Internet of Things Security in Cloud: A Review on Fog Layer Security

dc.contributor.authorKimeu, Japheth
dc.contributor.authorMtoi, Mary
dc.contributor.authorRiwa, Janeth
dc.contributor.authorSinde, Ramadhani
dc.date.accessioned2024-05-27T11:36:33Z
dc.date.available2024-05-27T11:36:33Z
dc.date.issued2023-10-31
dc.descriptionThis research article was published in the IEEE Xplore, 2023en_US
dc.description.abstractCloud computing in IoT systems enables flexible design with distributed data, infrastructure, and resources accessible from diverse industrial settings. The tremendous rise of the Internet of Things (IoT) has posed numerous issues to the centralized cloud computing architecture which are solved by fog computing. A passive rogue fog node acting as a man-in-the-middle attack poses a significant security vulnerability in the cloud fog layer, compromising data confidentiality and making identification difficult. This survey paper proposes an Intrusion Detection System (IDS) to protect the fog layer from the Man-in-the-Middle Attack (MitM/MITM/MiTM) which is present in the rogue node. Literature review methodology is employed to study various scientific articles providing a comprehensive survey of the existing security and privacy concerns in cloud computing.en_US
dc.identifier.urihttps://doi.org/10.1109/AFRICON55910.2023.10293490
dc.identifier.urihttps://dspace.nm-aist.ac.tz/handle/20.500.12479/2681
dc.language.isoenen_US
dc.publisherIEEE AFRICONen_US
dc.subjectCloud computingen_US
dc.subjectData privacyen_US
dc.subjectIntrusion detectionen_US
dc.subjectDistributed databasesen_US
dc.subjectComputer architectureen_US
dc.titleInternet of Things Security in Cloud: A Review on Fog Layer Securityen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
CP_CoCSE_2023.pdf
Size:
10.88 KB
Format:
Adobe Portable Document Format
Description:
Abstract

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2 KB
Format:
Item-specific license agreed upon to submission
Description: