A Fog Computing-based Framework for Privacy Preserving IoT Environments (original) (raw)
Related papers
International Journal of Emerging Trends in Engineering Research (IJETER), 2021
These days, the Internet of Things applications are growing progressively. However, the existing frameworks for IoT applications are notsatisfied the security, allocation, and provisioning requirements.We propose a novel secure IoT application framework. Fog cloud execution model is serverless computing which is run by the server in cloud provider and the allocation of machine resources is dynamically managed. The application which consumes the actual amount of resources, the pricing is based upon that rather on pre-purchase units of capacity. The proposed framework consists of different methods, such as secure mobility, resource allocation, provisioning, and prediction under blockchain technologies
On security and privacy issues of fog computing supported Internet of Things environment
2015 6th International Conference on the Network of the Future (NOF), 2015
Recently, the concept of Internet of Things (IoT) is attracting much attention due to the huge potential. IoT uses the Internet as a key infrastructure to interconnect numerous geographically diversified IoT nodes which usually have scare resources, and therefore cloud is used as a key back-end supporting infrastructure. In the literature, the collection of the IoT nodes and the cloud is collectively called as an IoT cloud. Unfortunately, the IoT cloud suffers from various drawbacks such as huge network latency as the volume of data which is being processed within the system increases. To alleviate this issue, the concept of fog computing is introduced, in which foglike intermediate computing buffers are located between the IoT nodes and the cloud infrastructure to locally process a significant amount of regional data. Compared to the original IoT cloud, the communication latency as well as the overhead at the backend cloud infrastructure could be significantly reduced in the fog computing supported IoT cloud, which we will refer as IoT fog. Consequently, several valuable services, which were difficult to be delivered by the traditional IoT cloud, can be effectively offered by the IoT fog. In this paper, however, we argue that the adoption of IoT fog introduces several unique security threats. We first discuss the concept of the IoT fog as well as the existing security measures, which might be useful to secure IoT fog. Then, we explore potential threats to IoT fog.
Towards Privacy Preserving IoT Environments A Survey.pdf
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. However, with the increasing wide adoption of IoT, it comes significant privacy concerns to lose control of how our data is collected and shared with others. As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption. The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. In this survey, we review existing research and proposed solutions to rising privacy concerns from a multi-point of view to identify the risks and mitigations. First, we provide an evaluation of privacy issues and concerns in IoT systems due to resource constraints. Second, we describe proposed IoT solutions that embrace a variety of privacy concerns such as identification, tracking, monitoring and profiling. Lastly, we discuss the mechanisms and architectures for protecting IoT data in case of mobility/permanence at the device layer, infrastructure/platform layer, and application layer.
2021
To overcome the problem related to cloud computing such as high latency and to increase the efficiency of data processing, Fog computing was proposed and implemented close to IoT devices. This structure helps these devices to meet the requirements of location awareness and low latency, which can not be met by cloud computing. Many benefits, applications, and security and privacy issues were discussed in the literature for Fog computing. This paper provides an overview of all these aspects to provide the reader with a holistic understanding of Fog computing. More focus is given to the security and privacy issues in our discussion since these issues may hinder organizations from implementing Fog computing. The findings of this paper show that a few studies that discussed empirical findings of using Fog computing and many questions related to security and privacy issues are ye to be answered in future research.
Enhancing Security of Internet of Things (IoT) using Fog Computing
SSRN Electronic Journal, 2019
Open nature of Internet connectivity architectures have resulted new threats and challenges for the security community are emerging. Hackers may exploit critical vulnerabilities in a wide range of IoT and edge-fog applications and devices. Internet of Things is referred as interconnected physics devices through internet to solve real world problems. Hence the participating devices of IoT can be administered from anywhere even everywhere. As a part of ubiquitous computing, devices of IoT may include any wearable gadget, smart measurement machines, mobile devices of vehicles which may further lead to Cloud, Big Data applications. Since devices of IoT are operated in internet enabled environment which is basically a data centric infrastructure, misuse of participating devices of an IoT solution is serious concern to avoid the manipulated or misguided wrongdoing of device. The advancements in embedded Systems-on-a-Chip (SoCs) have significantly increased the commercial devices and also extended the potential of the Internet of Things (IoT) in parallel. Not like earlier, IoT are now capable to handle he computing capacity of today's things and also allow devices to perform complex computations on-site, resulted in edge computing. Fog computing enables IoT devices to take decision and then act accordingly. Introduction of fog computing in an IoT infrastructure enables the use of "Fog Nodes" which are much capable against attacks to the infrastructure, even they can take decision to act against such conditions. This paper aims to study IoT infrastructure, IoT security concerns and then use of fog computing to meet IoT security goals.
