Investigating Network Security Solutions with Fog Computing
  • Author(s): Malik Jawarneh
  • Paper ID: 1704125
  • Page: 222-229
  • Published Date: 10-03-2023
  • Published In: Iconic Research And Engineering Journals
  • Publisher: IRE Journals
  • e-ISSN: 2456-8880
  • Volume/Issue: Volume 6 Issue 8 February-2023

With the rise in cyber-attacks, organizations are increasingly looking to secure their networks with better security strategies. One such solution is fog computing, which has been gaining attention as a potential answer to the ever-growing need for robust security. This survey paper examines the current state of network security using fog computing, exploring the advantages, challenges, and potential applications of the technology. It also provides an overview of the existing research and future prospects of fog computing in network security. Fog computing offers a unique approach to network security, enabling organizations to build more secure networks using distributed computing resources. By offloading data processing from the cloud to the edge, fog computing can help organizations reduce latency and increase scalability. Additionally, it can improve data security and privacy, as data is processed closer to the source, and provide better control over data processing. Although fog computing can be beneficial, it also presents some challenges, such as the need for high-performance networks and availability of computing resources. Despite these challenges, fog computing is a promising technology, with potential applications across various industries. This paper provides an overview of research on fog computing for network security, as well as a look at the future of the technology.


Network Security, Fog Computing, Cloud Computing, and Security Threats.


IRE Journals:
Malik Jawarneh "Investigating Network Security Solutions with Fog Computing" Iconic Research And Engineering Journals Volume 6 Issue 8 2023 Page 222-229

Malik Jawarneh "Investigating Network Security Solutions with Fog Computing" Iconic Research And Engineering Journals, 6(8)