{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T05:12:57Z","timestamp":1772255577246,"version":"3.50.1"},"reference-count":139,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p>Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-ranging view of fog computing, covering several aspects. At the outset is the many-layered structural design of fog computing and its attributes. After that, chief advances like communication and inter-exchange, computing, etc. are delineated, while showing how these backup and facilitate the installations and various applications. Following that, it is shown that how, despite fog computing being a feature-rich platform, it is dogged by its susceptibility to several security, privacy, and safety concerns, which stem from the nature of its widely distributed and open architecture. Finally, some suggestions are advanced to address some of the safety challenges discussed so as to propel the further growth of fog computing.<\/jats:p>","DOI":"10.4018\/ijfc.2020010105","type":"journal-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T06:07:51Z","timestamp":1577081271000},"page":"75-105","source":"Crossref","is-referenced-by-count":15,"title":["Fog Computing Architecture, Applications and Security Issues"],"prefix":"10.4018","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9771-6288","authenticated-orcid":true,"given":"Rahul","family":"Neware","sequence":"first","affiliation":[{"name":"GHRCE, Nagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4523-9501","authenticated-orcid":true,"given":"Urmila","family":"Shrawankar","sequence":"additional","affiliation":[{"name":"GHRCE, Nagpur, India"}]}],"member":"2432","reference":[{"key":"IJFC.2020010105-0","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134091"},{"key":"IJFC.2020010105-1","doi-asserted-by":"publisher","DOI":"10.1109\/MPOT.2015.2456213"},{"key":"IJFC.2020010105-2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1634-x"},{"key":"IJFC.2020010105-3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757844"},{"key":"IJFC.2020010105-4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705076"},{"key":"IJFC.2020010105-5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2016.36"},{"key":"IJFC.2020010105-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.012"},{"key":"IJFC.2020010105-7","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"IJFC.2020010105-8","doi-asserted-by":"crossref","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54 (15), 2787\u20132805. doi:10.1.1.719.9916.","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"IJFC.2020010105-9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871674"},{"key":"IJFC.2020010105-10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2666783"},{"key":"IJFC.2020010105-11","unstructured":"Bonomi, F. (2011). i Connected vehicles, the Internet of Things, and Fog computing. Proceedings of VANET, Las Vegas, NV (pp.13-15). Academic Press."},{"key":"IJFC.2020010105-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05029-4_7"},{"key":"IJFC.2020010105-13","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"IJFC.2020010105-14","unstructured":"Brock, D. L. (2001). The electronic product code (epc). Auto-ID Center."},{"key":"IJFC.2020010105-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.414"},{"key":"IJFC.2020010105-16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600885"},{"key":"IJFC.2020010105-17","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2015.7255196"},{"key":"IJFC.2020010105-18","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064900"},{"key":"IJFC.2020010105-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.034"},{"key":"IJFC.2020010105-20","unstructured":"Cisco global cloud index: Forecast and methodology. 2016-2018 white paper. (n.d.). Retrieved from: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/white-paper-c11-738085.html"},{"key":"IJFC.2020010105-21","doi-asserted-by":"publisher","DOI":"10.1145\/2723701"},{"key":"IJFC.2020010105-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.093"},{"key":"IJFC.2020010105-23","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946404"},{"key":"IJFC.2020010105-24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.245"},{"key":"IJFC.2020010105-25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177778"},{"key":"IJFC.2020010105-26","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2008.2006991"},{"key":"IJFC.2020010105-27","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.274"},{"key":"IJFC.2020010105-28","first-page":"16","article-title":"Policy-driven security management for fog computing: Preliminary framework and a case study.","author":"C.Dsouza","year":"2015","journal-title":"Proceedings of IEEE International Conference on Information Reuse and Integration"},{"key":"IJFC.2020010105-29","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2017.2715038"},{"key":"IJFC.2020010105-30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2631546"},{"key":"IJFC.2020010105-31","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2364616"},{"key":"IJFC.2020010105-32","unstructured":"Evans, D. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO."},{"key":"IJFC.2020010105-33","doi-asserted-by":"publisher","DOI":"10.3390\/s17071695"},{"key":"IJFC.2020010105-34","doi-asserted-by":"publisher","DOI":"10.3390\/s17061421"},{"key":"IJFC.2020010105-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.05.023"},{"key":"IJFC.2020010105-36","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2014.6846894"},{"key":"IJFC.2020010105-37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"IJFC.2020010105-38","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.265"},{"key":"IJFC.2020010105-39","doi-asserted-by":"publisher","DOI":"10.1109.