Fig. 2From: Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspectiveFog computing services and components at each layer [26]Back to article page