Abstract
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abdulhamid SM, Latiff MS (2017) A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl Soft Comput 61:670–680
Abbasi BZ, Shah MA (2017) Robust practices. In: Proceedings of the 23rd international conference on automation & computing, University of Hudders Field, Hudders Field, UK, 7–8 September 2017, pp 7–8
Arya D, Dave M (2017) Security-based service broker policy for fog computing environment. In: IEEE 8th ICCCNT 2017, Department of Computer Engineering
Barik RK, Dubey AC, Tripathi A, Pratik T, Lenka K, Pratik T et al (2018) Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health. Procedia Comput Sci 125:647–653. https://doi.org/10.1016/j.procs.2017.12.083
Bedi RK, Singh J, Gupta SK (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput. https://doi.org/10.1007/s11227-018-2304-y
Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94–120. https://doi.org/10.1016/j.comnet.2017.10.002
Christopher HA, Yakubu J, Mohammed AD (2018) An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier. imanagers J Cloud Comput 5(2):36
Donovan PO, Gallagher C, Bruton K, Sullivan DTJO (2018) A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manuf Lett. https://doi.org/10.1016/j.mfglet.2018.01.005
Ebebe A, Naveen C (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175. https://doi.org/10.1109/MCOM.2018.1700332
El-Latif AAA, Abd-El-Atty B, Hossain MS, Member S (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Spec Sect Recent Adv Cloud Radio Access Netw 6:10332–10340. https://doi.org/10.1109/ACCESS.2018.2799879
Escamilla-Ambrosio PJ, Rodríguez-Mota A, Aguirre-Anaya E, Acosta-Bermejo R, Salinas-Rosales M (2018) Distributing computing in the internet of things : cloud, fog and edge computing overview, pp 87–115. https://doi.org/10.1007/978-3-319-64063-1_4
Fu J, Liu Y, Chao H, Member S, Bhargava BK (2018) Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2018.2793350
Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw. https://doi.org/10.1109/MNET.2018.1700250
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42. https://doi.org/10.1016/j.jnca.2017.09.002
Huang C, Lu R, Choo KR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55:105–111. https://doi.org/10.1109/MCOM.2017.1700322
Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729. https://doi.org/10.1016/j.future.2017.01.026
Kang J, Yu R, Huang X, Zhang Y, Member S (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2017.2764095
Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 1:1. https://doi.org/10.1186/s13677-017-0090-3
Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inform Softw Technol 51(1):7–15
Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739–752. https://doi.org/10.1016/j.future.2017.01.024
Kumar P, Zaidi N, Choudhury T (2017) Fog computing: common security issues and proposed countermeasures. In: Proceedings of the 5th international conference on system modeling and advancement in research trends, SMART 2016, pp 311–315. https://doi.org/10.1109/SYSMART.2016.7894541
Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 International conference on the network of the future, NOF 2015. https://doi.org/10.1109/NOF.2015.7333287
Li G (2018) Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Spec Sect Internet Energy Archit Cyber Secur Appl 6:11278–11288. https://doi.org/10.1109/ACCESS.2018.2799543
Lisbon AA, Kavitha R (2017) A study on cloud and fog computing security issues and solutions. Int J Innov Res Adv Eng 3(4):2349–2163. http://ijirae.com/volumes/Vol4/iss03/03.MRAE10083.pdf
Liu X, Deng RH, Yang Y, Tran HN, Zhong S (2018) Hybrid privacy-preserving clinical decision support system in fog–cloud computing. Future Gener Comput Syst 78:825–837. https://doi.org/10.1016/j.future.2017.03.018
Lordan F, Lezzi D, Ejarque J, Badia RM (2018) An architecture for programming distributed applications on fog to cloud systems, 2. In: Heras DB, Bougé L (eds) Euro-Par 2017 workshops, vol 10659. LNCS. Springer International Publishing AG, Berlin, pp 325–337
Madni SHH, Latiff MSA, Ali J (2019) Multi-objective-oriented cuckoo search optimization-based resource scheduling algorithm for clouds. Arab J Sci Eng 44(4):3585–3602
Mahmud R, Koch FL, Buyya R (2018) Cloud–fog interoperability in IoT-enabled healthcare solutions. In: ICDCN’18: 19th international conference on distributed computing and networking, January 4–7, 2018, Varanasi, India. ACM, New York, NY, USA, pp 4–7. https://doi.org/10.1145/3154273.3154347
Mahmud R, Kotagiri R, Buyya R (2018) Fog computing : a taxonomy, survey and future directions. In: Di Martino B et al (eds) Internet of everything, internet of things. Springer Nature, Singapore. https://doi.org/10.1007/978-981-10-5861-5_5
Mart G (2018) Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain Comput Inform Syst. https://doi.org/10.1016/j.suscom.2018.02.010
Modarresi A, Gangadhar S, Sterbenz JP (2017) A framework for improving network resilience using SDN and fog nodes. In: 2017 9th international workshop on resilient networks design and modeling (RNDM). https://doi.org/10.1109/RNDM.2017.8093036
