Security in fog computing: A systematic review on issues, challenges and solutions

被引:18
|
作者
Rezapour, Ronita [1 ]
Asghari, Parvaneh [2 ]
Javadi, Hamid Haj Seyyed [3 ]
Ghanbari, Shamsollah [4 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qom Branch, Qom, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
[3] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[4] Islamic Azad Univ, Dept Comp Engn, Ashtian Branch, Ashtian, Iran
关键词
Fog computing; Cloud computing; Security in fog computing; ACCESS-CONTROL; AGGREGATION SCHEME; PRIVACY; CLOUD; INTERNET; THINGS; HEALTH; MODEL; IOT; ENCRYPTION;
D O I
10.1016/j.cosrev.2021.100421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing refers to cloud computing development to the edge of a corporate network. Fog computing, as a promising computing paradigm, facilitates computing, storing and network services between terminal devices and cloud computing data centers. It also brings many advantages to cloud computing and large-scale deployment of IoT applications such as low latency, data locality, location awareness, mobility, less computational cost and geographical distribution. This extensive range of functionality raises various security concerns related to data, virtualization, segregation, network communication and monitoring. Security is a significant issue for fog computing since fog-based services are offered to massive-scale end-users by front fog nodes/servers. Also, fog computing focuses on ensuring the availability and reliability of services without worrying about the information stored or processed by the fog. Despite significant efforts that have been made in this field, many issues are still open. This paper prepares a comprehensive study of security challenges and different approaches in fog computing to address those challenges using the Systematic Literature Review (SLR) approach. Moreover, a technical taxonomy is offered for the fog security challenges and their strategies in terms of six aspects, including reliability, access control, attacks, secure connection, privacy and some special cases. The core objective of this study is to analytically and statistically classify the existing research techniques related to security aspects and available solutions in fog computing published between 2014 and 2021. Then some technical questions in this domain are provided, and also the strengths and weaknesses of each indicated fog security approach are discussed based on the questions, as well as suggesting some ideas to address security deficiencies in fog computing. Finally, some future motivational directions and open issues in this field are provided to design, implement, and maintain fog systems. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Security Issues and Challenges in Cloud Computing: A Mirror Review
    Kumari, Chandini
    Singh, Gagandeep
    Singh, Gursharan
    Batth, Ranbir Singh
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), 2019, : 702 - 707
  • [22] A survey on security challenges in cloud computing: issues, threats, and solutions
    Tabrizchi, Hamed
    Kuchaki Rafsanjani, Marjan
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (12): : 9493 - 9532
  • [23] A survey on security challenges in cloud computing: issues, threats, and solutions
    Hamed Tabrizchi
    Marjan Kuchaki Rafsanjani
    The Journal of Supercomputing, 2020, 76 : 9493 - 9532
  • [24] The Fog Computing Paradigm: Scenarios and Security Issues
    Stojmenovic, Ivan
    Wen, Sheng
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 1 - 8
  • [25] An Overview on the Applications and Security Issues of Fog Computing
    Bi, Fangming
    Miao, Xuzhi
    Chen, Wei
    Fang, Weidong
    Zhang, Wuxiong
    Wang, Deyu
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1792 - 1797
  • [26] An overview of Fog computing and its security issues
    Stojmenovic, Ivan
    Wen, Sheng
    Huang, Xinyi
    Luan, Hao
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2991 - 3005
  • [27] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [28] Security and privacy issues in fog computing environment
    Lata, Manju
    Kumar, Vikas
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2022, 14 (03) : 289 - 307
  • [29] Security and Privacy Issues of Fog Computing: A Survey
    Yi, Shanhe
    Qin, Zhengrui
    Li, Qun
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2015, 9204 : 685 - 695
  • [30] Edge computing in SDN-IoT networks: a systematic review of issues, challenges and solutions
    Seyedeh Shabnam Jazaeri
    Sam Jabbehdari
    Parvaneh Asghari
    Hamid Haj Seyyed Javadi
    Cluster Computing, 2021, 24 : 3187 - 3228