The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

被引:144
|
作者
Tariq, Noshina [1 ]
Asim, Muhammad [1 ]
Al-Obeidat, Feras [2 ]
Zubair Farooqi, Muhammad [1 ]
Baker, Thar [3 ]
Hammoudeh, Mohammad [4 ]
Ghafir, Ibrahim [5 ]
机构
[1] Natl Univ Comp & Emerging Sci, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Zayed Univ, Coll Technol Innovat, Abu Dhabi 144534, U Arab Emirates
[3] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 3AF, Merseyside, England
[4] Manchester Metropolitan Univ, Sch Comp Math & Digital Technol, Manchester M1 5GD, Lancs, England
[5] Masaryk Univ, Fac Informat, CS-60177 Brno, Czech Republic
来源
SENSORS | 2019年 / 19卷 / 08期
关键词
security; big data; Internet of Things; fog computing; edge computing; blockchain; FULLY HOMOMORPHIC ENCRYPTION; ROUTING PROTOCOL; THINGS SECURITY; NETWORK ARCHITECTURE; QUERY AUTHENTICATION; INTRUSION DETECTION; LOW-POWER; INTERNET; PRIVACY; CHALLENGES;
D O I
10.3390/s19081788
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today's society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today's hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Distributed Resource Management for Blockchain in Fog-Enabled IoT Networks
    Yang, Lichao
    Li, Ming
    Zhang, Heli
    Ji, Hong
    Xiao, Mingyan
    Li, Xi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2330 - 2341
  • [2] Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems
    Chen, Tong
    Zhang, Lei
    Choo, Kim-Kwang Raymond
    Zhang, Rui
    Meng, Xinyu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10766 - 10778
  • [3] Embedding Blockchain Technology Into IoT for Security: A Survey
    Xu, Li Da
    Lu, Yang
    Li, Ling
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10452 - 10473
  • [4] Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey
    Liao, Zhuofan
    Pang, Xiang
    Zhang, Jingyu
    Xiong, Bing
    Wang, Jin
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1159 - 1175
  • [5] A Secure Data Sharing Based on Key Aggregate Searchable Encryption in Fog-Enabled IoT Environment
    Oh, Jihyeon
    Lee, JoonYoung
    Kim, MyeongHyun
    Park, Youngho
    Park, KiSung
    Noh, SungKee
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 4468 - 4481
  • [6] CEaaS: Constrained Encryption as a Service in Fog-Enabled IoT
    Deb, Pallav Kumar
    Mukherjee, Anandarup
    Misra, Sudip
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) : 19803 - 19810
  • [7] Lightweight blockchain-based remote user authentication for fog-enabled IoT deployment
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Gueroui, Abdelhak Mourad
    COMPUTER COMMUNICATIONS, 2024, 221 : 90 - 105
  • [8] Blockchain-Enabled Data-Sharing Scheme for Consumer IoT Applications
    Hu, Bowen
    Chen, Yingwen
    Yu, Hujie
    Meng, Linghang
    Duan, Zhimin
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (02) : 77 - 87
  • [9] Secure and privacy-preserving orchestration and delivery of fog-enabled IoT services
    Viejo, Alexandre
    Sanchez, David
    AD HOC NETWORKS, 2019, 82 : 113 - 125
  • [10] Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system
    Babu, Erukala Suresh
    Rao, Mekala Srinivasa
    Swain, Gandharba
    Nikhath, A. Kousar
    Kaluri, Rajesh
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)