Security and privacy for IoT and Fog Computing Paradigm

被引:0
|
作者
Rauf, Abdul [1 ]
Shaikh, Riaz Ahmed [2 ]
Shah, Asadullah [1 ]
机构
[1] Int Islamic Univ, Kulliyyah ICT, Kuala Lumpur, Malaysia
[2] King Abdulaziz Univ, Comp Sci Dept, Jeddah, Saudi Arabia
关键词
IoT; fog computing; security challenges; privacy issues; trust management; INTERNET; THINGS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras etc.) and manufacturing of new type of sensors resulted in a new regime of applications based on smart objects called IoT. Majority of such applications or services are to ease human life and/or to setup efficient processes in automated environments. However, this convenience is coming up with new challenges related to data security and human privacy. The objects in IoT are resource constrained devices and cannot implement a fool-proof security framework. These end devices work like eyes and ears to interact with the physical world and collect data for analytics to make expedient decisions. The storage and analysis of the collected data is done remotely using cloud computing. The transfer of data from IoT to the computing clouds can introduce privacy issues and network delays. Some applications need a real-time decision and cannot tolerate the delays and jitters in the network. Here, edge computing or fog computing plays its role to settle down the mentioned issues by providing cloud-like facilities near the end devices. In this paper, we discuss IoT, fog computing, the relationship between IoT and fog computing, their security issues and solutions by different researchers. We summarize attack surface related to each layer of this paradigm which will help to propose new security solutions to escalate it acceptability among end users. We also propose a risk-based trust management model for smart healthcare environment to cope with security and privacy-related issues in this highly un-predictable heterogeneous ecosystem.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [1] Data Security Through Fog Computing Paradigm Using IoT
    Singh, Jayant Kumar
    Goel, Amit Kumar
    [J]. PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 95 - 103
  • [2] Security and Privacy in Fog Computing: Challenges
    Mukherjee, Mithun
    Matam, Rakesh
    Shu, Lei
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    Choudhury, Nikumani
    Kumar, Vikas
    [J]. IEEE ACCESS, 2017, 5 : 19293 - 19304
  • [3] Data Security and Privacy in Fog Computing
    Guan, Yunguo
    Shao, Jun
    Wei, Guiyi
    Xie, Mande
    [J]. IEEE NETWORK, 2018, 32 (05): : 106 - 111
  • [4] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [5] Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective
    Amr Adel
    [J]. Journal of Big Data, 7
  • [6] Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective
    Adel, Amr
    [J]. JOURNAL OF BIG DATA, 2020, 7 (01)
  • [7] Video denoising for security and privacy in fog computing
    Zhang, Hong
    Yang, Yifan
    Yuan, Ding
    Sun, Daniel
    Zhang, Jun
    Li, Guoqiang
    Sun, Mingui
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (22):
  • [8] Security and Privacy Issues of Fog Computing: A Survey
    Yi, Shanhe
    Qin, Zhengrui
    Li, Qun
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 685 - 695
  • [9] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307
  • [10] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8