Security Issues in Fog Computing for Internet of Things

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing. Security Issues in Fog Computing for Internet of Things

[1]  Gary B. Wills,et al.  Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .

[2]  Gary B. Wills,et al.  An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things , 2017, IoTBDS.

[3]  Pradeep Reddy,et al.  A Hybrid Meta-Heuristic Approach for QoS-Aware Cloud Service Composition , 2018, Int. J. Web Serv. Res..

[4]  Praveen Kumar Reddy,et al.  Applications of Domain-Specific Predictive Analytics Applied to Big Data , 2019 .

[5]  S.Bharath Bhushan,et al.  A Four-level Linear Discriminant Analysis Based Service Selection in the Cloud Environment , 2016 .

[6]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[7]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[8]  S. Bharath Bhushan,et al.  A Network QoS Aware Service Ranking Using Hybrid AHP-PROMETHEE Method in Multi-Cloud Domain , 2016 .

[9]  Burak Kantarci,et al.  Anomaly detection and privacy preservation in cloud-centric Internet of Things , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[10]  Wolfgang Kastner,et al.  Extending the EPCIS with Building Automation Systems: A New Information System for the Internet of Things , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[11]  Vaishali Ravindra Thakare,et al.  Multi-Layer Token Based Authentication Through Honey Password in Fog Computing , 2018 .