Mukherjee B, Wang S, Lu W, Neupane RL, Dunn D, Ren Y et al (2018) Flexible IoT security middleware for end-to-end cloud–fog communication. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.12.031
Neto ECP, Callou G, Aires F (2017) An algorithm to optimise the load distribution of fog environments. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC), Banff Center, Banff, Canada, October 5–8, 2017, (October), pp 1292–1297
Neto AJV, Zhao Z, Rodrigues JJPC, Member S, Camboim HB, Braun T (2018) Fog-based crime-assistance in smart IoT transportation system. IEEE Access 6:11101–11111
Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20:601–628. https://doi.org/10.1109/COMST.2017.2762345
Rahmani AM, Nguyen T, Negash B, Anzanpour A (2018) Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener Comput Syst 78:641–658. https://doi.org/10.1016/j.future.2017.02.014
Rios R, Roman R, Onieva JA, Lopez J (2017) From SMOG to fog: a security perspective. In: 2017 2nd International conference on fog and mobile edge computing, FMEC 2017, pp 56–61. https://doi.org/10.1109/FMEC.2017.7946408
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698. https://doi.org/10.1016/j.future.2016.11.009
Santoro D, Zozin D, Pizzolli D, De Pellegrini F, Cretti S Create-net FBK, Cascata D (2017). Foggy : a platform for workload orchestration in a fog computing environment. In: 2017 IEEE 9th international conference on cloud computing technology and science, pp 9–12. https://doi.org/10.1109/CloudCom.2017.62
Sharma PK, Chen M, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Spec Sect Intell Syst Internet Things 6:115–124. https://doi.org/10.1109/ACCESS.2017.2757955
Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Select Areas Commun 35(11):2586–2595
Shropshire J (2014) Extending the cloud with fog : security challenges & opportunities. In: Americas conference on information systems, pp 1–10
Singh A, Sandhu R, Sood SK (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354. https://doi.org/10.1016/j.cose.2017.08.016
Sood SK, Mahajan I (2018) Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.01.008
Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 federated conference on computer science and information systems, vol 2, pp 1–8. https://doi.org/10.15439/2014F503
Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of Fog computing and its security issues. Concurrency Comput Pract Exp 28:2991–3005. https://doi.org/10.1002/cpe
Sun Y, Lin F, Zhang N (2018) A security mechanism based on evolutionary game in fog computing. Saudi J Biol Sci 25(2):237–241. https://doi.org/10.1016/j.sjbs.2017.09.010
Wang H, Wang Z, Domingo-ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712–719. https://doi.org/10.1016/j.future.2017.02.032
Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B (2017) Data collection from WSNs to the cloud based on mobile fog elements. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.07.031
Wang T, Zhou J, Huang M, Alam Z, Liu A (2018) Fog-based storage technology to fight with cyber threat. Future Gener Comput Syst 83:208–218. https://doi.org/10.1016/j.future.2017.12.036
Wang Y, Uehara T, Sasaki R (2015) Fog computing: issues and challenges in security and forensics. Proc Int Comput Softw Appl Conf 3:53–59. https://doi.org/10.1109/COMPSAC.2015.173
Xiong C, Xiang R, Li Y, Han X, Du H (2018) Large-scale image-based fog detection based on cloud platform. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5597-6
Yang R, Xu Q, Ho M, Yu Z, Wang H, Zhou L (2018) Position based cryptography with location privacy: a step for Fog computing. Future Gener Comput Syst 78:799–806. https://doi.org/10.1016/j.future.2017.05.035
Yaseen Q, Aldwairi M, Jararweh Y, Brij MA (2017) Collusion attacks mitigation in internet of things : a fog based model. Springer Science + Business Media, LLC 2017, October. https://doi.org/10.1007/s11042-017-5288-3
Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: 10th International conference on wireless algorithms, systems, and applications, pp 685–695. https://doi.org/10.1007/978-3-319-21837-3_67
Zahra S, Alam M, Javaid Q, Wahid A, Javaid N, Ur S et al (2017) Fog computing over IoT: a secure deployment and formal verification. IEEE special section on recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing 5:27132–27144. https://doi.org/10.1109/ACCESS.2017.2766180
Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener Comput Syst 78:753–762. https://doi.org/10.1016/j.future.2016.12.015
Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) Human-driven edge computing and communication: a survey on access control in fog computing. IEEE Commun Mag 55:144–149. https://doi.org/10.1109/MCOM.2018.1700333
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yakubu, J., Abdulhamid, S.M., Christopher, H.A. et al. Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliable Intell Environ 5, 209–233 (2019). https://doi.org/10.1007/s40860-019-00081-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40860-019-00081-2