Review Article

A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment

Table 3

Work summary of security and privacy based on fog for IoT applications.

ReferenceSolutionAdvantages

[54]An innovative fog security serviceUses identity-based signature and encryption to effectively protect the sensitive data transmitted to the fog node
[56, 57]Two detection techniquesDetects malicious code attacks stably
[58]A hybrid detection technologyExtends cloud-based detection technology to fog nodes
[59ā€“61]Offloading schemes driven by the improved strength Pareto evolutionary algorithmUses the multicriterion decision technique and similarity prioritization technique to protect privacy with minimized service delay
[62]An efficient centralized security architecture based on fog environmentProtects the privacy of patients and the security of medical data through the device-edge-cloud transmission route
[17]A service recommendation method based on amplified location-sensitive hashEnsures privacy security of distributed quality data during cross-platform communication from multiple platforms
[63]A new fog choreography conceptRealizes the security and efficient delivery of the service
[64]A middleware featuring end-to-end security for cloud-fog communicationsUses middleware to provide fast, light-weight, and resource-aware security for a wide variety of IoT applications
[65]A hierarchical data aggregation scheme for efficient privacy protectionPrevents personal privacy leaks while resisting external attacks
[66]A security model based on fog-IoT networkIntroduces the active security scheme with low latency and ultratrustworthiness into fog-IoT network