Fog computing security: a review of current applications and security solutions

被引:190
作者
Khan, Saad [1 ]
Parkinson, Simon [1 ]
Qin, Yongrui [1 ]
机构
[1] Univ Huddersfield, Sch Comp & Engn, Dept Informat, Huddersfield, W Yorkshire, England
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2017年 / 6卷
关键词
Fog computing; Security threats; Internet of things; Performance; Wireless security; Malware protection; ENCRYPTION; CLOUDLETS; NETWORK; PRIVACY; ISSUES; PERFORMANCE; SCHEME; ENERGY; POWER;
D O I
10.1186/s13677-017-0090-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
引用
收藏
页数:22
相关论文
共 149 条
  • [1] Fog Computing Micro Datacenter Based Dynamic Resource Estimation and Pricing Model for IoT
    Aazam, Mohammad
    Huh, Eui-Nam
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 687 - 694
  • [2] Fog Computing and Smart Gateway Based Communication for Cloud of Things
    Aazam, Mohammad
    Huh, Eui-Nam
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 464 - 470
  • [3] A survey of information security incident handling in the cloud
    Ab Rahman, Nurul Hidayah
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & SECURITY, 2015, 49 : 45 - 69
  • [4] Ubiquitous Shift with Information Centric Network Caching Using Fog Computing
    Abdullahi, Ibrahim
    Arif, Suki
    Hassan, Suhaidi
    [J]. COMPUTATIONAL INTELLIGENCE IN INFORMATION SYSTEMS, 2015, 331 : 327 - 335
  • [5] Cloud monitoring: A survey
    Aceto, Giuseppe
    Botta, Alessio
    de Donato, Walter
    Pescape, Antonio
    [J]. COMPUTER NETWORKS, 2013, 57 (09) : 2093 - 2115
  • [6] Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
  • [7] Ahmed ANR, 2016, IEEE IMTC P, P1327
  • [8] Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    Al Ameen, Moshaddique
    Liu, Jingwei
    Kwak, Kyungsup
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) : 93 - 101
  • [9] Ali Saqib, 2015, Journal of Theoretical and Applied Information Technology, V71, P144
  • [10] Multi-Tenancy in Cloud Computing
    AlJahdali, Hussain
    Albatli, Abdulaziz
    Garraghan, Peter
    Townend, Paul
    Lau, Lydia
    Xu, Jie
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 344 - 351