Security challenges in fog-computing environment: a systematic appraisal of current developments

被引:25
作者
Yakubu J. [1 ]
Abdulhamid S.M. [2 ]
Christopher H.A. [1 ]
Chiroma H. [3 ]
Abdullahi M. [4 ]
机构
[1] Department of Computer Science, Federal University of Technology, Minna
[2] Department of Cyber Security Science, Federal University of Technology, Minna
[3] Department of Computer Science, Federal College of Education (Technical), Gombe
[4] Department of Computer Science, Ahmadu Bello University, Zaria
关键词
Cloud computing; Cloud-computing security; Edge computing; Fog computing; Fog-computing security; Fog-computing taxonomy;
D O I
10.1007/s40860-019-00081-2
中图分类号
学科分类号
摘要
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements. © 2019, Springer Nature Switzerland AG.
引用
收藏
页码:209 / 233
页数:24
相关论文
共 58 条
[21]  
Kumar P., Zaidi N., Choudhury T., Fog computing: Common security issues and proposed countermeasures, Proceedings of the 5Th International Conference on System Modeling and Advancement in Research Trends, SMART 2016, pp. 311-315, (2017)
[22]  
Lee K., Kim D., Ha D., Rajput U., Oh H., On security and privacy issues of fog computing supported Internet of Things environment, 2015 International Conference on the Network of the Future, NOF 2015, (2015)
[23]  
Li G., Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE, IEEE Spec Sect Internet Energy Archit Cyber Secur Appl, 6, pp. 11278-11288, (2018)
[24]  
Lisbon A.A., Kavitha R., A study on cloud and fog computing security issues and solutions, Int J Innov Res Adv Eng, 3, 4, pp. 2349-2163, (2017)
[25]  
Liu X., Deng R.H., Yang Y., Tran H.N., Zhong S., Hybrid privacy-preserving clinical decision support system in fog–cloud computing, Future Gener Comput Syst, 78, pp. 825-837, (2018)
[26]  
Lordan F., Lezzi D., Ejarque J., Badia R.M., An architecture for programming distributed applications on fog to cloud systems, 2, Euro-Par 2017 workshops, 10659, pp. 325-337, (2018)
[27]  
Madni S.H.H., Latiff M.S.A., Ali J., Multi-objective-oriented cuckoo search optimization-based resource scheduling algorithm for clouds, Arab J Sci Eng, 44, 4, pp. 3585-3602, (2019)
[28]  
Mahmud R., Koch F.L., Buyya R., Cloud–fog interoperability in IoT-enabled healthcare solutions, ICDCN’18: 19Th International Conference on Distributed Computing and Networking, January 4–7, 2018, Varanasi, India. ACM, pp. 4-7, (2018)
[29]  
Mahmud R., Kotagiri R., Buyya R., Et al., Fog computing: a taxonomy, survey and future directions, Internet of everything, internet of things, (2018)
[30]  
Mart G., Sustainable securing of medical cyber-physical systems for the healthcare of the future, Sustain Comput Inform Syst, (2018)