[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

An overview of Fog computing and its security issues

Published: 01 July 2016 Publication History

Abstract

Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile. Copyright © 2015John Wiley & Sons, Ltd.

References

[1]
Bonomi F. Connected vehicles, the internet of things, and Fog computing. The Eighth ACM International Workshop on Vehicular Inter-Networking VANET, Las Vegas, USA, 2011; pp.13-15.
[2]
Bonomi F, Milito R, Zhu J, Addepalli S. Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, <bookSeriesTitle>MCC'12, ACM</bookSeriesTitle>, Ambleside, Unite Kingdom, 2012; pp.13-16.
[3]
Vaquero LM, Rodero-Merino L. Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review 2014; Volume 44 Issue 5: pp.27-32.
[4]
Hajibaba M, Gorgin S. A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing. CIT. Journal of Computing and Information Technology 2014; Volume 22 Issue 2: pp.69-84.
[5]
Manreet K, Monika B. Fog computing providing data security: a review. International Journal of Advanced Research in Computer Science and Software Engineering 2014; Volume 4 Issue 6: pp.832-834.
[6]
Zhang L, Jia W, Wen S, Yao D. A man-in-the-middle attack on 3G-WLAN interworking. International Conference on Communications and Mobile Computing CMC, Vol. Volume 1, Zhangjiajie, China, April 2010; pp.121-125.
[7]
Stojmenovic I, Wen S. The Fog computing paradigm: scenarios and security issues. 2014 Federated Conference on Computer Science and Information Systems FeDCSIS: IEEE, Warsaw, Poland, 2014; pp.1-8.
[8]
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM 2010; Volume 53 Issue 4: pp.50-58.
[9]
Wei C, Fadlullah Z, Kato N, Stojmenovic I. On optimally reducing power loss in micro-grids with power storage devices. IEEE Journal of Selected Areas in Communications 2014; Volume 32 Issue 7: pp.1361-1370.
[10]
Atzori L, Iera A, Morabito G. The internet of things: a survey. Computer Networks 2010; Volume 54 Issue 15: pp.2787-2805.
[11]
Liu K, Ng J, Lee V, Son S, Stojmenovic I. Cooperative data dissemination in hybrid vehicular networks: Vanet as a software defined network, 2014. Submitted for publication.
[12]
Kirkpatrick K. Software-defined networking. Communication of the ACM 2013; Volume 56 Issue 9: pp.16-19.
[13]
Cisco. Cisco delivers vision of fog computing to accelerate value from billions of connected devices, Cisco, January 2014.
[14]
Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B. Opportunistic spatio-temporal event processing for mobile situation awareness. Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, <bookSeriesTitle>DEBS'13, ACM</bookSeriesTitle>, Arlington, TX, USA, 2013; pp.195-206.
[15]
Madsen H, Albeanu G, Burtschy B, Popentiu-Vladicescu FL. Reliability in the utility computing era: towards reliable fog computing. 2013 20th International Conference on Systems, Signals and Image Processing IWSSIP, Bucharest, Romania, July 2013; pp.43-46.
[16]
Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B. Mobile fog: a programming model for large-scale applications on the internet of things. Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, <bookSeriesTitle>MCC'13, ACM</bookSeriesTitle>, Hongkong, 2013; pp.15-20.
[17]
Nishio T, Shinkuma R, Takahashi T, Mandayam NB. Service-oriented heterogeneous resource sharing for optimizing service latency in mobile cloud. Proceedings of the First International Workshop on Mobile Cloud Computing and Networking, <bookSeriesTitle>MobileCloud'13, ACM</bookSeriesTitle>, Bangalore, India, 2013; pp.19-26.
[18]
Ottenwalder B, Koldehofe B, Rothermel K, Ramachandran U. MigCEP: operator migration for mobility driven distributed complex event processing. Proceedings of the 7th ACM International Conference on Distributed Event-Based Systems, <bookSeriesTitle>DEBS'13, ACM</bookSeriesTitle>, Arlington, TX, USA, 2013; pp.183-194.
[19]
Zhu J, Chan D, Prabhu M, Natarajan P, Hu H, Bonomi F. Improving web sites performance using edge servers in fog computing architecture. 2013 IEEE 7th International Symposium on Service Oriented System Engineering SOSE, Wailea-makena, HI, USA, March 2013; pp.320-323.
[20]
BETaaS. Building the environment for the things as a service, BETaaS, Nov. 2012.
[21]
Maharjan S, Zhu Q, Zhang Y, Gjessing S, Basar T. Dependable demand response management in the smart grid: a stackelberg game approach. IEEE Transactions on Smart Grid March 2013; Volume 4 Issue 1: pp.120-132.
[22]
Korzhyk D, Conitzer V, Parr R. Solving Stackelberg games with uncertain observability. The 10th International Conference on Autonomous Agents and Multiagent Systems - volume 3, <bookSeriesTitle>AAMAS '11</bookSeriesTitle>, Taipei, Taiwan, 2011; pp.1013-1020.
[23]
Fadlullah Z, Quan D, Kato N, Stojmenovic I. GTES: an optimized game-theoretic demand-side management scheme for smart grid. IEEE Systems Journal 2014; Volume 8 Issue 2: pp.588-597.
[24]
Luo T, Tan HP, Quek T. Sensor openflow: enabling software-defined wireless sensor networks. IEEE Communications Letters 2012; Volume 16 Issue 11: pp.1896-1899.
[25]
Daraghmi Y, Yi CW, Stojmenovic I. Forwarding methods in data dissemination and routing protocols for vehicular ad hoc networks. IEEE Network 2013; Volume 27 Issue 6: pp.74-79.
[26]
Zhou B, Cao J, Zeng X, Wu H. Adaptive traffic light control in wireless sensor network-based intelligent transportation system. 2010 IEEE 72nd Vehicular Technology Conference Fall VTC 2010-Fall, Ottawa, Canada, September 2010; pp.1-5.
[27]
Zhou B, Cao J, Wu H. Adaptive traffic light control of multiple intersections in wsn-based its. 2011 IEEE 73rd Vehicular Technology Conference VTC Spring, Budapest, Hungary, May 2011; pp.1-5.
[28]
Li C, Shimamoto S. An open traffic light control model for reducing vehicles CO2 emissions based on etc vehicles. IEEE Transactions on Vehicular Technology January 2012; Volume 61 Issue 1: pp.97-110.
[29]
Modi C, Patel D, Borisaniya B, Patel H, Patel A, Rajarajan M. A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications 2013; Volume 36 Issue 1: pp.42-57.
[30]
Valenzuela J, Wang J, Bissinger N. Real-time intrusion detection in power system operations. IEEE Transactions on Power Systems 2013; Volume 28 Issue 2: pp.1052-1062.
[31]
Broadcom BCM 5354. Available from: "http://www.broadcom.com." {Accessed on 2 April 2015}.
[32]
Wikipedia. Hooking, what is hooking? 2014. Available from: "http://en.wikipedia.org/wiki/Hooking" {Accessed on 2 April 2015}.
[33]
Wang W, Lu Z. Survey cyber security in the smart grid: survey and challenges. Computer Networks 2013; Volume 57 Issue 5: pp.1344-1371.
[34]
Lu R, Li X, Liang X, Shen X, Lin X. GRS: the green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 2011; Volume 49 Issue 4: pp.28-35.
[35]
NIST. Guidelines for smart grid cyber security NIST 7628, 2010. Available from: "Http://csrc.nist.gov/publications/ PubsNISTIRs.html" {Accessed on 2 April 2015}.
[36]
Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; Volume 23 Issue 9: pp.1621-1631.
[37]
Huang X, Xiang Y, Bertino E, Zhou J, Xu L. Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing 2014; Volume 11 Issue 6: pp.568-581.
[38]
Sahai A, Waters B. Fuzzy identity-based encryption. Eurocrypt, Aarhus, Denmark, 2005; pp.457-473.
[39]
Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: attribute-based encryption and hierarchical inner product encryption. Eurocrypt, Riviera, French, 2010; pp.62-91.
[40]
Lewko AB, Waters B. Unbounded HIBE and attribute-based encryption. Eurocrypt, Tallinn, Estonia, 2011; pp.547-567.
[41]
Waters B. Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptography, Taormina, Italy, 2011; pp.53-70.
[42]
Ostrovsky R, Sahai A, Waters B. Attribute-based encryption with non-monotonic access structures. ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2007; pp.195-203.

