Reference Hub1
Indices1
Architecture and Security Issues in Fog Computing Applications

Architecture and Security Issues in Fog Computing Applications

Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani
Copyright: © 2020 |Pages: 205
ISBN13: 9781799801948|ISBN10: 1799801942|EISBN13: 9781799801962
DOI: 10.4018/978-1-7998-0194-8
Cite Book Cite Book

MLA

Goundar, Sam, et al., editors. Architecture and Security Issues in Fog Computing Applications. IGI Global, 2020. https://doi.org/10.4018/978-1-7998-0194-8

APA

Goundar, S., Bhushan, S. B., & Rayani, P. K. (Eds.). (2020). Architecture and Security Issues in Fog Computing Applications. IGI Global. https://doi.org/10.4018/978-1-7998-0194-8

Chicago

Goundar, Sam, S. Bharath Bhushan, and Praveen Kumar Rayani, eds. Architecture and Security Issues in Fog Computing Applications. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-0194-8

Export Reference

Mendeley
Favorite Full-Book Download

As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored.

Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Computer and Electrical Engineering (ACEE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.