|
Reference | Solution | Advantages |
|
[54] | An innovative fog security service | Uses identity-based signature and encryption to effectively protect the sensitive data transmitted to the fog node |
[56, 57] | Two detection techniques | Detects malicious code attacks stably |
[58] | A hybrid detection technology | Extends cloud-based detection technology to fog nodes |
[59ā61] | Offloading schemes driven by the improved strength Pareto evolutionary algorithm | Uses the multicriterion decision technique and similarity prioritization technique to protect privacy with minimized service delay |
[62] | An efficient centralized security architecture based on fog environment | Protects the privacy of patients and the security of medical data through the device-edge-cloud transmission route |
[17] | A service recommendation method based on amplified location-sensitive hash | Ensures privacy security of distributed quality data during cross-platform communication from multiple platforms |
[63] | A new fog choreography concept | Realizes the security and efficient delivery of the service |
[64] | A middleware featuring end-to-end security for cloud-fog communications | Uses middleware to provide fast, light-weight, and resource-aware security for a wide variety of IoT applications |
[65] | A hierarchical data aggregation scheme for efficient privacy protection | Prevents personal privacy leaks while resisting external attacks |
[66] | A security model based on fog-IoT network | Introduces the active security scheme with low latency and ultratrustworthiness into fog-IoT network |
|