Cited By

View all
  • (2024)A Review on FoG Computing in 5G Wireless Technologies: Research Challenges, Issues and SolutionsWireless Personal Communications: An International Journal10.1007/s11277-024-11061-y134:4(2455-2484)Online publication date: 1-Feb-2024
  • (2024)A new approach for service activation management in fog computing using Cat Swarm Optimization algorithmComputing10.1007/s00607-024-01302-0106:11(3537-3572)Online publication date: 4-Jul-2024
  • (2023)A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and ProtectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.312459935:4(3347-3366)Online publication date: 1-Apr-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Concurrency and Computation: Practice & Experience
Concurrency and Computation: Practice & Experience  Volume 28, Issue 10
July 2016
270 pages
ISSN:1532-0626
EISSN:1532-0634
Issue’s Table of Contents

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 July 2016

Author Tags

  1. Fog computing
  2. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Review on FoG Computing in 5G Wireless Technologies: Research Challenges, Issues and SolutionsWireless Personal Communications: An International Journal10.1007/s11277-024-11061-y134:4(2455-2484)Online publication date: 1-Feb-2024
  • (2024)A new approach for service activation management in fog computing using Cat Swarm Optimization algorithmComputing10.1007/s00607-024-01302-0106:11(3537-3572)Online publication date: 4-Jul-2024
  • (2023)A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and ProtectionIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2021.312459935:4(3347-3366)Online publication date: 1-Apr-2023
  • (2023)Smart Traffic Navigation System for Fault-Tolerant Edge Computing of Internet of Vehicle in Intelligent Transportation GatewayIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.323223124:11(13011-13022)Online publication date: 1-Nov-2023
  • (2023)Impacts of Connected and Automated Vehicles on Road Safety and Efficiency: A Systematic Literature ReviewIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.322717624:3(2705-2736)Online publication date: 1-Mar-2023
  • (2023)Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular NetworksIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.318663024:11(13123-13132)Online publication date: 1-Nov-2023
  • (2023)An efficient and privacy-preserving query scheme in intelligent transportation systemsInformation Sciences: an International Journal10.1016/j.ins.2023.119448647:COnline publication date: 1-Nov-2023
  • (2023)Truthful and performance-optimal computation outsourcing for aerial surveillance platforms via learning-based auctionComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109651225:COnline publication date: 1-Apr-2023
  • (2023)Fog Computing Complete Review: Concepts, Trends, Architectures, Technologies, Simulators, Security Issues, Applications, and Open Research FieldsSN Computer Science10.1007/s42979-023-02235-94:6Online publication date: 4-Oct-2023
  • (2023)Decision model of intrusion response based on markov game in fog computing environmentWireless Networks10.1007/s11276-023-03382-w29:8(3383-3392)Online publication date: 13-Jun-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media