3 Approaches to Fog Node Security

Posted October 30, 2018 in Data Analytics & Digital Technologies

With the deployment of next-generation mobile networks, IoT and edge, and fog and cloud computing, the tech world is undergoing the largest-ever overhaul of its information service infrastructure. In this connected-everything/data-everywhere model, the benefits are numerous, but so are the challenges to system security. The OpenFog Reference Architecture for fog computing has emerged as a highly credible paradigm for architecting compute-intensive solutions for networks and applications that utilize IoT, 5G technologies, and AI. This Advisor describes three distinct aspects of an approach to node-centric security in an open, interoperable fog computing environment that are critical to understanding how fog bridges gaps in the continuum between the cloud and things.

About The Author
Frank Michaud
Frank Michaud is a Technical Leader at Cisco Systems. He is an embedded and distributed security technology expert with more than 15 years’ experience. Mr. Michaud currently focuses on privacy, Internet of Things (IoT), and fog computing security. He leads fog computing security and privacy innovation projects with engineers, innovation centers, partners, and startups. Mr. Michaud serves as cochair of the Security Working Group of the OpenFog… Read More
John Zao
John K. Zao is Associate Professor in the Computer Science Department of Taiwan Chiao Tung University. He is founding chair of the IEEE Standard Working Group on Fog Computing and Networking Architecture Framework, the founding vice chair of the IEEE Standard Committee on Edge/Fog/Cloud Communications with IoT and Big Data, and cochair of the Security Working Group of the OpenFog Consortium. Before returning to Asia, Dr. Zao served as Senior/… Read More
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.