Fog computing: Overview, architecture, security issues and applications

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There is a famous saying that goes “Necessity is the mother of invention”. In today’s globalized world people are getting stuck with many problems like data management, time management, and security and privacy concerns etc. There are traditional methods like cloud computing, cloudlet, and mobile management techniques to sort out the processing, storing, and executing of the data. But with the passage of time, the world is exploring new areas and these traditional methods are on the wane in terms of data handling. In this paper we discuss the technology that helps in data management, time management and security issues. We also addresses some real time scenarios.

Cite

CITATION STYLE

APA

Dasari, K., & Rayaprolu, M. (2019). Fog computing: Overview, architecture, security issues and applications. In Lecture Notes in Electrical Engineering (Vol. 500, pp. 11–18). Springer Verlag. https://doi.org/10.1007/978-981-13-0212-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free