A Privacy Preserving Model for Fog-enabled MCC systems using 5G Connection

Privacy issues in Cloud Computing are one of the major concerns for many individuals and companies around the world, and still a challenge for research and industry. The appearance of the 5G technology and the latest advances in Mobile Cloud Computing gave way to fog-enabled systems that represent the future of current cloud systems. Accordingly, the Fog concept had been proposed in 2013 to enhance the IoT-Cloud operations in terms of latency and reliability. In this paper we analyze and categorize surveys addressing privacy issues of these complex systems, and propose PFMCC, a model for preserving Privacy in Fog-enabled Mobile Cloud Computing systems using 5G connection. The PFMCC model consists of three components interacting with each other to preserve data privacy, usage privacy, location privacy and high mobility. We also present three algorithms to perform privacy-aware computation offloading to the fog.

[1]  Marimuthu Palaniswami,et al.  PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[2]  Shantanu Sharma,et al.  A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..

[3]  Xianbin Wang,et al.  Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.

[4]  Mauro Conti,et al.  A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.

[5]  Song Guo,et al.  A Differential Privacy-Based Query Model for Sustainable Fog Data Centers , 2019, IEEE Transactions on Sustainable Computing.

[6]  Mats Näslund,et al.  Subscription identifier privacy in 5G systems , 2017, 2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT).

[7]  A Khalid Privacy and Security Problems in Fog Computing , 2016 .

[8]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[9]  Geetha Kurikala,et al.  Fog Computing : Implementation of Security and Privacy to Comprehensive Approach for Avoiding Knowledge Thieving Attack Exploitation Decoy Technology , 2017 .

[10]  Yonghong Chen,et al.  Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services , 2017, IEEE Access.

[11]  T. Noble Foster,et al.  Navigating Through the Fog of Cloud Computing Contracts, 30 J. Marshall J. Info. Tech. & Privacy L.13 (2013) , 2013 .

[12]  T Veerraju,et al.  A survey on fog computing: research challenges in security and privacy issues , 2018 .

[13]  Hyunjae Nam,et al.  Security and Privacy Issues of Fog Computing , 2017 .

[14]  Lene Tolstrup Sørensen,et al.  Introduction to the Minitrack on Privacy, 5G and Economics , 2018, HICSS.

[15]  Edward Roback,et al.  SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .

[16]  Knud Erik Skouby,et al.  Privacy and Economics in a 5G Environment , 2017, Wirel. Pers. Commun..

[17]  Andrey Brito,et al.  Lightweight privacy for smart metering data by adding noise , 2014, SAC.

[18]  Imane Aly Saroit,et al.  Secure and privacy-preserving AMI-utility communications via LTE-A networks , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[19]  Arun Kumar Sangaiah,et al.  Cognitive Computing for Big Data Systems Over IoT , 2018 .

[20]  Arpan Kumar Kar,et al.  Critical Success Factors to Establish 5G Network in Smart Cities: Inputs for Security and Privacy , 2017, J. Glob. Inf. Manag..

[21]  Aiqing Zhang,et al.  Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing , 2017, IEEE Communications Magazine.

[22]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[23]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[24]  Erman Ayday,et al.  Privacy-preserving fog computing paradigm , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[25]  Neha Shrikant Dhande,et al.  FOG COMPUTING: REVIEW OF PRIVACY AND SECURITY ISSUES , 2015 .

[26]  Hao Wang,et al.  Position based cryptography with location privacy: A step for Fog Computing , 2018, Future Gener. Comput. Syst..

[27]  Y. Krishnaveni,et al.  A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2018 .

[28]  Ragib Hasan,et al.  Towards an Analysis of the Architecture, Security, and Privacy Issues in Vehicular Fog Computing , 2019, 2019 SoutheastCon.

[29]  Mohamed Amine Ferrag,et al.  Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges , 2018, 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT).

[30]  Antonios Argyriou,et al.  Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..

[31]  Irp India Literature review: Cloud Computing –Security Issues, Solution and Technologies , 2014 .

[32]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[33]  Younghan Kim,et al.  Gap analysis for adapting the distributed mobility management model in 4G/5G mobile networks , 2017, 2017 IEEE Conference on Network Softwarization (NetSoft).

[34]  Raimo Kantola,et al.  Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing , 2017 .

[35]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[37]  Elfed Lewis,et al.  FPGA based Real time 'secure' body temperature monitoring suitable for WBSN 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing , 2015 .

[38]  Sz. Varadi,et al.  Legal Issues of Social IoT Services: The Effects of Using Clouds, Fogs and AI , 2020 .