An overview of Fog computing and its security issues

被引:259
|
作者
Stojmenovic, Ivan [1 ]
Wen, Sheng [1 ]
Huang, Xinyi [1 ]
Luan, Hao [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
来源
关键词
Fog computing; security;
D O I
10.1002/cpe.3485
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:2991 / 3005
页数:15
相关论文
共 50 条
  • [1] An Overview of Security Issues in Fog Computing
    Luqman, Mohammad
    Faridi, Arman Rasool
    [J]. PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 1157 - 1162
  • [2] An Overview on the Applications and Security Issues of Fog Computing
    Bi, Fangming
    Miao, Xuzhi
    Chen, Wei
    Fang, Weidong
    Zhang, Wuxiong
    Wang, Deyu
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1792 - 1797
  • [3] An Overview of Fog Computing and Edge Computing Security and Privacy Issues
    Alwakeel, Ahmed M.
    [J]. SENSORS, 2021, 21 (24)
  • [4] Fog Computing: Overview, Architecture, Security Issues and Applications
    Dasari, Kishore
    Rayaprolu, Mounika
    [J]. ICCCE 2018, 2019, 500 : 11 - 18
  • [5] Security Issues With Fog Computing
    Miatra, Ayati
    Kumar, Sumit
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 123 - 128
  • [6] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [7] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    [J]. FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [8] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    [J]. IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [9] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [10] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307