DOI QR코드

DOI QR Code

The Security and Privacy Issues of Fog Computing

  • Sultan Algarni (Department of Information System, Faculty of Computing and Information Technology King Abdulaziz University) ;
  • Khalid Almarhabi (Department of Computer Science, College of Computing in Al-Qunfudah Umm Al-Qura University) ;
  • Ahmed M. Alghamdi (Department of Software Engineering, College of Computer Science and Engineering University of Jeddah) ;
  • Asem Alradadi (Department of Computer Science, College of Computing in Al-Qunfudah Umm Al-Qura University)
  • 투고 : 2023.04.05
  • 발행 : 2023.04.30

초록

Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing.

키워드

참고문헌

  1. J. Ni, K. Zhang, X. Lin, and X. S. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," IEEE Commun.Surv. Tutorials, vol. 20, no. 1, pp. 601-628, 2018. https://doi.org/10.1109/COMST.2017.2762345
  2. M. Mukherjee et al., "Security and Privacy in Fog Computing: Challenges," IEEE Access, vol. 5, pp. 19293-19304, 2017. https://doi.org/10.1109/ACCESS.2017.2749422
  3. P. Hu, S. Dhelim, H. Ning, and T. Qiu, "Survey on fog computing: architecture, key technologies, applications and open issues," J. Netw. Comput. Appl., vol. 98, no. April, pp. 27-42, 2017. https://doi.org/10.1016/j.jnca.2017.09.002
  4. S. A. Rauf Abdul, Ahmed Shaikh Riaz, "Security and privacy for IoT and Fog Computing Paradigm," Learn. Technol. Conf. (L&T), 2018 15th IEEE, pp. 96-101, 2018.
  5. C. Dsouza, G. J. Ahn, and M. Taguinod, "Policy-driven security management for fog computing: Preliminary framework and a case study," Proc. 2014 IEEE 15th Int. Conf. Inf. Reuse Integr. IEEE IRI 2014, pp. 16-23, 2014.
  6. M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme," Int. J. Netw. Secur., vol. 18, no. 6, pp. 1089-1101, 2016.
  7. P. Hu, H. Ning, T. Qiu, Y. Zhang, and X. Luo, "Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things," IEEE Trans. Ind. Informatics, vol. 13, no. 4, pp. 1910-1920, 2017. https://doi.org/10.1109/TII.2016.2607178
  8. S. Yi, Z. Qin, and Q. Li, "Security and privacy issues of fog computing A Survey," pp. 1- 10, 2015.
  9. R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017. https://doi.org/10.1109/ACCESS.2017.2677520
  10. S. Basudan, X. Lin, and K. Sankaranarayanan, "A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing," IEEE Internet Things J., vol. 4, no. 3, pp. 772-782, 2017. https://doi.org/10.1109/JIOT.2017.2666783
  11. C. Li, Z. Qin, E. Novak, Q. Li, and S. Member, "Securing SDN Infrastructure of IoT - Fog Networks from MitM Attacks," vol. 4, no. 5, pp. 1156-1164, 2017.
  12. V. Odelu, A. K. Das, M. Wazid, M. Conti, and S. Member, "Provably Secure Authenticated Key Agreement Scheme for Smart Grid," vol. 9, no. 3, pp. 1900-1910, 2018.
  13. A. Wasef and X. S. Shen, "EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks," vol. 12, no. 1, pp. 78-89, 2013. https://doi.org/10.1109/TMC.2011.246
  14. J. Zhou, X. Lin, S. Member, X. Dong, Z. Cao, and S. Member, "PSMPA: Patient Self Controllable Cooperative Authentication in Distributed m-Healthcare Cloud Computing System," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693-1703, 2015. https://doi.org/10.1109/TPDS.2014.2314119
  15. X. Lin, S. Member, and X. Li, "Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks," vol. 62, no. 7, pp. 3339-3348, 2013.
  16. R. Lu, X. Lin, and T. H. Luan, "Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs," no. December 2017, 2012.
  17. R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges," Futur. Gener. Comput. Syst., vol. 78, pp. 680- 698, 2018. https://doi.org/10.1016/j.future.2016.11.009
  18. J. Valenzuela, J. Wang, and N. Bissinger, "Real-Time Intrusion Detection in Power System Operations," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1052-1062, 2013. https://doi.org/10.1109/TPWRS.2012.2224144
  19. B. Paharia, "DDoS Detection and Mitigation in cloud via FogFiter: a defence mechanism," 2018 9th Int. Conf. Comput. Commun. Netw. Technol., pp. 1-7, 2018.
  20. J. Arshad, P. Townend, and J. Xu, "An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds," pp. 1-17.
  21. A. Houmansadr, S. A. Zonouz, and R. Berthier, "A Cloud-based Intrusion Detection and Response System for Mobile Phones," IEEE/IFIP 41st Int. Conf., 2011.
  22. P. Zhang, J. K. Liu, F. R. Yu, M. Sookhak, M. H. Au, and X. Luo, "A Survey on Access Control in Fog Computing," no. February, pp. 144-149, 2018.
  23. N. Abubaker, L. Dervishi, and E. Ayday, "Privacy-preserving fog computing paradigm," 2017 IEEE Conf. Commun. Netw. Secur. CNS 2017, vol. 2017-Janua, no. Spc, pp. 502- 509, 2017.
  24. T. Wang et al., "Trajectory Privacy Preservation based on a Fog Structure for Cloud Location Services," IEEE Access, no. May, p. 1-1. 10, 2017.
  25. L. Service, "A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing Enhanced Location-Based Service," 2017.
  26. T. Wang et al., "Trajectory Privacy Preservation based on a Fog Structure for Cloud Location Services," IEEE Access, no. May, p. 1-1. 10, 2017.
  27. L. Service, "A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing Enhanced Location-Based Service," 2017.
  28. A. Alrawais et al., "Fog computing for the internet of things: Security and privacy issues," IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017. https://doi.org/10.1109/MIC.2017.37
  29. A. Ali et al., "Security and privacy issues in fog computing," Fog Computing: Theory and Practice, pp. 105-137, 2020.
  30. Tayyaba, Sahrish Khan, et al. "Software-defined networks (SDNs) and Internet of Things (IoTs): A qualitative prediction for 2020." International Journal of Advanced Computer Science and Applications, vol. 7, no. 11, 2016.
  31. M. Saad, "Fog computing and its role in the internet of things: concept, security and privacy issues," Int. J. Comput. Appl, vol. 975, no. 32, pp 0975-8887, 2018. https://doi.org/10.5120/ijca2018916829
  32. S. El Haddouti et al., "A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments." International Journal of Advanced Computer Science and Applications, vol. 13, no.3, 2022.