We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Fog Computing: Security Challenges and Countermeasures

by Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 15
Year of Publication: 2020
Authors: Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi
10.5120/ijca2020920648

Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi . Fog Computing: Security Challenges and Countermeasures. International Journal of Computer Applications. 175, 15 ( Aug 2020), 30-36. DOI=10.5120/ijca2020920648

@article{ 10.5120/ijca2020920648,
author = { Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi },
title = { Fog Computing: Security Challenges and Countermeasures },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2020 },
volume = { 175 },
number = { 15 },
month = { Aug },
year = { 2020 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number15/31531-2020920648/ },
doi = { 10.5120/ijca2020920648 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:08.775411+05:30
%A Zain Ashi
%A Mohammad Al-Fawa'reh
%A Mustafa Al-Fayoumi
%T Fog Computing: Security Challenges and Countermeasures
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 15
%P 30-36
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Innovative technologies such as cloud computing systems provide global cooperative services for end users and medium-large companies. Fog computing extends cloud computing storage networking and computing capabilities to edge and backbone servers on the cloud for Internet of Things (IoT) devices, to optimize efficiency with low latency, location awareness, and geographical distribution applications. One of the considerable difficulties facing fog computing systems is security and privacy challenges. This survey reviews current fog computing system architectures, their features, security challenges associated with IoT devices, and existing countermeasures, in order to guide researchers to find comprehensive solutions to reduce the security risks related to fog computing systems.

