Security in fog computing: A systematic review on issues, challenges and solutions

被引:18
|
作者
Rezapour, Ronita [1 ]
Asghari, Parvaneh [2 ]
Javadi, Hamid Haj Seyyed [3 ]
Ghanbari, Shamsollah [4 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Qom Branch, Qom, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
[3] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[4] Islamic Azad Univ, Dept Comp Engn, Ashtian Branch, Ashtian, Iran
关键词
Fog computing; Cloud computing; Security in fog computing; ACCESS-CONTROL; AGGREGATION SCHEME; PRIVACY; CLOUD; INTERNET; THINGS; HEALTH; MODEL; IOT; ENCRYPTION;
D O I
10.1016/j.cosrev.2021.100421
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing refers to cloud computing development to the edge of a corporate network. Fog computing, as a promising computing paradigm, facilitates computing, storing and network services between terminal devices and cloud computing data centers. It also brings many advantages to cloud computing and large-scale deployment of IoT applications such as low latency, data locality, location awareness, mobility, less computational cost and geographical distribution. This extensive range of functionality raises various security concerns related to data, virtualization, segregation, network communication and monitoring. Security is a significant issue for fog computing since fog-based services are offered to massive-scale end-users by front fog nodes/servers. Also, fog computing focuses on ensuring the availability and reliability of services without worrying about the information stored or processed by the fog. Despite significant efforts that have been made in this field, many issues are still open. This paper prepares a comprehensive study of security challenges and different approaches in fog computing to address those challenges using the Systematic Literature Review (SLR) approach. Moreover, a technical taxonomy is offered for the fog security challenges and their strategies in terms of six aspects, including reliability, access control, attacks, secure connection, privacy and some special cases. The core objective of this study is to analytically and statistically classify the existing research techniques related to security aspects and available solutions in fog computing published between 2014 and 2021. Then some technical questions in this domain are provided, and also the strengths and weaknesses of each indicated fog security approach are discussed based on the questions, as well as suggesting some ideas to address security deficiencies in fog computing. Finally, some future motivational directions and open issues in this field are provided to design, implement, and maintain fog systems. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] A Review of Fog Computing and Machine Learning: Concepts, Applications, Challenges, and Open Issues
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Gunasekaran, Saraswathy Shamini
    Al-Mhiqani, Mohammed Nasser
    Mutlag, Ammar Awad
    Mostafa, Salama A.
    Ali, Nabeel Salih
    Ibrahim, Dheyaa Ahmed
    IEEE ACCESS, 2019, 7 : 153123 - 153140
  • [42] Mobile cloud computing models security issues: A systematic review
    AlAhmad, Ahmad Salah
    Kahtan, Hasan
    Alzoubi, Yehia Ibrahim
    Ali, Omar
    Jaradat, Ashraf
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 190
  • [43] Security and Privacy Issues in Cloud, Fog and Edge Computing
    Parikh, Shalin
    Dave, Dharmin
    Patel, Reema
    Doshi, Nishant
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 734 - 739
  • [44] Security Issues in Fog Computing using Vehicular Cloud
    Tiwari, Vipul
    Chaurasia, Brijesh Kumar
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [45] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [46] A Survey on Use Cases and Security Issues in Fog Computing
    Panse, Vaijayanti H.
    Neole, Bhumika
    Ghate, Minal
    Lad, Bhagyashree
    HELIX, 2018, 8 (06): : 4413 - 4417
  • [47] Fog Computing: Common Security Issues and Proposed Countermeasures
    Kumar, Praveen
    Zaidi, Nabeel
    Choudhury, Tanupriya
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 311 - 315
  • [48] Fog Computing: Overview, Architecture, Security Issues and Applications
    Dasari, Kishore
    Rayaprolu, Mounika
    ICCCE 2018, 2019, 500 : 11 - 18
  • [49] A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues
    Yehia Ibrahim Alzoubi
    Asif Gill
    Alok Mishra
    Journal of Cloud Computing, 11
  • [50] A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues
    Alzoubi, Yehia Ibrahim
    Gill, Asif
    Mishra, Alok
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01):