Security challenges in fog-computing environment: a systematic appraisal of current developments

被引:25
作者
Yakubu J. [1 ]
Abdulhamid S.M. [2 ]
Christopher H.A. [1 ]
Chiroma H. [3 ]
Abdullahi M. [4 ]
机构
[1] Department of Computer Science, Federal University of Technology, Minna
[2] Department of Cyber Security Science, Federal University of Technology, Minna
[3] Department of Computer Science, Federal College of Education (Technical), Gombe
[4] Department of Computer Science, Ahmadu Bello University, Zaria
关键词
Cloud computing; Cloud-computing security; Edge computing; Fog computing; Fog-computing security; Fog-computing taxonomy;
D O I
10.1007/s40860-019-00081-2
中图分类号
学科分类号
摘要
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements. © 2019, Springer Nature Switzerland AG.
引用
收藏
页码:209 / 233
页数:24
相关论文
共 58 条
[1]  
Abdulhamid S.M., Latiff M.S., A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness, Appl Soft Comput, 61, pp. 670-680, (2017)
[2]  
Abbasi B.Z., Shah M.A., Robust practices, Proceedings of the 23Rd International Conference on Automation & Computing, University of Hudders Field, Hudders Field, pp. 7-8, (2017)
[3]  
Arya D., Dave M., Security-based service broker policy for fog computing environment, IEEE 8Th ICCCNT 2017, (2017)
[4]  
Barik R.K., Dubey A.C., Tripathi A., Pratik T., Lenka K., Pratik T., Et al., Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health, Procedia Comput Sci, 125, pp. 647-653, (2018)
[5]  
Bedi R.K., Singh J., Gupta S.K., MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing, J Supercomput, (2018)
[6]  
Bilal K., Khalid O., Erbad A., Khan S.U., Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers, Comput Netw, 130, pp. 94-120, (2018)
[7]  
Christopher H.A., Yakubu J., Mohammed A.D., An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier, imanagers J Cloud Comput, 5, 2, (2018)
[8]  
Donovan P.O., Gallagher C., Bruton K., Sullivan D.T.J.O., A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications, Manuf Lett, (2018)
[9]  
Ebebe A., Naveen C., Deep learning: the frontier for distributed attack detection in fog-to-things computing, IEEE Commun Mag, 56, pp. 169-175, (2018)
[10]  
El-Latif A.A.A., Abd-El-Atty B., Hossain M.S., Member S., Secure quantum steganography protocol for fog cloud internet of things, IEEE Spec Sect Recent Adv Cloud Radio Access Netw, 6, pp. 10332-10340, (2018)