References
  1. A. Samuel and C. Sipes, “Making Internet of Things Real,” IEEE Internet Things Mag., vol. 2, no. 1, pp. 10–12, Sep. 2019, doi: 10.1109/IoTm.2019.1907777.
  2. Z. Hong, W. Chen, H. Huang, S. Guo, and Z. Zheng, “Multi-Hop Cooperative Computation Offloading for Industrial IoT-Edge-Cloud Computing Environments,” IEEE Trans. Parallel Distrib. Syst., vol. 30, no. 12, pp. 2759–2774, Dec. 2019, doi: 10.1109/TPDS.2019.2926979.
  3. H. Flores et al., “Large-scale Offloading in the Internet of Things.”[online].Available:https://github.com/mobile-cloudcomputing/ScalingMobileCodeOffloading.
  4. J. Ni, K. Zhang, X. Lin, and X. S. Shen, “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions,” IEEE Commun. Surv. Tutorials, vol. 20, no. 1, pp. 601–628, Jan. 2018, doi:
  5. 10.1109/COMST.2017.2762345.
  6. R. Garg, S. Varadi, and A. Kertesz, “Legal Considerations of IoT Applications in Fog and Cloud Environments,” in Proceedings - 27th Euromicro International Conference on Parallel, Distributed and NetworkBased Processing, PDP 2019, Mar. 2019, pp. 193–198, doi: 10.1109/EMPDP.2019.8671620.
  7. M. Mukherjee et al., “Security and Privacy in Fog Computing: Challenges,” IEEE Access, vol. 5, pp. 19293–19304, Sep. 2017, doi10.1109/ACCESS.2017.2749422.
  8. K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, “On Security and Privacy Issues of Fog Computing supported Internet of Things Environment.”
  9. “Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn,” 2015.
  10. A. Munir, P. Kansakar, and S. U. Khan, “IFCIoT: Integrated Fog Cloud IoT: A novel architectural paradigm for the future Internet of Things,” IEEE Consum. Electron. Mag., vol. 6, no. 3, pp. 74–82, Jul. 2017, doi: 10.1109/MCE.2017.2684981.
  11. P. Varshney and Y. Simmhan, “Demystifying Fog Computing: Characterizing Architectures, Applications and Abstractions,” Proc. - 2017 IEEE 1st Int. Conf. Fog Edge Comput. ICFEC 2017, no. 100, pp. 115–124, 2017, doi: 10.1109/ICFEC.2017.20.
  12. K. Dantu, S. Y. Ko, and L. Ziarek, “RAINA: Reliability and Adaptability in Android for Fog Computing,” IEEE Commun. Mag., vol. 55, no. 4, pp. 41–45, 2017, doi: 10.1109/MCOM.2017.1600901.
  13. S. Sarkar, S. Chatterjee, and S. Misra, “Assessment of the Suitability of Fog Computing in the Context of Internet of Things,” IEEE Trans. Cloud Comput., vol. 6, no. 1, pp. 46–59, 2018, doi: 10.1109/TCC.2015.2485206.
  14. B. Z. Abbasi and A. Shah, “Fog Computing: Security Issues, Solutions and Robust Practices.”
  15. S. Kulkarni, S. Saha, and R. Hockenbury, “Preserving privacy in sensorfog networks,” 2014 9th Int. Conf. Internet Technol. Secur. Trans. ICITST 2014, no. 1, pp. 96–99, 2014, doi: 10.1109/ICITST.2014.7038785.
  16. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621–1632, 2012, doi: 10.1109/TPDS.2012.86.
  17. S. Chen, M. Wen, R. Lu, J. Li, and S. Chen, “Achieve revocable access control for fog-based smart grid system,” in IEEE Vehicular Technology Conference, Sep. 2019, vol. 2019-September, doi: 10.1109/VTCFall.2019.8891162.
  18. K. Fan, J. Wang, X. Wang, H. Li, and Y. Yang, “Secure, efficient and revocable data sharing scheme for vehicular fogs,” Peer-to-Peer Netw. Appl., vol. 11, no. 4, pp. 766–777, 2018, doi: 10.1007/s12083-017-0562-
  19. J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1214–1221, 2011, doi: 10.1109/TPDS.2010.203.
  20. A. Vishwanath, R. Peruri, and J. (Selena) He, “Security in Fog Computing through Encryption,” Int. J. Inf. Technol. Comput. Sci., vol. 8, no. 5, pp. 28–36, 2016, doi: 10.5815/ijitcs.2016.05.03.
  21. R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,” Futur. Gener. Comput. Syst., vol. 78, pp. 680–698, 2018, doi: 10.1016/j.future.2016.11.009.
  22. H. E. Hudson, V. Forsythe, and S. G. Burns, “Keeping in touch by two-way radio.,” World Health Forum, vol. 4, no. 2, pp. 157–161, 1983.
  23. Y. Wang, T. Uehara, and R. Sasaki, “Fog computing: Issues and challenges in security and forensics,” Proc. - Int. Comput. Softw. Appl. Conf., vol. 3, pp. 53–59, 2015, doi: 10.1109/COMPSAC.2015.173.
  24. I. Stojmenovic, S. Wen, X. Huang, and H. Luan, “An overview of Fog computing and its security issues,” Concurr. Comput. , vol. 28, no. 10, pp. 2991–3005, Jul. 2016, doi: 10.1002/cpe.3485.
  25. J. Zhou, X. Lin, X. Dong, and Z. Cao, “PSMPA: Patient selfcontrollable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 6, pp. 1693–1703, 2015, doi: 10.1109/TPDS.2014.2314119.
  26. S. Yi, Z. Qin, and Q. Li, “Security and privacy issues of fog computing: A survey,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, vol. 9204, pp. 685–695, doi: 10.1007/978-3-319-218373 67.
  27. R. Sandhu, A. S. Sohal, and S. K. Sood, “Identification of malicious edge devices in fog computing environments,” Inf. Secur. J., vol. 26, no. 5, pp. 213–228, Sep. 2017, doi: 10.1080/19393555.2017.1334843.
  28. N. S. Dhande, “Fog Computing: Review of Privacy and Security Issues,” vol. 3, no.2, pp. 864–868, 2015.
  29. Shan Chen, ndMi Wen, rdRongxing Lu, thJinguo Li, and thSijia Chen, Achieve Revocable Access Control for Fog-based Smart Grid System.
  30. P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, “An efficient access control scheme with outsourcing capability and attribute update for fog computing,” Futur. Gener. Comput. Syst., vol. 78, pp. 753–762, Jan. 2018, doi: 10.1016/j.future.2016>
Index Terms

Computer Science
Information Sciences

Keywords

IoT Cloud Edge Computing Fog Computing Security.