Security Issues in Fog Environment: A Systematic Literature Review

被引:0
作者
Jasleen Kaur
Alka Agrawal
Raees Ahmad Khan
机构
[1] Babasaheb Bhimrao Ambedkar University (A Central University),Department of Information Technology
来源
International Journal of Wireless Information Networks | 2020年 / 27卷
关键词
Internet of Things; Fog computing; Security; Big data;
D O I
暂无
中图分类号
学科分类号
摘要
The potent concept of fog computing is currently attracting many researchers as it brings cloud services closer to the end-user. It also roots out some of the major limitations of the cloud scenario where there exists the need for extremely low latency. Despite its compelling advantages, fog computing is still an evolving paradigm that demands further research. Among all the other issues prevalent in fog computing, security is one of the burning issues. Fog nodes, being at the edge of the network, pose several security threats. The authors have thus conducted a systematic literature review (SLR) on security issues in fog computing scenario. Initially, the prevalent security issues are identified through an in-depth survey and then the available literature per security issue is analyzed systematically. This SLR reveals that the security in/through fog scenario is being addressed by the researchers all over the globe. But, the approaches with respect to fog environment still lack methods to evaluate security aspects. Though most of the researchers are prioritizing the consideration of security aspects at fog level, there still exists a need to consider fog computing security as an area of serious concern.
引用
收藏
页码:467 / 483
页数:16
相关论文
共 205 条
[1]  
Noura H(2019)Preserving data security in distributed fog computing Ad Hoc Networks 94 101937-96
[2]  
Puthal D(2019)Fog computing security challenges and future directions [energy and security] IEEE Consumer Electronics Magazine 8 92-132
[3]  
Mohanty SP(2019)A neutrosophic theory-based security approach for fog and mobile-edge computing Computer Networks 157 122-42
[4]  
Bhavake SA(2017)Fog computing for the internet of things: security and privacy issues IEEE Internet Computing 21 34-122
[5]  
Morgan G(2017)Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges IEEE Communications Magazine 55 114-111
[6]  
Ranjan R(2018)Data security and privacy in fog computing IEEE Network 32 106-1155
[7]  
Abdel-Basset M(2017)Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things IEEE Internet of Things Journal 4 1143-22328
[8]  
Manogaran G(2017)A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography IEEE Access 5 22313-5538
[9]  
Mohamed M(2017)Biometric security through visual encryption for fog edge computing IEEE Access 5 5531-52
[10]  
Alrawais A(2018)Fog computing architecture, evaluation, and future research directions IEEE Communications Magazine 56 46-19304