Security in fog computing: A systematic review on issues, challenges and solutions

被引:18
|
作者
Rezapour, Ronita [1 ]
Asghari, Parvaneh [2 ]
Javadi, Hamid Haj Seyyed [3 ]
Ghanbari, Shamsollah [4 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qom Branch, Qom, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
[3] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[4] Islamic Azad Univ, Dept Comp Engn, Ashtian Branch, Ashtian, Iran
关键词
Fog computing; Cloud computing; Security in fog computing; ACCESS-CONTROL; AGGREGATION SCHEME; PRIVACY; CLOUD; INTERNET; THINGS; HEALTH; MODEL; IOT; ENCRYPTION;
D O I
10.1016/j.cosrev.2021.100421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing refers to cloud computing development to the edge of a corporate network. Fog computing, as a promising computing paradigm, facilitates computing, storing and network services between terminal devices and cloud computing data centers. It also brings many advantages to cloud computing and large-scale deployment of IoT applications such as low latency, data locality, location awareness, mobility, less computational cost and geographical distribution. This extensive range of functionality raises various security concerns related to data, virtualization, segregation, network communication and monitoring. Security is a significant issue for fog computing since fog-based services are offered to massive-scale end-users by front fog nodes/servers. Also, fog computing focuses on ensuring the availability and reliability of services without worrying about the information stored or processed by the fog. Despite significant efforts that have been made in this field, many issues are still open. This paper prepares a comprehensive study of security challenges and different approaches in fog computing to address those challenges using the Systematic Literature Review (SLR) approach. Moreover, a technical taxonomy is offered for the fog security challenges and their strategies in terms of six aspects, including reliability, access control, attacks, secure connection, privacy and some special cases. The core objective of this study is to analytically and statistically classify the existing research techniques related to security aspects and available solutions in fog computing published between 2014 and 2021. Then some technical questions in this domain are provided, and also the strengths and weaknesses of each indicated fog security approach are discussed based on the questions, as well as suggesting some ideas to address security deficiencies in fog computing. Finally, some future motivational directions and open issues in this field are provided to design, implement, and maintain fog systems. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions
    Kaur, Navjeet
    COMPUTER SCIENCE REVIEW, 2024, 54
  • [2] Fog Computing and Security Issues: A review
    Aljumah, Abdullah
    Ahanger, Tariq Ahamed
    2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), 2018, : 237 - 239
  • [3] Fog Computing: Issues and Challenges in Security and Forensics
    Wang, Yifan
    Uehara, Tetsutaro
    Sasaki, Ryoichi
    IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, : 53 - 59
  • [4] A review of issues and challenges in fog computing environment
    Liu, Chenlei
    Xiang, Feng
    Wang, Pan
    Sun, Zhixin
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 232 - 237
  • [5] Security Issues With Fog Computing
    Miatra, Ayati
    Kumar, Sumit
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 123 - 128
  • [6] Fog computing security: a review of current applications and security solutions
    Saad Khan
    Simon Parkinson
    Yongrui Qin
    Journal of Cloud Computing, 6
  • [7] Fog computing security: a review of current applications and security solutions
    Khan, Saad
    Parkinson, Simon
    Qin, Yongrui
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [8] Cloud computing security issues & challenges: A Review
    Mondal, Avijit
    Paul, Subrata
    Goswami, Radha Tamal
    Nath, Sayan
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 159 - +
  • [9] Security Issues in Fog Environment: A Systematic Literature Review
    Jasleen Kaur
    Alka Agrawal
    Raees Ahmad Khan
    International Journal of Wireless Information Networks, 2020, 27 : 467 - 483
  • [10] Security Issues in Fog Environment: A Systematic Literature Review
    Kaur, Jasleen
    Agrawal, Alka
    Khan, Raees Ahmad
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) : 467 - 483