A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions

被引:0
|
作者
Kaur, Navjeet [1 ]
机构
[1] Chandigarh Univ, Apex Inst Technol CSE, Mohali, Punjab, India
关键词
Fog computing; Cloud computing; Security; Privacy; Machine learning; Artificial intelligence; INTERNET; PRIVACY; EDGE; OPPORTUNITIES; SIMULATION; EFFICIENT; TOOLKIT; THINGS;
D O I
10.1016/j.cosrev.2024.100688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic and decentralized architecture of fog computing, which extends cloud computing closer to the edge of the network, offers benefits such as reduced latency and enhanced bandwidth. However, the existing fog architecture introduces unique security challenges due to the large number of distributed fog nodes, often deployed in diverse and resource-constrained environments. Further, the proximity of fog computing nodes to end-users and the open, distributed nature of the architecture make fog environments particularly vulnerable to unauthorized access and various types of cyberattacks. Therefore, in order to address these challenges, the study presented a detailed systematic review that aims to analyze existing security technologies in fog computing environments, identify current security gaps, and propose future research directions. The comprehensive literature review uses quality databases, focusing on articles published within the last four years, i.e. from 2020 to 2024. Further, the review followed a systematic methodology with clear inclusion and exclusion criteria to ensure relevance and quality with respect to security in fog computing. Consequently, key research questions are also formulated and answered for addressing various security concerns, such as architectural security, IoT integration vulnerabilities, and dynamic security management. Finally, the detailed review summarizes the key findings through MTGIR analysis to give valuable insights on the existing security framework of fog computing systems. The result analysis further revealed that 16% of the research is focusing on blockchain and elliptic curve cryptography, alongside the utilization of artificial intelligence and machine learning, which around 13.2%, specifically for dynamic threat detection. Furthermore, there are few technologies which require attention are federated learning, secure key management, and secure communication mechanisms, as these technologies are less considered in literature, i.e. around 3% only. Finally, the analysis underscored the necessity for real-time security monitoring and adaptive threat response to manage the dynamic nature of fog computing environments effectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Fog Computing Security Challenges and Future Directions
    Puthal, Deepak
    Mohanty, Saraju P.
    Bhavake, Sanjivani Ashok
    Morgan, Graham
    Ranjan, Rajiv
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (03) : 92 - 96
  • [2] Security in fog computing: A systematic review on issues, challenges and solutions
    Rezapour, Ronita
    Asghari, Parvaneh
    Javadi, Hamid Haj Seyyed
    Ghanbari, Shamsollah
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [3] Fog Computing Challenges and Future Directions: A Mirror Review
    Wani, Umer Iqbal
    Batth, Ranbir Singh
    Rashid, Mamoon
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 765 - 769
  • [4] A systematic review on task scheduling in Fog computing: Taxonomy, tools, challenges, and future directions
    Kaur, Navjeet
    Kumar, Ashok
    Kumar, Rajesh
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (21):
  • [5] Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions
    Alsadie, Deafallah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (04): : 89 - 100
  • [6] A survey of security and privacy challenges in cloud computing: Solutions and future directions
    Liu, Yuhong
    Sun, Yan
    Ryoo, Jungwoo
    Rizvi, Syed
    Vasilakos, Athanasios V.
    Journal of Computing Science and Engineering, 2015, 9 (03) : 119 - 133
  • [7] Security challenges in fog-computing environment: a systematic appraisal of current developments
    Yakubu J.
    Abdulhamid S.M.
    Christopher H.A.
    Chiroma H.
    Abdullahi M.
    Journal of Reliable Intelligent Environments, 2019, 5 (04) : 209 - 233
  • [8] A review of issues and challenges in fog computing environment
    Liu, Chenlei
    Xiang, Feng
    Wang, Pan
    Sun, Zhixin
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 232 - 237
  • [9] A decade of research in fog computing: Relevance, challenges, and future directions
    Srirama, Satish Narayana
    SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (01): : 3 - 23
  • [10] A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions
    Fei, Wen
    Ohno, Hiroyuki
    Sampalli, Srinivas
    ACM COMPUTING SURVEYS, 2024, 56 (05)