A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions

被引:0
|
作者
Kaur, Navjeet [1 ]
机构
[1] Chandigarh Univ, Apex Inst Technol CSE, Mohali, Punjab, India
关键词
Fog computing; Cloud computing; Security; Privacy; Machine learning; Artificial intelligence; INTERNET; PRIVACY; EDGE; OPPORTUNITIES; SIMULATION; EFFICIENT; TOOLKIT; THINGS;
D O I
10.1016/j.cosrev.2024.100688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic and decentralized architecture of fog computing, which extends cloud computing closer to the edge of the network, offers benefits such as reduced latency and enhanced bandwidth. However, the existing fog architecture introduces unique security challenges due to the large number of distributed fog nodes, often deployed in diverse and resource-constrained environments. Further, the proximity of fog computing nodes to end-users and the open, distributed nature of the architecture make fog environments particularly vulnerable to unauthorized access and various types of cyberattacks. Therefore, in order to address these challenges, the study presented a detailed systematic review that aims to analyze existing security technologies in fog computing environments, identify current security gaps, and propose future research directions. The comprehensive literature review uses quality databases, focusing on articles published within the last four years, i.e. from 2020 to 2024. Further, the review followed a systematic methodology with clear inclusion and exclusion criteria to ensure relevance and quality with respect to security in fog computing. Consequently, key research questions are also formulated and answered for addressing various security concerns, such as architectural security, IoT integration vulnerabilities, and dynamic security management. Finally, the detailed review summarizes the key findings through MTGIR analysis to give valuable insights on the existing security framework of fog computing systems. The result analysis further revealed that 16% of the research is focusing on blockchain and elliptic curve cryptography, alongside the utilization of artificial intelligence and machine learning, which around 13.2%, specifically for dynamic threat detection. Furthermore, there are few technologies which require attention are federated learning, secure key management, and secure communication mechanisms, as these technologies are less considered in literature, i.e. around 3% only. Finally, the analysis underscored the necessity for real-time security monitoring and adaptive threat response to manage the dynamic nature of fog computing environments effectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] Fog computing security: A review
    Jumani, Awais Khan
    Shi, Jinglun
    Laghari, Asif Ali
    Hu, Zhihui
    ul Nabi, Aftab
    Qian, Huang
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [22] Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions
    Al-Aqrabi, Hussain
    Liu, Lu
    Hill, Richard
    Ding, Zhijun
    Antonopoulos, Nick
    2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, : 137 - 144
  • [23] A Review on Task Scheduling Techniques in Cloud and Fog Computing: Taxonomy, Tools, Open Issues, Challenges, and Future Directions
    Khan, Zulfiqar Ali
    Aziz, Izzatdin Abdul
    Osman, Nurul Aida Bt
    Ullah, Israr
    IEEE ACCESS, 2023, 11 : 143417 - 143445
  • [24] Quantum computing: A taxonomy, systematic review and future directions
    Gill, Sukhpal Singh
    Kumar, Adarsh
    Singh, Harvinder
    Singh, Manmeet
    Kaur, Kamalpreet
    Usman, Muhammad
    Buyya, Rajkumar
    SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (01): : 66 - 114
  • [25] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    Said El Kafhali
    Iman El Mir
    Mohamed Hanini
    Archives of Computational Methods in Engineering, 2022, 29 : 223 - 246
  • [26] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    El Kafhali, Said
    El Mir, Iman
    Hanini, Mohamed
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (01) : 223 - 246
  • [27] Dependability in fog computing: Challenges and solutions
    Alraddady, Sara
    Li, Alice
    Soh, Ben
    AlZain, Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2021, 8 (04): : 82 - 88
  • [28] Challenges and Solutions in Fog Computing Orchestration
    Jiang, Yuxuan
    Huang, Zhe
    Tsang, Danny H. K.
    IEEE NETWORK, 2018, 32 (03): : 122 - 129
  • [29] Artificial Intelligence Techniques for Securing Fog Computing Environments: Trends, Challenges, and Future Directions
    Alsadie, Deafallah
    IEEE ACCESS, 2024, 12 : 151598 - 151648
  • [30] Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions
    Ul Islam, Mir Salim
    Kumar, Ashok
    Hu, Yu-Chen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 180 (180)