Fog Computing: Issues and Challenges in Security and Forensics

被引:89
|
作者
Wang, Yifan [1 ]
Uehara, Tetsutaro [1 ]
Sasaki, Ryoichi [2 ]
机构
[1] Ritsumeikan Univ, Coll Informat Sci & Engn, Kusatsu, Shiga, Japan
[2] Tokyo Denki Univ, Sch Sci & Technol Future Life, Adachi Ku, Tokyo, Japan
关键词
Fog Computing; Fog Forensics; Fog Security; Cloud Computing; Cloud Security; Cloud Forensics;
D O I
10.1109/COMPSAC.2015.173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Although Fog Computing is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility create new security and forensics issues and challenges which have not been well studied in Cloud security and Cloud forensics. In this paper, through an extensive review of the motivation and advantages of the Fog Computing and its unique features as well as the comparison on various scenarios between the Fog Computing and Cloud Computing, the new issues and challenges in Fog security and Fog forensics are presented and discussed. The result of this study will encourage and promote more extensive research in this fascinating field, Fog security and Fog forensics.
引用
收藏
页码:53 / 59
页数:7
相关论文
共 50 条
  • [1] Security in fog computing: A systematic review on issues, challenges and solutions
    Rezapour, Ronita
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    Ghanbari, Shamsollah
    [J]. COMPUTER SCIENCE REVIEW, 2021, 41
  • [2] Security Issues With Fog Computing
    Miatra, Ayati
    Kumar, Sumit
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 123 - 128
  • [3] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [4] An Overview of Security Issues in Fog Computing
    Luqman, Mohammad
    Faridi, Arman Rasool
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1157 - 1162
  • [5] Security and Privacy in Fog Computing: Challenges
    Mukherjee, Mithun
    Matam, Rakesh
    Shu, Lei
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Choudhury, Nikumani
    Kumar, Vikas
    [J]. IEEE ACCESS, 2017, 5 : 19293 - 19304
  • [6] Fog Computing: Characteristics, Challenges and Issues
    Yassein, Muneer Bani
    Hmeidi, Ismail
    Shatnawi, Farah
    Rawasheh, Saif
    [J]. 2ND INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCE AND ENGINEERING (MACISE 2020), 2020, : 240 - 245
  • [7] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [8] An Overview on the Applications and Security Issues of Fog Computing
    Bi, Fangming
    Miao, Xuzhi
    Chen, Wei
    Fang, Weidong
    Zhang, Wuxiong
    Wang, Deyu
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1792 - 1797
  • [9] An overview of Fog computing and its security issues
    Stojmenovic, Ivan
    Wen, Sheng
    Huang, Xinyi
    Luan, Hao
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2991 - 3005
  • [10] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27