A Brief Review on Security in IoT Environments Based on Fog Computing Architecture

被引:1
作者
Damerdji, Djennet Oudjedi [1 ]
Lehsaini, Mohamed [1 ]
Benmahdi, Meryem Bochra [1 ]
机构
[1] Tlemcen Univ, STIC Lab, Tilimsen, Algeria
来源
PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024 | 2024年
关键词
Fog Computing; IoT; Cloud Computing; Security; Authenticity; Confidentiality; Integrity; AUTHENTICATION SCHEME; PRIVACY;
D O I
10.1109/ICEEAC61226.2024.10576289
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is an innovative technology that encompasses the connectivity of physical, intelligent objects to the Internet, enabling the collection, sharing and analysis of data. Currently regarded as one of the revolutionary technologies of the 21st century, the significant increase of IoT devices and the huge amount of data they produce at the network's edge has led to the Cloud Computing (CC) paradigm being over-loaded. Consequently, new computing paradigms are emerging, such as Edge Computing and Fog Computing (FC). Although these paradigms offer different functionalities and improve Quality of Service (QoS), they also introduce huge risks in terms of data security and privacy. This paper presents a brief review on security in IoT environments based on Fog Computing (FC) architecture, with particular attention to security measures such as authentication, confidentiality and data integrity. Furthermore, it addresses attacks targeting these measures, in order to avoid or reduce security issues in Fog Computing-IoT environments.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
Patwary AAN, 2020, Arxiv, DOI arXiv:2003.00395
[2]  
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[3]  
Almadhoun R, 2018, I C COMP SYST APPLIC
[4]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[5]   Fog computing security and privacy for the Internet of Thing applications: State-of-the-art [J].
Alzoubi, Yehia I. ;
Osmanaj, Valmira H. ;
Jaradat, Ashraf ;
Al-Ahmad, Ahmad .
SECURITY AND PRIVACY, 2021, 4 (02)
[6]   A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues [J].
Alzoubi, Yehia Ibrahim ;
Gill, Asif ;
Mishra, Alok .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01)
[7]   A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment [J].
Banerjee, Soumya ;
Odelu, Vanga ;
Das, Ashok Kumar ;
Srinivas, Jangirala ;
Kumar, Neeraj ;
Chattopadhyay, Samiran ;
Choo, Kim-Kwang Raymond .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8739-8752
[8]   An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing [J].
Chatterjee, Uddalak ;
Ray, Sangram ;
Khan, Muhammad Khurram ;
Dasgupta, Mou ;
Chen, Chien-Ming .
COMPUTING, 2022, 104 (06) :1359-1395
[9]   Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges [J].
Ferrag, Mohamed Amine ;
Shu, Lei ;
Yang, Xing ;
Derhab, Abdelouahid ;
Maglaras, Leandros .
IEEE ACCESS, 2020, 8 :32031-32053
[10]   BPCPR-FC: blockchain-based privacy preservation with confidentiality using proxy reencryption and ring signature in fog computing environments [J].
Gowda N.C. ;
Bharathi Malakreddy A. .
International Journal of Information Technology, 2023, 15 (6) :3343-3357