IoT 20(23): e5

Research Article

Cloud, Edge, and Fog Computing and Security for the Internet of Things

Download973 downloads
  • @ARTICLE{10.4108/eai.20-10-2020.166666,
        author={Mohammed Al-Alshaqi and Danda B. Rawat},
        title={Cloud, Edge, and Fog Computing and Security for the Internet of Things},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={6},
        number={23},
        publisher={EAI},
        journal_a={IOT},
        year={2020},
        month={10},
        keywords={Security for the internet of things (IoT), Cloud Computing, Edge computing, Fog computing with the internet of things (IoT)},
        doi={10.4108/eai.20-10-2020.166666}
    }
    
  • Mohammed Al-Alshaqi
    Danda B. Rawat
    Year: 2020
    Cloud, Edge, and Fog Computing and Security for the Internet of Things
    IOT
    EAI
    DOI: 10.4108/eai.20-10-2020.166666
Mohammed Al-Alshaqi1,*, Danda B. Rawat1
  • 1: Data Science and Cybersecurity Center (DSC2), Department of Electrical Engineering & Computer Science, Howard University, DC, 20059, USA
*Contact email: mohammed.alalshaqi@bison.howard.edu

Abstract

In this paper, a method is purposed that detects the masquerade activity of cloud data. In this method, the combination of the decoy technique and the user’s behaviour profile technique are used to improve the security of data in the cloud. This research has the main focus on understanding the use of these computing paradigms with the internet of things. The security concerns and its possible solutions are described. Therefore, the comparative analysis is conducted, which elaborates on each paradigm in the internet of things. The future consent of cloud, edge, and fog computing is also directed, which gives the innovative vision for the data handling with the internet of things.