Fig. 3From: Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspectiveFlowchart of fog content delivery [34]Back to article page