This review critically examines the role of fog computing in enhancing data security for cloud-based applications. By distributing computation closer to end devices, fog architecture improves access control, reduces latency, and limits data exposure to security threats. The study analyzes key security dimensions, including authentication, encryption, and intrusion detection, within fog-enabled systems. These insights highlight fog computing as a reliable solution for strengthening cloud security in modern distributed and IoT-driven computing environments.
For more information, click on the link below.
2024 IEEE ICTBIG (pp. 1–6).
https://ieeexplore.ieee.org/abstract/document/10911070