Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model

被引:40
作者
Rapuzzi, R. [1 ]
Repetto, M. [1 ]
机构
[1] CNIT, Natl Lab S3ITI, Via Opera Pia 13, I-16145 Genoa, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 85卷
关键词
Cyber-security architectures; Situational awareness; Network threats; Software-defined networking; Fog and edge computing; PRIVACY; SYSTEM; CLOUD;
D O I
10.1016/j.future.2018.04.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing interest in fog and edge computing is gradually but inexorably outlining new architectural and usage models, distinguished by geographical dispersion and device heterogeneity. Unfortunately, the evolution of cyber-security paradigms has not gone with the same pace, leading to a substantial difficulty in protecting the new forms of distributed and heterogeneous systems against cyber-threats. In this paper, we focus on situational awareness for network threats. We briefly review the main limitations of current cyber-security paradigms with respect to emerging fog/edge architectures, and we discuss how current challenges and emerging trends are pushing from vertical security frameworks to horizontal and distributed architectures. In this respect, we outline the main elements and relevant technologies for a multi-layer framework that create the necessary knowledge and awareness in relation to network threats over large and heterogeneous computing and networking environments. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:235 / 249
页数:15
相关论文
共 59 条
[1]   Exploiting Cloud and Workflow Patterns for the Analysis of Composite Cloud Services [J].
Amato, Flora ;
Moscato, Francesco .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 67 :255-265
[2]  
[Anonymous], OPEN PACKET PROCESSO
[3]  
[Anonymous], 2012, P NSDI
[4]  
[Anonymous], 2016, INTERNET THINGS CONS
[5]  
[Anonymous], 2012, SOFTWARE DEFINED NET
[6]  
[Anonymous], IETF RFC 6020
[7]  
Barnum S., 2017, STANDARDIZING CYBER
[8]   Extensible Orchestration of Elastic IP Multimedia Subsystem as a Service using Open Baton [J].
Bellavista, Paolo ;
Foschini, Luca ;
Venanzi, Riccardo ;
Carella, Giuseppe .
2017 5TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD), 2017, :88-95
[9]  
Bianchi G, 2014, ACM SIGCOMM COMP COM, V44, P45
[10]  
Bjorklund M., 2017, RFC 8040