\/JAS.2017.7510313"},{"key":"IJFC.2020010105-40","doi-asserted-by":"publisher","DOI":"10.1109.JAS.2016.7373757"},{"key":"IJFC.2020010105-41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"IJFC.2020010105-42","doi-asserted-by":"publisher","DOI":"10.1109\/SECONW.2015.7328146"},{"key":"IJFC.2020010105-43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2585591"},{"key":"IJFC.2020010105-44","doi-asserted-by":"publisher","DOI":"10.1145\/2491266.2491270"},{"key":"IJFC.2020010105-45","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5675776"},{"key":"IJFC.2020010105-46","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9532-2"},{"key":"IJFC.2020010105-47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2532863"},{"key":"IJFC.2020010105-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.09.002"},{"key":"IJFC.2020010105-49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2659783"},{"key":"IJFC.2020010105-50","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.030"},{"key":"IJFC.2020010105-51","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2607178"},{"key":"IJFC.2020010105-52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2727054"},{"key":"IJFC.2020010105-53","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457059"},{"key":"IJFC.2020010105-54","unstructured":"Ivan, S., & Sheng, W. (2014). The Fog Computing Paradigm Scenarios and Security Issues. Proceedings of the 2014 Federated Conference on Computer Science and Information Systems. Academic Press."},{"key":"IJFC.2020010105-55","doi-asserted-by":"publisher","DOI":"10.11591\/ij-ict.v2i3.5122"},{"key":"IJFC.2020010105-56","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.026"},{"key":"IJFC.2020010105-57","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2764095"},{"key":"IJFC.2020010105-58","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(16)60021-3"},{"key":"IJFC.2020010105-59","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-017-0090-3"},{"key":"IJFC.2020010105-60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461195"},{"key":"IJFC.2020010105-61","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2009.04.002"},{"key":"IJFC.2020010105-62","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/796515"},{"key":"IJFC.2020010105-63","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0054"},{"key":"IJFC.2020010105-64","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.87"},{"key":"IJFC.2020010105-65","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"IJFC.2020010105-66","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2015.7333287"},{"key":"IJFC.2020010105-67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2685596"},{"key":"IJFC.2020010105-68","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2015.7366831"},{"key":"IJFC.2020010105-69","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7839768"},{"key":"IJFC.2020010105-70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.017"},{"key":"IJFC.2020010105-71","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.006"},{"key":"IJFC.2020010105-72","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.018"},{"key":"IJFC.2020010105-73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2677520"},{"key":"IJFC.2020010105-74","unstructured":"Luan, T. H., Gao, L., Li, Z., & Sun, L. (2015). Fog computing: Focusing on mobile users at the edge."},{"key":"IJFC.2020010105-75","first-page":"1","article-title":"Fog computing: Focusing on mobile users at the edge.","volume":"\u25aa\u25aa\u25aa","author":"T. H.Luan","year":"2015","journal-title":"Computer Science"},{"issue":"1","key":"IJFC.2020010105-76","first-page":"2","article-title":"ZTE Communications Special Issue on Cloud computing, Fog computing, and Dew computing.","volume":"15","author":"G.Luo","year":"2017","journal-title":"ZTE Communications"},{"issue":"6","key":"IJFC.2020010105-77","first-page":"13","article-title":"Survey on Fog computing Mitigating Data Theft Attacks in Cloud.","volume":"2","author":"V. G.Mandlekar","year":"2014","journal-title":"International Journal of Innovative Research in Computer Science & Technology"},{"key":"IJFC.2020010105-78","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"IJFC.2020010105-79","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2014.6973876"},{"key":"IJFC.2020010105-80","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.020"},{"key":"IJFC.2020010105-81","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.62"},{"key":"IJFC.2020010105-82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"issue":"5","key":"IJFC.2020010105-83","first-page":"1004","article-title":"fog computing focusing on users at the edge of internet of things.","volume":"5","author":"A.Natraj","year":"2016","journal-title":"International Journal of Engine Research"},{"issue":"11","key":"IJFC.2020010105-84","first-page":"234","article-title":"Recent threats to cloud computing data and its prevention measures.","volume":"6","author":"R.Neware","year":"2017","journal-title":"International Journal Of Engineering Sciences & Research Technology"},{"key":"IJFC.2020010105-85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"IJFC.2020010105-86","doi-asserted-by":"crossref","unstructured":"Ning, B., Li, G., Chen, Y., & Qu, D. Distributed architecture of object naming service. Proceedings of the 3rd International Conference on Teaching and Computational Science (WTCS 2009) (pp. 251\u2013257). Academic