Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges

In this paper, we present a survey of existing privacy-preserving schemes for fog-based Internet of Things (IoT) applications. We start by describing fundamentals of fog computing architecture and presenting an overview of the fog-based IoT applications. Then we discuss major attacks in fog-based IoT applications and we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods towards secure and privacy-preserving fog-based IoT applications with respect to network model, specific security goals, performance, limitations, and complexity. Based on the existing security models, we classify privacy-preserving models for fog-based IoT applications in eight categories, including, holistic privacy, privacy-preserving aggregation, trajectory privacy, conditional privacy preservation, differential privacy, data privacy, user’s privacy, and location privacy. In addition, we highlight open research challenges and discuss possible future research directions in the privacy-preserving for fog-based IoT applications.

[1]  Sergio Barbarossa,et al.  The Fog Balancing: Load Distribution for Small Cell Cloud Computing , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[2]  Junbeom Hur,et al.  Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..

[3]  Marimuthu Palaniswami,et al.  PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[4]  Anfeng Liu,et al.  A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[5]  Tansu Alpcan,et al.  Fog Computing May Help to Save Energy in Cloud Computing , 2016, IEEE Journal on Selected Areas in Communications.

[6]  Xiaodong Lin,et al.  A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.

[7]  Albert Y. Zomaya,et al.  Trends and challenges in cloud datacenters , 2014, IEEE Cloud Computing.

[8]  Sergio Barbarossa,et al.  Small Cell Clustering for Efficient Distributed Fog Computing: A Multi-User Case , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[9]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[10]  Soumya Kanti Datta,et al.  Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).

[11]  Xuemin Shen,et al.  Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach , 2018, 2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[12]  Lei Shu,et al.  Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.

[13]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[14]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[15]  Nenghai Yu,et al.  Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing , 2018, IEEE Network.

[16]  Xiaojiang Du,et al.  Achieving differential privacy against non‐intrusive load monitoring in smart grid: A fog computing approach , 2018, Concurr. Comput. Pract. Exp..

[17]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[18]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[19]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[20]  Marthony Taguinod,et al.  Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[21]  Guozhu Liu,et al.  A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs , 2017, Sensors.

[22]  Rafail Ostrovsky,et al.  Position-Based Cryptography , 2014, SIAM J. Comput..

[23]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[24]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[25]  Joseph K. Liu,et al.  A Survey on Access Control in Fog Computing , 2018, IEEE Communications Magazine.

[26]  Song Guo,et al.  A Differential Privacy-Based Query Model for Sustainable Fog Data Centers , 2019, IEEE Transactions on Sustainable Computing.

[27]  Gongjun Yan,et al.  Security challenges in vehicular cloud computing , 2013, IEEE Transactions on Intelligent Transportation Systems.

[28]  Eui-Nam Huh,et al.  Fog Computing: The Cloud-IoT\/IoE Middleware Paradigm , 2016, IEEE Potentials.

[29]  Zhou Su,et al.  A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks , 2018, IEEE Transactions on Industrial Informatics.

[30]  Seungmin Rho,et al.  A Fog Based Middleware for Automated Compliance With OECD Privacy Principles in Internet of Healthcare Things , 2016, IEEE Access.

[31]  Leandros A. Maglaras,et al.  Enhanced Spring Clustering in VANETs with Obstruction Considerations , 2013, 2013 IEEE 77th Vehicular Technology Conference (VTC Spring).

[32]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[33]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[34]  Hao Wang,et al.  Position based cryptography with location privacy: A step for Fog Computing , 2018, Future Gener. Comput. Syst..

[35]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[36]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.