Fog computing: Security issues, solutions and robust practices

Fog Computing (FC) has extended the services of cloud computing to the edge of the network. It inherits some of the characteristics from cloud computing but FC also have some distinguished features such as geo-distribution, location awareness and low latency. Along with the inherited characteristics, it also inherits the issues and problems of cloud computing like energy efficiency, resource management and security issues. This paper presents the critical analysis of the fog architecture with respect to security. The state of the art work done since 2012 is critical analyzed on the bases of security techniques and security threats. We grouped the existing security techniques on the bases of security goals achieved by each. It will provide a clear and comprehensive distinction between the security areas explored and those, which still need researchers' attention.

[1]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[2]  Bo Sheng,et al.  A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.

[3]  D. C. Saste,et al.  FOG COMPUTING: Comprehensive Approach For Avoiding Data Theft Attack Using Decoy Technology , 2015 .

[4]  Donghyun Kim,et al.  On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[5]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[6]  Tanupriya Choudhury,et al.  Fog computing: Common security issues and proposed countermeasures , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[7]  Louis Wehenkel,et al.  Operating in the Fog: Security Management Under Uncertainty , 2012, IEEE Power and Energy Magazine.

[8]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[9]  Qun Li,et al.  Preserving secondary users' privacy in cognitive radio networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  A. Volokyta,et al.  Secure virtualization in cloud computing , 2012, Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science.

[11]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[12]  Levent Ertaul,et al.  Security Challenges in Cloud Computing , 2010, Security and Management.

[13]  Haibo He,et al.  A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities , 2015, ASE BD&SI.

[14]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[15]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[16]  Marthony Taguinod,et al.  Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[17]  H. Madsen,et al.  Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[18]  Alec Wolman,et al.  cTPM: A Cloud TPM for Cross-Device Trusted Applications , 2014, NSDI.

[19]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[20]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.