A comprehensive review on trust management approaches in fog computing

被引:0
|
作者
Karthikeyan, P. [1 ]
Brindha, K. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci Engn & Informat Syst, Vellore, Tamil Nadu, India
关键词
Trust management; fog computing; cloud computing; edge devices; security; SECURITY; PRIVACY; DEFENSE; MODEL;
D O I
10.3233/JIFS-232892
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Decentralised fog computing can provide real-time interaction, minimize latency, heterogeneity, and provide networking services between edge devices and cloud data centers. One of the biggest challenges in the fog layer network is finding a trustworthy fog node. Trust management encompasses the process of being trustworthy and the act of assessing the reliability of other nodes. It is essential to carry out a comprehensive review using a systematic approach in this field to advance our understanding, address emerging challenges, and foster secure and efficient trust management practices. This research paper considers a comprehensive analysis of high-quality fog computing trust management literature from 2018 to 2022. A variety of distinct approaches have been chosen by fog computing-based trust management and these techniques are classified into three categories: algorithms, challenges, and limitations. Further, it reviews the various trust attacks in fog environments, details the solutions proposed in the current literature, and concludes with a discussion of the open challenges and potential future research directions in fog computing.
引用
收藏
页码:11397 / 11423
页数:27
相关论文
共 50 条
  • [41] Reinforcement learning-based solution for resource management in fog computing: A comprehensive survey
    Ghafari, Reyhane
    Mansouri, Najme
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 276
  • [42] Internet of Vehicles: Cloud and Fog Computing Approaches
    Desirena Lopez, Hector Jalil
    Siller, Mario
    Huerta, Ivan
    2017 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2017, : 211 - 216
  • [43] Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
    Patwary, Abdullah Al-Noman
    Naha, Ranesh Kumar
    Garg, Saurabh
    Battula, Sudheer Kumar
    Patwary, Md Anwarul Kaium
    Aghasian, Erfan
    Amin, Muhammad Bilal
    Mahanti, Aniket
    Gong, Mingwei
    ELECTRONICS, 2021, 10 (10)
  • [44] A Comprehensive Review of Internet of Things: Technology Stack, Middlewares, and Fog/Edge Computing Interface
    Ali, Omer
    Ishak, Mohamad Khairi
    Bhatti, Muhammad Kamran Liaquat
    Khan, Imran
    Kim, Ki-Il
    SENSORS, 2022, 22 (03)
  • [45] Resource Allocation in Fog Computing based on Meta-Heuristic Approaches: A Systematic Review
    Anu
    Singhrova, Anita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (09): : 503 - 514
  • [46] Autonomic Resource Management for Fog Computing
    Tadakamalla, Uma
    Menasce, Daniel A.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2334 - 2350
  • [47] Autonomic energy management with Fog Computing
    Sampaio, Hugo Vaz
    Westphall, Carlos Becker
    Koch, Fernando
    Boing, Ricardo do Nascimento
    Santa Cruz, Rene Nolio
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [48] Formal verification approaches and standards in the cloud computing: A comprehensive and systematic review
    Souri, Alireza
    Navimipour, Nima Jafari
    Rahmani, Amir Masoud
    COMPUTER STANDARDS & INTERFACES, 2018, 58 : 1 - 22
  • [49] Approaches and interventions for postoperative pain management: A comprehensive review
    Khalid, Mohammed Khalid Hussein
    RAWAL MEDICAL JOURNAL, 2024, 49 (03): : 673 - 677
  • [50] Intelligent Approaches for Optimal Irrigation Management: A Comprehensive Review
    Amraouy, Okacha
    Benbrahim, Mohammed
    Kabbaj, Mohammed Nabil
    DIGITAL TECHNOLOGIES AND APPLICATIONS, ICDTA 2024, VOL 3, 2024, 1100 : 66 - 75