dc.contributor.author | Kimeu, Japheth | |
dc.contributor.author | Mtoi, Mary | |
dc.contributor.author | Riwa, Janeth | |
dc.contributor.author | Sinde, Ramadhani | |
dc.date.accessioned | 2024-05-27T11:36:33Z | |
dc.date.available | 2024-05-27T11:36:33Z | |
dc.date.issued | 2023-10-31 | |
dc.identifier.uri | https://doi.org/10.1109/AFRICON55910.2023.10293490 | |
dc.identifier.uri | https://dspace.nm-aist.ac.tz/handle/20.500.12479/2681 | |
dc.description | This research article was published in the IEEE Xplore, 2023 | en_US |
dc.description.abstract | Cloud computing in IoT systems enables flexible design with distributed data, infrastructure, and resources accessible from diverse industrial settings. The tremendous rise of the Internet of Things (IoT) has posed numerous issues to the centralized cloud computing architecture which are solved by fog computing. A passive rogue fog node acting as a man-in-the-middle attack poses a significant security vulnerability in the cloud fog layer, compromising data confidentiality and making identification difficult. This survey paper proposes an Intrusion Detection System (IDS) to protect the fog layer from the Man-in-the-Middle Attack (MitM/MITM/MiTM) which is present in the rogue node. Literature review methodology is employed to study various scientific articles providing a comprehensive survey of the existing security and privacy concerns in cloud computing. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE AFRICON | en_US |
dc.subject | Cloud computing | en_US |
dc.subject | Data privacy | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Distributed databases | en_US |
dc.subject | Computer architecture | en_US |
dc.title | Internet of Things Security in Cloud: A Review on Fog Layer Security | en_US |
dc.type | Article | en_US |