A Survey of Security in Cloud, Edge, and Fog Computing

被引:102
作者
Ometov, Aleksandr [1 ,2 ]
Molua, Oliver Liombe [1 ]
Komarov, Mikhail [3 ]
Nurmi, Jari [1 ]
机构
[1] Tampere Univ, Fac Informat Technol & Commun Sci, Elect Engn Unit, Tampere 33720, Finland
[2] ITMO Univ, Fac Secure Informat Technol, Lab Cryptog Methods Informat Secur, St Petersburg 191002, Russia
[3] Natl Res Univ Higher Sch Econ, Grad Sch Business, Moscow 101000, Russia
关键词
computing; survey; security; privacy; distributed systems; computational offloading; INTRUSION DETECTION; PHYSICAL LAYER; PRIVACY ISSUES; INTERNET; CHALLENGES; THINGS; IOT; PARADIGM; MANAGEMENT; BLOCKCHAIN;
D O I
10.3390/s22030927
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings.
引用
收藏
页数:27
相关论文
共 132 条
[21]   Towards Energy Efficiency in the Internet of Wearable Things: A Systematic Review [J].
Bin Qaim, Waleed ;
Ometov, Aleksandr ;
Molinaro, Antonella ;
Lener, Ilaria ;
Campolo, Claudia ;
Lohan, Elena Simona ;
Nurmi, Jari .
IEEE ACCESS, 2020, 8 :175412-175435
[22]  
Bonomi F., 2012, P 1 MCC WORKSH MOB C, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[23]   Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J].
Butun, Ismail ;
Osterberg, Patrik ;
Song, Houbing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :616-644
[24]  
Butun I, 2019, I SYMP CONSUM ELECTR
[25]   An Overview on Edge Computing Research [J].
Cao, Keyan ;
Liu, Yefan ;
Meng, Gongjie ;
Sun, Qimeng .
IEEE ACCESS, 2020, 8 :85714-85728
[26]  
Chalapathi G.S.S., 2021, Fog/edge Comput. for Secur., P293, DOI DOI 10.1007/978-3-030-57328-7_12
[27]  
Chang V, 2016, IEEE T SERV COMPUT, V9, P138, DOI [10.1109/ISSNIP.2015.7106910, 10.1109/TSC.2015.2491281]
[28]   Operational Cost Optimization for Cloud Computing Data Centers Using Renewable Energy [J].
Chen, Shaoming ;
Irving, Samuel ;
Peng, Lu .
IEEE SYSTEMS JOURNAL, 2016, 10 (04) :1447-1458
[29]   Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing [J].
Chen, Xu ;
Jiao, Lei ;
Li, Wenzhong ;
Fu, Xiaoming .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) :2827-2840
[30]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864