple item record

dc.contributor.authorKimeu, Japheth
dc.contributor.authorMtoi, Mary
dc.contributor.authorRiwa, Janeth
dc.contributor.authorSinde, Ramadhani
dc.date.accessioned2024-05-27T11:36:33Z
dc.date.available2024-05-27T11:36:33Z
dc.date.issued2023-10-31
dc.identifier.urihttps://doi.org/10.1109/AFRICON55910.2023.10293490
dc.identifier.urihttps://dspace.nm-aist.ac.tz/handle/20.500.12479/2681
dc.descriptionThis research article was published in the IEEE Xplore, 2023en_US
dc.description.abstractCloud computing in IoT systems enables flexible design with distributed data, infrastructure, and resources accessible from diverse industrial settings. The tremendous rise of the Internet of Things (IoT) has posed numerous issues to the centralized cloud computing architecture which are solved by fog computing. A passive rogue fog node acting as a man-in-the-middle attack poses a significant security vulnerability in the cloud fog layer, compromising data confidentiality and making identification difficult. This survey paper proposes an Intrusion Detection System (IDS) to protect the fog layer from the Man-in-the-Middle Attack (MitM/MITM/MiTM) which is present in the rogue node. Literature review methodology is employed to study various scientific articles providing a comprehensive survey of the existing security and privacy concerns in cloud computing.en_US
dc.language.isoenen_US
dc.publisherIEEE AFRICONen_US
dc.subjectCloud computingen_US
dc.subjectData privacyen_US
dc.subjectIntrusion detectionen_US
dc.subjectDistributed databasesen_US
dc.subjectComputer architectureen_US
dc.titleInternet of Things Security in Cloud: A Review on Fog Layer Securityen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record