Security Issues With Fog Computing

被引:0
|
作者
Miatra, Ayati [1 ]
Kumar, Sumit [1 ]
机构
[1] Amity Univ, CSE Dept, Noida, UP, India
关键词
fog computing; security threats; solutions; PRIVACY;
D O I
10.1109/confluence47617.2020.9057806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing or edge computing or fogging extends cloud computing to the edge of the network. It operates on the computing, storage and networking services between user end devices and cloud computing data centres. However, in the process of caring out these operations, fog computing is faced with several security issues. These issues may be inherited from cloud computing systems or may arise due to fog computing systems alone. Some of the major gaps in providing a secure platform for the fog computing process arise from interim operational steps like authentication or identification, which often expands to large scale performance issues in fog computing. Thus, these issues and their implications on fog computing databases, and the possible available solutions arc researched and provided for a better scope of future use and growth of fog computing systems by bridging the gaps of security issues in it.
引用
收藏
页码:123 / 128
页数:6
相关论文
共 50 条
  • [1] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [2] An Overview of Security Issues in Fog Computing
    Luqman, Mohammad
    Faridi, Arman Rasool
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1157 - 1162
  • [3] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [4] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [5] An Overview on the Applications and Security Issues of Fog Computing
    Bi, Fangming
    Miao, Xuzhi
    Chen, Wei
    Fang, Weidong
    Zhang, Wuxiong
    Wang, Deyu
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1792 - 1797
  • [6] An overview of Fog computing and its security issues
    Stojmenovic, Ivan
    Wen, Sheng
    Huang, Xinyi
    Luan, Hao
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2991 - 3005
  • [7] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [8] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307
  • [9] Security and Privacy Issues of Fog Computing: A Survey
    Yi, Shanhe
    Qin, Zhengrui
    Li, Qun
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 685 - 695
  • [10] An Overview of Fog Computing and Edge Computing Security and Privacy Issues
    Alwakeel, Ahmed M.
    [J]. SENSORS, 2021, 21 (24)