A survey on fog computing: research challenges in security and privacy issues

  • Authors

    • T Veerraju
    • Dr K. Kiran Kumar
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.10710
  • Attacks, Cloud computing, Fog computing, Internet of things, Security and Privacy.
  • Abstract

    With the rapid advancement of Internet of Things has enabled to combine the intercommunication and interconnection between seamless networks. Cloud computing provides backend solutions and one among the most prominent technologies for the users, still cannot be solved all the problems such as latency of real time applications. However, a new computing paradigm comes in to the picture. Many of the researchers focused on this exemplar known as Fog/Edge computing, which has been planned to the extension of cloud services. Fog provides the services to the edge of the networks, which makes communication, computation and storage for end users through fog devices and for servers like controllers. We analyze the study, which aims to augment low bandwidth, latency along with the privacy and security.   The major problem in the Fog computing is security due to the limited resources. In this paper, we investigated the protection issues and confrontation of Fog and also provide countermeasures on security for different attacks. We focused the future security directions and challenges to address in fog networks.

  • References

    1. [1] Atzori, L., Iera, A., Morabito, G., 2010. “The internet of things: a surveyâ€. Comput. Netw. 54 (15), 2787–2805.

      [2] D. Singh, G. Tripathi, and A.J. Jara. "A survey of Internet-of-things: Future vision, architecture, challenges and services." In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp. 287-292. IEEE, 2014.

      [3] Yi, S., Hao, Z., Qin, Z., Li, Q., 2015a. “Fog computing: platform and applicationsâ€. In: Proceedings of the Third IEEE Workshop on Hot Topics in Web Systems and Technologies, pp. 73–78.

      [4] Veerraju T,Sai Ganesh S and Murthy GSN.,†A study on Fog Computing based IoT: Security Issues and Challengesâ€,Vol 6. Issue 12, pp.8257-8259. IJCAR, 2017.

      [5] Bonomi, F., R. Milito, J. Zhu, and S.Addepalli. 2012. “Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computingâ€, ACM,13–16.

      [6] Sarkar, S., S. Chatterjee, and S. Misra. 2015. “Assessment of the suitability of fog computing in the context of internet of thingsâ€. IEEE Transactions on Cloud Computing PP(99): 1–1.

      [7] Varghese, B., N. Wang, S. Barbhuiya, P. Kilpatrick, and D.S. Nikolopoulos. 2016. “Challenges and opportunities in edge computingâ€. In Proceedings of the IEEE International Conference on Smart Cloud, 20–26.

      [8] D. Singh, G. Tripathi, and A.J. Jara. "A survey of Internet-of-things: Future vision, architecture, challenges and services." In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp. 287-292. IEEE, 2014.

      [9] H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: a review." In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3, pp. 648-651. IEEE, 2012.

      [10] Redowan Mahmud, Ramamohanarao Kotagiri and Rajkumar Buyya, “Fog Computing: A Taxonomy, Survey and Future Directionsâ€, Internet of Everything. Internet of Things (Technology, Communications and Computing), Springer 2017 103-130.

      [11] Khan et al. “Fog computing security: a review of current applications and security solutionsâ€, Journal of Cloud Computing: Advances, Systems and Applications (2017) 6:19.

      [12] Jatinder Singh, Thomas Pasquier, Jean Bacon, Hajoon Ko, and David Eyers, “Twenty security considerations for cloud-supported Internet of Things “,IEEE Internet of Things Journal ( Volume: 3, Issue: 3, June 2016 ), pp.269-284.

      [13] Shanhe Yi, Zhengrui Qin, and Qun Li, “Security and Privacy Issues of Fog Computing: A Survey Wireless Algorithms, Systems, and Applicationsâ€, LNCS 9204, Springer, 2015, pp. 685–695.

      [14] Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao: “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applicationsâ€. IEEE Internet of Things Journal 4(5): 1125-1142 (2017)

      [15] Mithun mukherjee, Rakesh matam et. al “Security and Privacy in Fog Computing: Challengesâ€, 2169-3536 2017 IEEE. Translations and content mining are permitted for academic research only.

  • Downloads

  • How to Cite

    Veerraju, T., & K. Kiran Kumar, D. (2018). A survey on fog computing: research challenges in security and privacy issues. International Journal of Engineering & Technology, 7(2.7), 335-340. https://doi.org/10.14419/ijet.v7i2.7.10710

    Received date: 2018-03-27

    Accepted date: 2018-03-27

    Published date: 2018-03-18