Please use this identifier to cite or link to this item:
http://hdl.handle.net/20.500.12323/6152
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Adepoju, Alamu Luke | - |
dc.date.accessioned | 2022-11-11T08:13:39Z | - |
dc.date.available | 2022-11-11T08:13:39Z | - |
dc.date.issued | 2022-05 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.12323/6152 | - |
dc.description.abstract | With the increased growth of the application domains of IoT and the associated volumes of data generation, IoT systems are complicated and have small storage and recycling capacity. The cloud, a primary IoT storage medium with countless benefits, is not ideal for processing real time IoT data without delays. Capacity of data generated by IoTs keep increasing rampantly with associated security risks and privacy-preserving problems. Therefore, privacy maintenance, confidentiality and integrity of user’s data, improved latency and bandwidth restrictions are some of the major respective challenges of cloud computing. Fog computing is therefore a novel paradigm and an extension of the cloud. Which aims to improve cloud efficiency by enabling IoTs to locally process data before cloud transmission. However, some of the issues present in cloud such as the establishment of connection between edge devices often raise security and privacy concerns are also inherent in fog. The goal of this study, however, is to look at the state of data management security and privacy in a fog computing environment by reviewing existing security frameworks and data privacy procedures. This study lays bare the security vulnerabilities that exist inside the fog environment, creating hazards to user data privacy and security, and in lieu of that, this study incorporates features of data in addition to the acquired facts and statistics. Privacy-preservation is key to the continued use of services within the context of internet usage, as a result respondents indicated that they were experienced internet users who have been using the internet and its associated resources for various purposes, however respondents neither agreed nor disagreed with the possibility of the tracking or monitoring of their usage of the internet. The perception of respondents influenced the usage of the internet and various computing devices. | en_US |
dc.language.iso | en | en_US |
dc.subject | fog data security | en_US |
dc.subject | data quality | en_US |
dc.subject | Fog data management | en_US |
dc.title | The impact of security and privacy issues on data management in fog Computing | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Thesis |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
The impact of security and privacy issues on data management in fog Computing.pdf | 1.36 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.