I am planning to write about fog computing security and privacy and looking for tool/s to simulate fog computing security (authentication, authorization, and access) and privacy. Is there any specific tool/s to simulate above requirement?
And would not it be better to conduct research on a selected example, an existing cloud connected to a specific database system functioning in a specific company instead of creating, building from the beginning analogical solutions as simulations, as model structures?
To simulate privacy and security in fog based environment are Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. As a new paradigm of computing, fog computing is still not a full-fledged concept in the community. fog computing is considered as an extension of the cloud computing to the edge of the network, which is a highly virtualized platform of resource pool that provides computation, storage, and networking services to nearby end users. In the perspective of work [38], they have defined fog computing as “a scenario where a huge number of heterogeneous (wireless and sometimes autonomous) ubiquitous and decentralised devices communicate and potentially cooperate among them and with the network to perform storage and processing tasks without the intervention of third parties. Fog computing has its advantages due to its edge location, and therefore is able to support applications (e.g. gaming, augmented reality, real time video stream processing) with low latency requirements
Thank you, I assumed that It may not look easy to simulate fog computing security unless we have a platform. However, can I use iFogSim, and DEVS to simulate fog computing concept especially for health / wearable devices?