Forward to the Special Issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017)

Sheng Wen,Aniello Castiglione,Tian Wang,Md Zakirul Alam Bhuiyan
DOI: https://doi.org/10.1002/cpe.5535
2019-01-01
Abstract:Fog computing, a paradigm that extends cloud computing and services to the edge of the network, meets enhanced requirements by locating data, computation power, and networking capabilities closer to end nodes. Fog computing is distinguished by its accessibility to end users, particularly its support for mobility. Fog nodes are geographically distributed and are deployed near wireless access points in areas with a significant usage. Fog devices may take the form of stand-alone servers or network devices with on-board computing capabilities. Services are hosted at the network edge or even within end-user devices, such as set-top boxes or access points. This reduces service latency, improves quality of service, and provides a superior experience for the user. Fog computing supports emerging Internet of Things (IoT) applications that demand real-time or predictable latency, such as industrial automation, transportation, and networks of sensors and actuators. Due to the capability to support a wide geographical distribution, fog computing is well positioned for real-time big data analytics. Fog supports densely distributed data collection points, adding a fourth axis to the often-mentioned big data dimensions (volume, variety, and velocity). Issues of security and privacy are in fog computing, but this remains understudied particularly in the design and implementation of fog computing; such solutions may not suit fog computing devices that are at the edges of networks. In such environments, fog computing devices face threats that do not arise in a well-managed cloud environment. The aim of this special issue in Concurrency and Computation Practice and Experience (CCPE) is to promote research and reflect the most recent advances of security and privacy issues in Fog computing. It includes invited, high-quality papers presented at the 9th International Symposium on Cyberspace Safety and Security (CSS 2017). This is also an open special issue where everyone is encouraged to submit papers.
What problem does this paper attempt to address?