Fog Computing Security Challenges and Future Directions [Energy and Security]

The perception of fog computing is to bring a virtual presence into day-to-day objects. The lowest layer of the fog architecture is the Internet of Things (IoT), which created a revolution by changing ordinary objects into smart objects that automatically sense and process data. In the IoT, smart objects connected over the Internet communicate with each other and exchange data with the fog server to improve services to customers. There are some challenges to achieving the benefits of the IoT. This article discusses a three-layered fog architecture and highlights potential security threats and solutions at each layer. Finally, open research issues are discussed at all three layers of the fog hierarchy.

[1]  Albert Y. Zomaya,et al.  Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.

[2]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[3]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  Muhammad Waseem,et al.  A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .

[5]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[6]  Saraju P. Mohanty,et al.  Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..

[7]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[8]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[9]  Dipti Jadhav,et al.  Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[10]  Jinjun Chen,et al.  Threats to Networking Cloud and Edge Datacenters in the Internet of Things , 2016, IEEE Cloud Computing.

[11]  Deepak Puthal,et al.  Proof of Authentication: IoT-Friendly Blockchains , 2019, IEEE Potentials.