This SpringerBrief covers the security and privacy challenges in fog computing and proposes a
new secure and privacy-preserving mechanisms to resolve these challenges for securing
fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT
applications and the security and privacy challenges in fog computing. Chapter 2 reviews
several promising privacy-enhancing techniques and illustrates examples on how to leverage
these techniques to enhance the privacy of users in fog computing. Specifically the authors
divide the existing privacy-enhancing techniques into three categories: identity-hidden
techniques location privacy protection and data privacy enhancing techniques. The research is
of great importance since security and privacy problems faced by fog computing impede the
healthy development of its enabled IoT applications. With the advanced privacy-enhancing
techniques the authors propose three secure and privacy-preserving protocols for fog computing
applications including smart parking navigation mobile crowdsensing and smart grid. Chapter 3
introduces identity privacy leakage in smart parking navigation systems and proposes a
privacy-preserving smart parking navigation system to prevent identity privacy exposure and
support efficient parking guidance retrieval through road-side units (fogs) with high
retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage
during task allocation in mobile crowdsensing and propose a strong privacy-preserving task
allocation scheme that enables location-based task allocation and reputation-based report
selection without exposing knowledge about the location and reputation for participators in
mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid and proposes
an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to
achieve real-time measurement collection with privacy-enhanced data aggregation. Finally
conclusions and future research directions are given in Chapter 6. This brief validates the
significant feature extension and efficiency improvement of IoT devices without sacrificing the
security and privacy of users against dishonest fog nodes. It also provides valuable insights
on the security and privacy protection for fog-enabled IoT applications. Researchers and
professionals who carry out research on security and privacy in wireless communication will
want to purchase this SpringerBrief. Also advanced level students whose main research area is
mobile network security will also be interested in this SpringerBrief.