Security challenges in fog-computing environment: a systematic appraisal of current developments

被引:19
|
作者
Yakubu J. [1 ]
Abdulhamid S.M. [2 ]
Christopher H.A. [1 ]
Chiroma H. [3 ]
Abdullahi M. [4 ]
机构
[1] Department of Computer Science, Federal University of Technology, Minna
[2] Department of Cyber Security Science, Federal University of Technology, Minna
[3] Department of Computer Science, Federal College of Education (Technical), Gombe
[4] Department of Computer Science, Ahmadu Bello University, Zaria
关键词
Cloud computing; Cloud-computing security; Edge computing; Fog computing; Fog-computing security; Fog-computing taxonomy;
D O I
10.1007/s40860-019-00081-2
中图分类号
学科分类号
摘要
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements. © 2019, Springer Nature Switzerland AG.
引用
下载
收藏
页码:209 / 233
页数:24
相关论文
共 50 条
  • [31] Investigation of Security Challenges and a Novel Security Mechanism for Cloud Computing Environment
    Aldakheel, Maram Abdullatif
    Rahman, Sk Md Mizanur
    Al-Zahrani, Rasheed
    El-Qawasmeh, Eyas
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [32] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [33] Resource allocation in fog computing: a survey on current state and research challenges
    Amir Mohammad Nemati
    Najme Mansouri
    Knowledge and Information Systems, 2025, 67 (3) : 2091 - 2170
  • [34] Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research Challenges
    Tedeschi, Pietro
    Sciancalepore, Savio
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 1 - 10
  • [35] A context sensitive security framework for Enterprise multimedia placement in fog computing environment
    Gill, Harsuminder Kaur
    Sehgal, Vivek Kumar
    Verma, Anil Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10733 - 10749
  • [36] A context sensitive security framework for Enterprise multimedia placement in fog computing environment
    Harsuminder Kaur Gill
    Vivek Kumar Sehgal
    Anil Kumar Verma
    Multimedia Tools and Applications, 2020, 79 : 10733 - 10749
  • [37] A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
    Farhadi, Mozhdeh
    Lanet, Jean-Louis
    Pierre, Guillaume
    Miorandi, Daniele
    SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (06): : 973 - 997
  • [38] A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
    Tange, Koen
    De Donno, Michele
    Fafoutis, Xenofon
    Dragoni, Nicola
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2489 - 2520
  • [39] Challenges and Issues of E-Health Applications in Cloud and Fog Computing Environment
    Premkumar, N.
    Santhosh, R.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 711 - 721
  • [40] Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges
    Manzoor, Awais
    Shah, Munam Ali
    Khattak, Hasan Ali
    Din, Ikram Ud
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (12)