A Survey of Security in Cloud, Edge, and Fog Computing

被引:88
作者
Ometov, Aleksandr [1 ,2 ]
Molua, Oliver Liombe [1 ]
Komarov, Mikhail [3 ]
Nurmi, Jari [1 ]
机构
[1] Tampere Univ, Fac Informat Technol & Commun Sci, Elect Engn Unit, Tampere 33720, Finland
[2] ITMO Univ, Fac Secure Informat Technol, Lab Cryptog Methods Informat Secur, St Petersburg 191002, Russia
[3] Natl Res Univ Higher Sch Econ, Grad Sch Business, Moscow 101000, Russia
关键词
computing; survey; security; privacy; distributed systems; computational offloading; PHYSICAL-LAYER; INTRUSION DETECTION; PRIVACY ISSUES; INTERNET; CHALLENGES; THINGS; IOT; PARADIGM; MANAGEMENT; BLOCKCHAIN;
D O I
10.3390/s22030927
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings.
引用
收藏
页数:27
相关论文
共 132 条
  • [21] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [22] Butun I, 2019, I SYMP CONSUM ELECTR
  • [23] An Overview on Edge Computing Research
    Cao, Keyan
    Liu, Yefan
    Meng, Gongjie
    Sun, Qimeng
    [J]. IEEE ACCESS, 2020, 8 : 85714 - 85728
  • [24] Chalapathi G. S. S., 2021, FOGEDGE COMPUTING SE, P293, DOI DOI 10.1007/978-3-030-57328-7_12
  • [25] Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/ISSNIP.2015.7106910, 10.1109/TSC.2015.2491281]
  • [26] Operational Cost Optimization for Cloud Computing Data Centers Using Renewable Energy
    Chen, Shaoming
    Irving, Samuel
    Peng, Lu
    [J]. IEEE SYSTEMS JOURNAL, 2016, 10 (04): : 1447 - 1458
  • [27] Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing
    Chen, Xu
    Jiao, Lei
    Li, Wenzhong
    Fu, Xiaoming
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2827 - 2840
  • [28] Fog and IoT: An Overview of Research Opportunities
    Chiang, Mung
    Zhang, Tao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 854 - 864
  • [29] Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    Chonka, Ashley
    Xiang, Yang
    Zhou, Wanlei
    Bonti, Alessio
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1097 - 1107
  • [30] Ciurana E., 2009, Developing with Google App Engine