Press.","DOI":"10.1007\/978-3-642-11276-8_32"},{"key":"IJFC.2020010105-87","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-014-9867-6"},{"key":"IJFC.2020010105-88","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.07.012"},{"key":"IJFC.2020010105-89","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"IJFC.2020010105-90","doi-asserted-by":"publisher","DOI":"10.1145\/2940296"},{"key":"IJFC.2020010105-91","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391144"},{"key":"IJFC.2020010105-92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.12"},{"key":"IJFC.2020010105-93","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064897"},{"key":"IJFC.2020010105-94","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7513863"},{"key":"IJFC.2020010105-95","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.05.001"},{"key":"IJFC.2020010105-96","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2702670"},{"key":"IJFC.2020010105-97","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2713530"},{"key":"IJFC.2020010105-98","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2715844"},{"key":"IJFC.2020010105-99","doi-asserted-by":"publisher","DOI":"10.1145\/2412096.2412098"},{"key":"IJFC.2020010105-100","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946408"},{"key":"IJFC.2020010105-101","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2015.0034"},{"key":"IJFC.2020010105-102","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3273917"},{"key":"IJFC.2020010105-103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.013"},{"key":"IJFC.2020010105-104","doi-asserted-by":"crossref","unstructured":"Shi, J., Wan, J., Yan, H., & Suo, H. (2011). A survey of cyber-physical systems. Proceedings of International Conference on Wireless Communications and Signal Processing (WCSP) (pp. 1\u20136). Academic Press.","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"IJFC.2020010105-105","doi-asserted-by":"crossref","unstructured":"Shi, Y., Ding, G., Wang, H., & Roman, H. E. (2015). The fog computing service for healthcare. Proceedings of International Symposium on Future Information and Communication Technologies for Ubiquitous Healthcare (pp. 70\u201374). Academic Press.","DOI":"10.1109\/Ubi-HealthTech.2015.7203325"},{"key":"IJFC.2020010105-106","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.016"},{"key":"IJFC.2020010105-107","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733225"},{"key":"IJFC.2020010105-108","unstructured":"Stantchev, V., Barnawi, A., Ghulam, S., Schubert, J., & Tamm, G. (2015). Smart items, fog and cloud computing as enablers of servitization in healthcare. Sensors & Transducers, 185(2), 121\u2013128. Retrieved from http:\/\/www.sensorsportal.com\/HTML\/DIGEST\/P_2610.htm"},{"key":"IJFC.2020010105-109","doi-asserted-by":"publisher","DOI":"10.15439\/2014F503"},{"key":"IJFC.2020010105-110","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"IJFC.2020010105-111","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2679740"},{"key":"IJFC.2020010105-112","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140467"},{"key":"IJFC.2020010105-113","doi-asserted-by":"crossref","unstructured":"Varshney, P., & Simmhan, Y. (2017). Demystifying fog computing: Characterizing architectures, applications and abstractions.","DOI":"10.1109\/ICFEC.2017.20"},{"key":"IJFC.2020010105-114","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.032"},{"key":"IJFC.2020010105-115","doi-asserted-by":"publisher","DOI":"10.3390\/s17040668"},{"key":"IJFC.2020010105-116","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2748956"},{"key":"IJFC.2020010105-117","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2740279"},{"key":"IJFC.2020010105-118","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2698078"},{"key":"IJFC.2020010105-119","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2747158"},{"key":"IJFC.2020010105-120","doi-asserted-by":"publisher","DOI":"10.3390\/s17081744"},{"key":"IJFC.2020010105-121","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2276477"},{"key":"IJFC.2020010105-122","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345400"},{"key":"IJFC.2020010105-123","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.035"},{"key":"IJFC.2020010105-124","doi-asserted-by":"publisher","DOI":"10.3390\/s17071611"},{"key":"IJFC.2020010105-125","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033259"},{"key":"IJFC.2020010105-126","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2015.22"},{"key":"IJFC.2020010105-127","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2574766"},{"key":"IJFC.2020010105-128","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2014.54"},{"key":"IJFC.2020010105-129","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511146"},{"key":"IJFC.2020010105-130","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"IJFC.2020010105-131","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2017.2693688"},{"key":"IJFC.2020010105-132","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0476-x"},{"key":"IJFC.2020010105-133","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2445833"},{"key":"IJFC.2020010105-134","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.016"},{"key":"IJFC.2020010105-135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666793"},{"key":"IJFC.2020010105-136","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2613529"},{"key":"IJFC.2020010105-137","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2013.73"},{"key":"IJFC.2020010105-138","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng,2016.08.018"}],"container-title":["International Journal of Fog Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=245711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T16:39:01Z","timestamp":1651768741000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJFC.2020010105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":139,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijfc.2020010105","relation":{"has-preprint":[{"id-type":"doi","id":"10.20944\/preprints201903.0145.v1","asserted-by":"object"}]},"ISSN":["2572-4908","2572-4894"],"issn-type":[{"value":"2572-4908","type":"print"},{"value":"2572-4894","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}