A Survey of Security in Cloud, Edge, and Fog Computing

被引:88
作者
Ometov, Aleksandr [1 ,2 ]
Molua, Oliver Liombe [1 ]
Komarov, Mikhail [3 ]
Nurmi, Jari [1 ]
机构
[1] Tampere Univ, Fac Informat Technol & Commun Sci, Elect Engn Unit, Tampere 33720, Finland
[2] ITMO Univ, Fac Secure Informat Technol, Lab Cryptog Methods Informat Secur, St Petersburg 191002, Russia
[3] Natl Res Univ Higher Sch Econ, Grad Sch Business, Moscow 101000, Russia
关键词
computing; survey; security; privacy; distributed systems; computational offloading; PHYSICAL-LAYER; INTRUSION DETECTION; PRIVACY ISSUES; INTERNET; CHALLENGES; THINGS; IOT; PARADIGM; MANAGEMENT; BLOCKCHAIN;
D O I
10.3390/s22030927
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings.
引用
收藏
页数:27
相关论文
共 132 条
  • [1] Fog Computing: The Cloud-IoT/IoE Middleware Paradigm
    Aazam M.
    Huh E.-N.
    [J]. IEEE Potentials, 2016, 35 (03): : 40 - 44
  • [2] Edge computing technologies for Internet of Things: a primer
    Ai, Yuan
    Peng, Mugen
    Zhang, Kecheng
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) : 77 - 86
  • [3] Al-Rodhaan M., 2015, 161100374 ARXIV, DOI [10.5121/ijdps.2015.6101, DOI 10.5121/IJDPS.2015.6101]
  • [4] Privacy in Cloud Computing: An Intelligent Approach
    Alhroob, Aysh
    Samawi, Venus W.
    [J]. PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 1063 - 1065
  • [5] Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
  • [6] A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    [J]. IEEE ACCESS, 2020, 8 : 104893 - 104917
  • [7] Almtrf A, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P819, DOI 10.1109/CCWC.2019.8666453
  • [8] Almutairy N.M., 2019, Int. J. Comput. Sci. Inf. Technol, V11, P1, DOI [10.2139/ssrn.3436071, DOI 10.2139/SSRN.3436071]
  • [9] Alotaibi A.M., 2017, INT J COMPUTER NETWO, V5, P96
  • [10] A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things
    Alwarafy, Abdulmalik
    Al-Thelaya, Khaled A.
    Abdallah, Mohamed
    Schneider, Jens
    Hamdi, Mounir
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4004 - 4022