A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions

被引:0
|
作者
Kaur, Navjeet [1 ]
机构
[1] Chandigarh Univ, Apex Inst Technol CSE, Mohali, Punjab, India
关键词
Fog computing; Cloud computing; Security; Privacy; Machine learning; Artificial intelligence; INTERNET; PRIVACY; EDGE; OPPORTUNITIES; SIMULATION; EFFICIENT; TOOLKIT; THINGS;
D O I
10.1016/j.cosrev.2024.100688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic and decentralized architecture of fog computing, which extends cloud computing closer to the edge of the network, offers benefits such as reduced latency and enhanced bandwidth. However, the existing fog architecture introduces unique security challenges due to the large number of distributed fog nodes, often deployed in diverse and resource-constrained environments. Further, the proximity of fog computing nodes to end-users and the open, distributed nature of the architecture make fog environments particularly vulnerable to unauthorized access and various types of cyberattacks. Therefore, in order to address these challenges, the study presented a detailed systematic review that aims to analyze existing security technologies in fog computing environments, identify current security gaps, and propose future research directions. The comprehensive literature review uses quality databases, focusing on articles published within the last four years, i.e. from 2020 to 2024. Further, the review followed a systematic methodology with clear inclusion and exclusion criteria to ensure relevance and quality with respect to security in fog computing. Consequently, key research questions are also formulated and answered for addressing various security concerns, such as architectural security, IoT integration vulnerabilities, and dynamic security management. Finally, the detailed review summarizes the key findings through MTGIR analysis to give valuable insights on the existing security framework of fog computing systems. The result analysis further revealed that 16% of the research is focusing on blockchain and elliptic curve cryptography, alongside the utilization of artificial intelligence and machine learning, which around 13.2%, specifically for dynamic threat detection. Furthermore, there are few technologies which require attention are federated learning, secure key management, and secure communication mechanisms, as these technologies are less considered in literature, i.e. around 3% only. Finally, the analysis underscored the necessity for real-time security monitoring and adaptive threat response to manage the dynamic nature of fog computing environments effectively.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A systematic review on security in Process-Aware Information Systems - Constitution, challenges, and future directions
    Leitner, Maria
    Rinderle-Ma, Stefanie
    INFORMATION AND SOFTWARE TECHNOLOGY, 2014, 56 (03) : 273 - 293
  • [32] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [33] Security in Cloud Computing Systems A Review of Challenges and Solutions for Security in Distributed Computing Environments
    Srivastava, Stuti
    Sudhish, Prem Sewak
    PROCEEDINGS OF THE 2015 39TH NATIONAL SYSTEMS CONFERENCE (NSC), 2015,
  • [34] A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
    Manral, Bharat
    Somani, Gaurav
    Choo, Kim-Kwang Raymond
    Conti, Mauro
    Gaur, Manoj Singh
    ACM COMPUTING SURVEYS, 2020, 52 (06)
  • [35] Distributed Machine Learning in Edge Computing: Challenges, Solutions and Future Directions
    Tu, Jingke
    Yang, Lei
    Cao, Jiannong
    ACM COMPUTING SURVEYS, 2025, 57 (05)
  • [36] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [37] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307
  • [38] A Security Scheme for Fog Computing Environment of loT
    Fan, Yongkai
    Zhao, Guanqun
    Sun, Xiaofeng
    Wang, Jinghan
    Lei, Xia
    Xia, Fanglue
    PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 58 - 59
  • [39] Fog computing: A taxonomy, systematic review, current trends and research challenges
    Singh, Jagdeep
    Singh, Parminder
    Gill, Sukhpal Singh
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 157 : 56 - 85
  • [40] Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions
    Driss, Maha
    Hasan, Daniah
    Boulila, Wadii
    Ahmad, Jawad
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2385 - 2395