Secure and Privacy-Oriented Archi- Tecture with Open Cloud Computing for Internet of Things Devices
2019
Smart devices and sensors are key empowering resources regarding the Internet of Things (IoT) paradigm to gather user’s sensed information and facts. However, getting involved in collecting user’s sensed data for further processing is definitely not very easy. This is because difficulties associated with application heterogeneity, as well as, the security and privacy that now have eliminated the grow of many sensing networks intended for systematic data gathering. Majority of the current researches state that increasing the superiority of IoT services, can be boost through implementing cloud computing approach. For this reason, it is very vital to be aware of the security and privacy aspects among the setting of cloud computing and as well, recognize the ideal properties and as well, the threats that may help and support design secure IoT based architecture. Therefore, this paper is exploring the concept behind the buildup of cloud computing and as well, examines its significance fo...
Towards Privacy Preserving IoT Environments: A Survey
Wireless Communications and Mobile Computing, 2018
The Internet of Things (IoT) is a network of Internet-enabled devices that can sense, communicate, and react to changes in their environment. Billions of these computing devices are connected to the Internet to exchange data between themselves and/or their infrastructure. IoT promises to enable a plethora of smart services in almost every aspect of our daily interactions and improve the overall quality of life. However, with the increasing wide adoption of IoT, come significant privacy concerns to lose control of how our data is collected and shared with others. As such, privacy is a core requirement in any IoT ecosystem and is a major concern that inhibits its widespread user adoption. The ultimate source of user discomfort is the lack of control over personal raw data that is directly streamed from sensors to the outside world. In this survey, we review existing research and proposed solutions to rising privacy concerns from a multipoint of view to identify the risks and mitigatio...
Preserving privacy in internet of things: a survey
International journal of information technology, 2018
Internet of things (IOT) paradigm is changing day to day lives towards sophisticated automation and enhancing living standards of our societies. The most of ''Things'' in IOT are having limited power, storage, and computational capabilities. Therefore data is collected, manipulated and stored in the clouds. The benefit of ''anytime and anywhere'' access of data gives rise to serious security and privacy issues and lead to many problems like exposure of user's personal and sensitive information and loss of the trust between parties. These challenges need to be addressed with adequately with utmost care. From an operational point of view, the major concern for IOT is ''Privacy''. In this article, we discuss difference between privacy and security. Further, and present several approaches and techniques that are being used to fulfill the privacy requirements. This comparative study also contains advantages and disadvantages of the mentioned approaches. Finally, we discuss the future opportunities, trends, and provide recommendations about the privacy for IOT based applications and services.
The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organizations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that is provided by federations of such IoT devices (which are often referred to as IoT things) provides unprecedented opportunities to solve internet-scale problems that have been too big and too difficult to tackle before. Just like other web-based information systems, IoT must also deal with the plethora of Cyber Security and privacy threats that currently disrupt organisations and can potentially hold the data of entire industries and even countries for ransom. To realize its full potential, IoT must deal effectively with such threats and ensure the security and privacy of the information collected and distilled from IoT devices. However, IoT presents several unique challenges that make the application of existing security and privacy techniques difficult. This is because IoT solutions encompass a variety of security and privacy solutions for protecting such IoT data on the move and in store at the device layer, the IoT infrastructure/platform layer, and the IoT application layer. Therefore, ensuring end-to-end privacy across these three IoT layers is a grand challenge in IoT. In this paper, we tackle the IoT privacy preservation problem. In particular, we propose innovative techniques for privacy preservation of IoT data, introduce a privacy preserving IoT Architecture, and also describe the implementation of an efficient proof of concept system that utilizes all these to ensure that IoT data remains private. The proposed privacy preservation techniques utilise multiple IoT cloud data stores to protect the privacy of data collected from IoT. The proposed privacy preserving IoT Architecture and proof of concept implementation are based on extensions of OpenIoT -a widely used open source platform for IoT application development. Experimental evaluations are also provided to validate the efficiency and performance outcomes of the proposed privacy preserving techniques and architecture.
Privacy Enhancing for Fog Computing based - IoT
International Journal of Wireless and Microwave Technologies, 2023
With the massive inflation of newly developed technologies, recourse to data has become a necessity in light of the current inflation and excessive need dominating the world and developed societies. According to the control of millions of smart devices and sensors connected to an interconnected and controlled automated system within installed scales due to the services provided by IOT devices through the created fog layer that connects the cloud centers and those devices, in addition, very large amounts of that data including public and private are passed through the connection of Internet of Things devices to each other. Smart and advanced networks as one of the fog computing applications play a prominent and accurate role in the infrastructure for reliable and sound data transmission. Accordingly, the process of data aggregation is an important and common matter in the world of fog-enhancing Internet of Things, so preserving the privacy of that data is a matter of concern, and based on this principle, we propose in this paper a model for data aggregation that maintains privacy using a foggy computing environment called PPFDA (privacy preserving based-fog computing data aggregation). We use in our scheme DF homomorphic cryptosystem as it consider one of the aggregation models that ensures the privacy purpose. The theoretical results and analyzes show that our design is ensuring the privacy of data during collection using an algorithm of DF. The results confirm that the proposed scheme achieves security and privacy purposes in modern network systems for the Internet of things based in fog computing. In addition, it contributes significantly to the efficient performance of storage operations.