Pandey, S.Bhushan, B.Hameed, A.A.Jamil, A.Juyal, A.2024-05-192024-05-19202497830315371651860-949Xhttps://doi.org/10.1007/978-3-031-53717-2_42https://hdl.handle.net/20.500.12713/43822nd International Conference on Computing, IoT and Data Analytics, ICCIDA 2023 -- 20 July 2023 through 21 July 2023 -- -- 308639In today's date, fog computing is on the rise due to its characteristics. Its ability to provide smart devices with close-by computing capabilities offers a drastic reduction in cloud traffic and more efficient data transfer. However, data security in fog computing devices is a major concern. Homomorphic Encryption (HME) Scheme is a technique that protects private data from various threats, and to improve efficiency and reduce time, it offers modification of original data after encryption without decrypting it. In this paper, we explore the various homomorphic encryption schemes that can be implemented in fog computing to protect the data and provide data security. We present a detailed architecture and various characteristics of fog computing to better visualize the use of homomorphic encryption in different areas. Further, we present the applications of homomorphic encryption in different sectors and discuss future research directions. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.eninfo:eu-repo/semantics/closedAccessFog ComputingHomomorphic Encryption SchemesImplementation of Homomorphic Encryption Schemes in Fog ComputingConference Object1145 SCI4554642-s2.0-8518797653810.1007/978-3-031-53717-2_42N/A