Research Article

An Invocation Chain Test and Evaluation Method for Fog Computing

Figure 1

The security test model of fog computing.