**5.5 Security and integrity enhancement**

Recently, IoT-generated data may represent the secret of an individual or an industry, indeed, they need to be protected in the transit phase and in-rest. The fog computing paradigm must ensure confidentiality-integrity and availability of data through efficient cryptographic algorithms. The security mechanisms offered by fog have to be light and less resource-consuming to be more adapted to the limited properties of end devices. In another hand, collected data are analyzed and treated locally in fog data centers instead of sending them through the internet to the cloud datacenter, this point helps a lot in data security reinforcement.
