Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments

被引:0
作者
Belsare, Roshan Gunwantrao [1 ]
Ambhore, P. B. [2 ]
机构
[1] Govt Coll Engn, Amravati, Maharashtra, India
[2] Govt Coll Engn, Informat Technol Dept, Amravati, Maharashtra, India
来源
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING | 2022年 / 13卷 / 05期
关键词
Blockchain; privacy preservation; neural; deep learning; fuzzy; security; attacks; COMPUTING-BASED INTERNET; KEY MANAGEMENT PROTOCOL; ACCESS-CONTROL; EFFICIENT; SCHEME; ALLOCATION; FRAMEWORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security and privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.
引用
收藏
页码:1098 / 1108
页数:11
相关论文
共 35 条
[1]   Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection [J].
An, Xingshuo ;
Lu, Xing ;
Yang, Lei ;
Zhou, Xianwei ;
Lin, Fuhong .
IEEE ACCESS, 2019, 7 :21879-21888
[2]   A Differential Privacy-Based Query Model for Sustainable Fog Data Centers [J].
Du, Miao ;
Wang, Kun ;
Liu, Xiulong ;
Guo, Song ;
Zhang, Yan .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (02) :145-155
[3]   Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism [J].
Gu, Ke ;
Tang, Linyu ;
Jiang, Jiafu ;
Jia, WeiJia .
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (05) :1246-1263
[4]   Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges [J].
Guo, Junyan ;
Du, Ye .
IEEE ACCESS, 2020, 8 :11104-11115
[5]   A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems [J].
Junejo, Aisha Kanwal ;
Komninos, Nikos ;
McCann, Julie A. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) :6840-6852
[6]   Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles [J].
Kang, Jiawen ;
Yu, Rong ;
Huang, Xumin ;
Zhang, Yan .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (08) :2627-2637
[7]   Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE [J].
Li, Gaolei ;
Wu, Jun ;
Li, Jianhua ;
Guan, Zhitao ;
Guo, Longhua .
IEEE ACCESS, 2018, 6 :11278-11288
[8]   A Cloud-Fog-Edge Closed-Loop Feedback Security Risk Prediction Method [J].
Li, Qianmu ;
Tian, Youhui ;
Wu, Qiang ;
Cao, Qi ;
Shen, Haiyuan ;
Long, Huaqiu .
IEEE ACCESS, 2020, 8 :29004-29020
[9]   SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing [J].
Liu, Xuejiao ;
Chen, Wei ;
Xia, Yingjie ;
Yang, Chenghan .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03) :3389-3399
[10]   A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT [J].
Lu, Rongxing .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2497-2505