Artificial Intelligence Techniques for Securing Fog Computing Environments: Trends, Challenges, and Future Directions

被引:13
作者
Alsadie, Deafallah [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp, Dept Comp Sci & Artificial Intelligence, Mecca 21961, Saudi Arabia
关键词
Artificial intelligence; Security; Edge computing; Resource management; Data models; Computational modeling; Authentication; Explainable AI; Privacy; Fog computing; artificial intelligence; resource management; explainable AI; privacy and security; ENERGY-EFFICIENT; RESOURCE-ALLOCATION; CLOUD; EDGE; IOT; FRAMEWORK; INTERNET; ARCHITECTURE; ALGORITHM; SYSTEM;
D O I
10.1109/ACCESS.2024.3463791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing, an extension of cloud computing, enhances capabilities by processing data closer to the source, thereby addressing latency and bandwidth issues inherent in traditional cloud models. However, the integration of Artificial Intelligence (AI) into fog computing introduces challenges, particularly in resource management, security, and privacy. This paper systematically reviews AI applications within fog computing environments, adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to ensure rigorous analysis. The studies were selected based on predefined inclusion criteria, including research published between 2010 and 2024 in peer-reviewed journals and conference papers, with searches conducted in databases like IEEE Xplore, ACM Digital Library, SpringerLink, and Scopus. The review identifies critical issues such as resource constraints, transparency in AI-driven security systems, and the need for adaptable AI models to address evolving security threats. In response, innovative solutions such as lightweight AI models (e.g., Pruned Neural Networks, Quantized Models, Knowledge Distillation), Explainable AI (XAI) (e.g., Model-Agnostic Methods, Feature Importance Analysis, Rule-Based Approaches), and federated learning are proposed. Additionally, a novel taxonomy is introduced, categorizing AI techniques into resource management, security enhancement, and privacy-preserving methods, offering a structured framework for researchers and practitioners. The paper concludes that effective AI integration in fog computing is essential for developing secure, efficient, and adaptable distributed systems, with significant implications for both academia and industry.
引用
收藏
页码:151598 / 151648
页数:51
相关论文
共 153 条
[1]   A Review of Fog Computing and Machine Learning: Concepts, Applications, Challenges, and Open Issues [J].
Abdulkareem, Karrar Hameed ;
Mohammed, Mazin Abed ;
Gunasekaran, Saraswathy Shamini ;
Al-Mhiqani, Mohammed Nasser ;
Mutlag, Ammar Awad ;
Mostafa, Salama A. ;
Ali, Nabeel Salih ;
Ibrahim, Dheyaa Ahmed .
IEEE ACCESS, 2019, 7 :153123-153140
[2]   Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm [J].
Agrawal, Ruchi ;
Singhal, Saurabh ;
Sharma, Ashish .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06) :8015-8030
[3]  
Ahmadi Fardin, 2021, Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), P172, DOI 10.1109/INDIACom51348.2021.00031
[4]   CAB-IoT: Continuous authentication architecture based on Blockchain for internet of things [J].
Al-Naji, Fatimah Hussain ;
Zagrouba, Rachid .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (06) :2497-2514
[5]   A clogging resistant secure authentication scheme for fog computing services [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Garg, Sahil ;
Lv, Zhihan ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 185
[6]  
Almaiah A., 2020, J THEOR APPL INF TEC, V15, P98
[7]   Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems [J].
Alqahtani, Hamed ;
Kumar, Gulshan .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 129
[8]   Advancements in heuristic task scheduling for IoT applications in fog-cloud computing: challenges and prospects [J].
Alsadie, Deafallah .
PEERJ COMPUTER SCIENCE, 2024, 10
[9]  
Alshambri H. A., 2021, Journal of Cyber Security, V3, P149, DOI DOI 10.32604/JCS.2021.022112
[10]   WEAVESIM: A SCALABLE AND REUSABLE CLOUD SIMULATION FRAMEWORK LEVERAGING ASPECT-ORIENTED PROGRAMMING [J].
AlSobeh, Anas M. R. ;
AlShattnawi, Sawsan ;
Jarrah, Amin ;
Hammad, Mahmoud M. .
JORDANIAN JOURNAL OF COMPUTERS AND INFORMATION TECHNOLOGY, 2020, 6 (02) :182-201