An overview of Fog computing and its security issues

Concurrency Computation Practice and Experience - Tập 28 Số 10 - Trang 2991-3005 - 2016
Ivan Stojmenović1, Sheng Wen1, Xinyi Huang1, Tom H. Luan1
1School of Information Technology, Deakin University, VIC, Australia

Tóm tắt

SummaryFog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man‐in‐the‐middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile. Copyright © 2015 John Wiley & Sons, Ltd.

Từ khóa


Tài liệu tham khảo

BonomiF.Connected vehicles the internet of things and Fog computing. The Eighth ACM International Workshop on Vehicular Inter‐Networking (VANET) Las Vegas USA 2011;13–15.

BonomiF MilitoR ZhuJ AddepalliS.Fog computing and its role in the internet of things. Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing MCC'12 ACM Ambleside Unite Kingdom 2012;13–16.

10.1145/2677046.2677052

10.2498/cit.1002381

Manreet K, 2014, Fog computing providing data security: a review, International Journal of Advanced Research in Computer Science and Software Engineering, 4, 832

ZhangL JiaW WenS YaoD.A man‐in‐the‐middle attack on 3G‐WLAN interworking.International Conference on Communications and Mobile Computing (CMC) Vol.1 Zhangjiajie China April 2010;121–125.

StojmenovicI WenS.The Fog computing paradigm: scenarios and security issues.2014 Federated Conference on Computer Science and Information Systems (FeDCSIS): IEEE Warsaw Poland 2014;1–8.

10.1145/1721654.1721672

10.1109/JSAC.2014.2332077

10.1016/j.comnet.2010.05.010

LiuK NgJ LeeV SonS StojmenovicI.Cooperative data dissemination in hybrid vehicular networks: Vanet as a software defined network 2014.Submitted for publication.

10.1145/2500468.2500473

Cisco.Cisco delivers vision of fog computing to accelerate value from billions of connected devices Cisco January 2014.

HongK LillethunD RamachandranU OttenwälderB KoldehofeB.Opportunistic spatio‐temporal event processing for mobile situation awareness.Proceedings of the 7th ACM International Conference on Distributed Event‐Based Systems DEBS'13 ACM Arlington TX USA 2013;195–206.

MadsenH AlbeanuG BurtschyB Popentiu‐VladicescuFL.Reliability in the utility computing era: towards reliable fog computing.2013 20th International Conference on Systems Signals and Image Processing (IWSSIP) Bucharest Romania July 2013;43–46.

HongK LillethunD RamachandranU OttenwälderB KoldehofeB.Mobile fog: a programming model for large‐scale applications on the internet of things.Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing MCC'13 ACM Hongkong 2013;15–20.

NishioT ShinkumaR TakahashiT MandayamNB.Service‐oriented heterogeneous resource sharing for optimizing service latency in mobile cloud.Proceedings of the First International Workshop on Mobile Cloud Computing and Networking MobileCloud'13 ACM Bangalore India 2013;19–26.

OttenwalderB KoldehofeB RothermelK RamachandranU.MigCEP: operator migration for mobility driven distributed complex event processing.Proceedings of the 7th ACM International Conference on Distributed Event‐Based Systems DEBS'13 ACM Arlington TX USA 2013;183–194.

ZhuJ ChanD PrabhuM NatarajanP HuH BonomiF.Improving web sites performance using edge servers in fog computing architecture.2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE) Wailea‐makena HI USA March 2013;320–323.

BETaaS.Building the environment for the things as a service BETaaS Nov. 2012.

10.1109/TSG.2012.2223766

KorzhykD ConitzerV ParrR.Solving Stackelberg games with uncertain observability.The 10th International Conference on Autonomous Agents and Multiagent Systems ‐ volume 3 AAMAS '11 Taipei Taiwan 2011;1013–1020.

10.1109/JSYST.2013.2260934

10.1109/LCOMM.2012.092812.121712

10.1109/MNET.2013.6678930

ZhouB CaoJ ZengX WuH.Adaptive traffic light control in wireless sensor network‐based intelligent transportation system.2010 IEEE 72nd Vehicular Technology Conference Fall (VTC 2010‐Fall) Ottawa Canada September 2010;1–5.

ZhouB CaoJ WuH.Adaptive traffic light control of multiple intersections in wsn‐based its.2011 IEEE 73rd Vehicular Technology Conference (VTC Spring) Budapest Hungary May 2011;1–5.

10.1109/TVT.2011.2168836

10.1016/j.jnca.2012.05.003

10.1109/TPWRS.2012.2224144

Broadcom BCM 5354. (Available from:http://www.broadcom.com.) [Accessed on 2 April 2015].

Wikipedia.Hooking what is hooking?2014. (Available from:http://en.wikipedia.org/wiki/Hooking) [Accessed on 2 April 2015].

10.1016/j.comnet.2012.12.017

10.1109/MCOM.2011.5741143

NIST.Guidelines for smart grid cyber security (NIST 7628) 2010. (Available from:Http://csrc.nist.gov/publications/ PubsNISTIRs.html) [Accessed on 2 April 2015].

10.1109/TPDS.2012.86

10.1109/TDSC.2013.2297110

SahaiA WatersB.Fuzzy identity‐based encryption.Eurocrypt Aarhus Denmark 2005;457–473.

LewkoAB OkamotoT SahaiA TakashimaK WatersB.Fully secure functional encryption: attribute‐based encryption and (hierarchical) inner product encryption.Eurocrypt Riviera French 2010;62–91.

LewkoAB WatersB.Unbounded HIBE and attribute‐based encryption.Eurocrypt Tallinn Estonia 2011;547–567.

WatersB.Ciphertext‐policy attribute‐based encryption: an expressive efficient and provably secure realization.Public Key Cryptography Taormina Italy 2011;53–70.

OstrovskyR SahaiA WatersB.Attribute‐based encryption with non‐monotonic access structures.ACM Conference on Computer and Communications Security Alexandria VA USA 2007;195–203.