On security and privacy issues of fog computing supported Internet of Things environment (original) (raw)
Related papers
Security Challenges in Fog Computing
Advances in Wireless Technologies and Telecommunication, 2019
Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, sec...
Various Security issues and Its Solutions in the Domain of Fog Computing
ICETC – 2022, 2022
Society is moving Internet of things (IoT) devices. Fog Computing is suitable for dealing with IoT devices. Fog computing (FC) is an extension of cloud computing. Fog represents the computing services near the end devices. Thousands of edge devices interconnect and take the services from FC. Those edge devices generate a massive amount of data. The security of that crucial data and a user's privacy is essential. This article highlights a few possible security threats at all architectural levels of FC. Along with that, we discuss some solutions against the loopholes in fog security. We aggregate all the solutions that will help future researchers.
Security Implications of Fog Computing on the Internet of Things
2019 IEEE International Conference on Consumer Electronics (ICCE), 2019
Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security related problems that arise with the employment of fog computing by IoT. According to our findings, although this integration seems to be non-trivial and complicated, it has more benefits than the implications.
Enhancing Security of Internet of Things (IoT) using Fog Computing
SSRN Electronic Journal, 2019
Open nature of Internet connectivity architectures have resulted new threats and challenges for the security community are emerging. Hackers may exploit critical vulnerabilities in a wide range of IoT and edge-fog applications and devices. Internet of Things is referred as interconnected physics devices through internet to solve real world problems. Hence the participating devices of IoT can be administered from anywhere even everywhere. As a part of ubiquitous computing, devices of IoT may include any wearable gadget, smart measurement machines, mobile devices of vehicles which may further lead to Cloud, Big Data applications. Since devices of IoT are operated in internet enabled environment which is basically a data centric infrastructure, misuse of participating devices of an IoT solution is serious concern to avoid the manipulated or misguided wrongdoing of device. The advancements in embedded Systems-on-a-Chip (SoCs) have significantly increased the commercial devices and also extended the potential of the Internet of Things (IoT) in parallel. Not like earlier, IoT are now capable to handle he computing capacity of today's things and also allow devices to perform complex computations on-site, resulted in edge computing. Fog computing enables IoT devices to take decision and then act accordingly. Introduction of fog computing in an IoT infrastructure enables the use of "Fog Nodes" which are much capable against attacks to the infrastructure, even they can take decision to act against such conditions. This paper aims to study IoT infrastructure, IoT security concerns and then use of fog computing to meet IoT security goals.
2021
To overcome the problem related to cloud computing such as high latency and to increase the efficiency of data processing, Fog computing was proposed and implemented close to IoT devices. This structure helps these devices to meet the requirements of location awareness and low latency, which can not be met by cloud computing. Many benefits, applications, and security and privacy issues were discussed in the literature for Fog computing. This paper provides an overview of all these aspects to provide the reader with a holistic understanding of Fog computing. More focus is given to the security and privacy issues in our discussion since these issues may hinder organizations from implementing Fog computing. The findings of this paper show that a few studies that discussed empirical findings of using Fog computing and many questions related to security and privacy issues are ye to be answered in future research.
International Journal of Emerging Trends in Engineering Research (IJETER), 2021
These days, the Internet of Things applications are growing progressively. However, the existing frameworks for IoT applications are notsatisfied the security, allocation, and provisioning requirements.We propose a novel secure IoT application framework. Fog cloud execution model is serverless computing which is run by the server in cloud provider and the allocation of machine resources is dynamically managed. The application which consumes the actual amount of resources, the pricing is based upon that rather on pre-purchase units of capacity. The proposed framework consists of different methods, such as secure mobility, resource allocation, provisioning, and prediction under blockchain technologies
IAEME PUBLICATION, 2020
Today, there exist intercommunication and interconnection among numerous devices as a result of the emergence of Internet of Things (IoT) that has caused unprecedented production of significant data, referred to as data explosion. Over the years, cloud computing has played a critical part in processing and storing such data. However, cloud computing still experiences various challenges such as limitation of network bandwidth and real-time increasing demands that cannot be overcome solely by cloud computing technology. Hence, fog computing-a novel computing paradigm emerged as a complement to the solution of cloud computing. Essentially, fog computing enhances the services of the cloud to the edge of the network by ensuring end-users and edge devices communicate, compute, and store data efficiently. Such achievements are achieved by improving security, network bandwidth, mobility, as well as low latency. Thus, the current research paper surveys and summarizes fog computing and cloud computing to depict \their architectures, main technologies, applications, as well as related security challenges. Firstly, the paper explores the fog computing architecture in relation to cloud computing architecture before discussing their key technologies such as computing and communication. It goes further to address several applications of the two technologies. Finally, the paper provides related security issues that require further research to enhance technologies
Fog Computing Architecture, Applications and Security Issues: A Survey
The development of the Internet of Things (IoT) has triggered a virtual wave of interconnection and intercommunication among an enormous number of universal things. This has caused an exceptional surge of colossal heterogeneous information, known as an information explosion. Until now, cloud computing has filled in as a proficient method to process and store these data. Still, it came to light that by utilizing just cloud computing, pesky issues like, the expanding requests of actual-time or speed-sensitive applications and the restrictions on system transfer speed could not be solved. Consequently, another computing platform, called fog computing has been advanced as a supplement to the cloud arrangement. Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed a...
Fog Computing: Security Challenges and Countermeasures
Fog Computing: Security Challenges and Countermeasures, 2020
Innovative technologies such as cloud computing systems provide global cooperative services for end users and medium-large companies. Fog computing extends cloud computing storage networking and computing capabilities to edge and backbone servers on the cloud for Internet of Things (IoT) devices, to optimize efficiency with low latency, location awareness, and geographical distribution applications. One of the considerable difficulties facing fog computing systems is security and privacy challenges. This survey reviews current fog computing system architectures, their features, security challenges associated with IoT devices, and existing countermeasures, in order to guide researchers to find comprehensive solutions to reduce the security risks related to fog computing systems. General Terms IoT security challenges and Countermeasures
Fog Computing, Applications, Security and Challenges, Review
International Journal of Engineering & Technology, 2018
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-...