@article{2763, author = {Pranav Vyas, Dharmendra Patel}, title = {Data and Programming Security Issues in Fog Computing}, journal = {Journal of Information Security Research}, year = {2019}, volume = {10}, number = {2}, doi = {https://doi.org/10.6025/jisr/2019/10/2/67-76}, url = {http://www.dline.info/jisr/fulltext/v10n2/jisrv10n2_3.pdf}, abstract = {IOT devices suffer from the drawbacks of limited computational resources at local level. IOT devices are required to gather and process large quantity of data with limited resources. One solution is to upload data from IOT devices to cloud based systems, which can process data and send results back to devices. This technique suffers from delay in processing and results in delayed response from the cloud in real time scenarios. Another technique to solve the problem is to introduce a middleware processing node also called edge node. The processing of data from edge nodes is known as edge computing or fog computing. In this paper, the authors discuss the security aspects of fog computing. After careful study of related literature, the authors identified several challenges related to security of data processing at edge nodes. The authors identified challenges such as data security and programming related security. The authors present several solutions to the challenges.}, }