Chandramohan
Fog enabled IoT services share similarities with the data stream processing scenario in which stream produces several data in real time and stream gathers these data. Data encryption and standard access control models such as role based access control, it have been used to secure data stream processing. System Architecture of fog computing enables system users and it might have any personal device such as a laptop or a smart phone to contact the fog computing system and request the execution of a certain service.
Fog computing, Edge Computing, IoT, Cloud Computing, Privacy, Security.