Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges

被引:794
作者
Roman, Rodrigo [1 ]
Lopez, Javier [1 ]
Mambo, Masahiro [2 ]
机构
[1] Univ Malaga, Comp Sci Dept, Ada Byron Bldg, Malaga 29071, Spain
[2] Kanazawa Univ, Inst Sci & Engn, Fac Elect & Comp Engn, Kakuma Kanazawa 9201192, Japan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 78卷
基金
欧盟地平线“2020”;
关键词
Security; Privacy; Cloud computing; Fog computing; Mobile edge computing; Mobile cloud computing; INTRUSION DETECTION; CLOUD; PRIVACY; AUTHENTICATION; NETWORKS; INTERNET; ISSUES;
D O I
10.1016/j.future.2016.11.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For various reasons, the cloud computing paradigm is unable to meet certain requirements (e.g. low latency and jitter, context awareness, mobility support) that are crucial for several applications (e.g. vehicular networks, augmented reality). To fulfill these requirements, various paradigms, such as fog computing, mobile edge computing, and mobile cloud computing, have emerged in recent years. While these edge paradigms share several features, most of the existing research is compartmentalized; no synergies have been explored. This is especially true in the field of security, where most analyses focus only on one edge paradigm, while ignoring the others. The main goal of this study is to holistically analyze the security threats, challenges, and mechanisms inherent in all edge paradigms, while highlighting potential synergies and venues of collaboration. In our results, we will show that all edge paradigms should consider the advances in other paradigms. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:680 / 698
页数:19
相关论文
共 133 条
[1]  
Aazam M, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), P518, DOI 10.1109/PERCOMW.2015.7134091
[2]  
Abdo JB, 2015, 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), P178, DOI 10.1109/DICTAP.2015.7113194
[3]  
Abedin S., 2015, P 17 AS PAC NETW OP, P309
[4]   Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges [J].
Abolfazli, Saeid ;
Sanaei, Zohreh ;
Ahmed, Ejaz ;
Gani, Abdullah ;
Buyya, Rajkumar .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :337-368
[5]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[6]   Secure Live Virtual Machines Migration: Issues and Solutions [J].
Aiash, Mahdi ;
Mapp, Glenford ;
Gemikonakli, Orhan .
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, :160-165
[7]  
Ali M, 2009, LECT NOTES COMPUT SC, V5931, P451, DOI 10.1007/978-3-642-10665-1_41
[8]   A Distributed Access Control Architecture for Cloud Computing [J].
Almutairi, Abdulrahman A. ;
Sarfraz, Muhammad I. ;
Basalamah, Saleh ;
Aref, Walid G. ;
Ghafoor, Arif .
IEEE SOFTWARE, 2012, 29 (02) :36-44
[9]  
[Anonymous], 3 IEEE INT C MOB CLO
[10]  
[Anonymous], 2015, 2015 IEEE FRONTIERS