Advertisement

Journal of Reliable Intelligent Environments

, Volume 5, Issue 4, pp 209–233 | Cite as

Security challenges in fog-computing environment: a systematic appraisal of current developments

  • Jimoh Yakubu
  • Shafi’i Muhammad AbdulhamidEmail author
  • Haruna Atabo Christopher
  • Haruna Chiroma
  • Mohammed Abdullahi
Review

Abstract

Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.

Keywords

Fog computing Fog-computing security Cloud computing Cloud-computing security Fog-computing taxonomy Edge computing 

Notes

References

  1. 1.
    Abdulhamid SM, Latiff MS (2017) A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl Soft Comput 61:670–680CrossRefGoogle Scholar
  2. 2.
    Abbasi BZ, Shah MA (2017) Robust practices. In: Proceedings of the 23rd international conference on automation & computing, University of Hudders Field, Hudders Field, UK, 7–8 September 2017, pp 7–8Google Scholar
  3. 3.
    Arya D, Dave M (2017) Security-based service broker policy for fog computing environment. In: IEEE 8th ICCCNT 2017, Department of Computer EngineeringGoogle Scholar
  4. 4.
    Barik RK, Dubey AC, Tripathi A, Pratik T, Lenka K, Pratik T et al (2018) Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health. Procedia Comput Sci 125:647–653.  https://doi.org/10.1016/j.procs.2017.12.083 CrossRefGoogle Scholar
  5. 5.
    Bedi RK, Singh J, Gupta SK (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput.  https://doi.org/10.1007/s11227-018-2304-y CrossRefGoogle Scholar
  6. 6.
    Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94–120.  https://doi.org/10.1016/j.comnet.2017.10.002 CrossRefGoogle Scholar
  7. 7.
    Christopher HA, Yakubu J, Mohammed AD (2018) An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier. imanagers J Cloud Comput 5(2):36Google Scholar
  8. 8.
    Donovan PO, Gallagher C, Bruton K, Sullivan DTJO (2018) A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manuf Lett.  https://doi.org/10.1016/j.mfglet.2018.01.005 CrossRefGoogle Scholar
  9. 9.
    Ebebe A, Naveen C (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175.  https://doi.org/10.1109/MCOM.2018.1700332 CrossRefGoogle Scholar
  10. 10.
    El-Latif AAA, Abd-El-Atty B, Hossain MS, Member S (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Spec Sect Recent Adv Cloud Radio Access Netw 6:10332–10340.  https://doi.org/10.1109/ACCESS.2018.2799879 CrossRefGoogle Scholar
  11. 11.
    Escamilla-Ambrosio PJ, Rodríguez-Mota A, Aguirre-Anaya E, Acosta-Bermejo R, Salinas-Rosales M (2018) Distributing computing in the internet of things : cloud, fog and edge computing overview, pp 87–115.  https://doi.org/10.1007/978-3-319-64063-1_4 Google Scholar
  12. 12.
    Fu J, Liu Y, Chao H, Member S, Bhargava BK (2018) Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inform.  https://doi.org/10.1109/TII.2018.2793350 CrossRefGoogle Scholar
  13. 13.
    Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw.  https://doi.org/10.1109/MNET.2018.1700250 CrossRefGoogle Scholar
  14. 14.
    Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42.  https://doi.org/10.1016/j.jnca.2017.09.002 CrossRefGoogle Scholar
  15. 15.
    Huang C, Lu R, Choo KR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55:105–111.  https://doi.org/10.1109/MCOM.2017.1700322 CrossRefGoogle Scholar
  16. 16.
    Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729.  https://doi.org/10.1016/j.future.2017.01.026 CrossRefGoogle Scholar
  17. 17.
    Kang J, Yu R, Huang X, Zhang Y, Member S (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst.  https://doi.org/10.1109/TITS.2017.2764095 CrossRefGoogle Scholar
  18. 18.
    Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 1:1.  https://doi.org/10.1186/s13677-017-0090-3 CrossRefGoogle Scholar
  19. 19.
    Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inform Softw Technol 51(1):7–15CrossRefGoogle Scholar
  20. 20.
    Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739–752.  https://doi.org/10.1016/j.future.2017.01.024 CrossRefGoogle Scholar
  21. 21.
    Kumar P, Zaidi N, Choudhury T (2017) Fog computing: common security issues and proposed countermeasures. In: Proceedings of the 5th international conference on system modeling and advancement in research trends, SMART 2016, pp 311–315.  https://doi.org/10.1109/SYSMART.2016.7894541
  22. 22.
    Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 International conference on the network of the future, NOF 2015.  https://doi.org/10.1109/NOF.2015.7333287
  23. 23.
    Li G (2018) Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Spec Sect Internet Energy Archit Cyber Secur Appl 6:11278–11288.  https://doi.org/10.1109/ACCESS.2018.2799543 CrossRefGoogle Scholar
  24. 24.
    Lisbon AA, Kavitha R (2017) A study on cloud and fog computing security issues and solutions. Int J Innov Res Adv Eng 3(4):2349–2163. http://ijirae.com/volumes/Vol4/iss03/03.MRAE10083.pdf
  25. 25.
    Liu X, Deng RH, Yang Y, Tran HN, Zhong S (2018) Hybrid privacy-preserving clinical decision support system in fog–cloud computing. Future Gener Comput Syst 78:825–837.  https://doi.org/10.1016/j.future.2017.03.018 CrossRefGoogle Scholar
  26. 26.
    Lordan F, Lezzi D, Ejarque J, Badia RM (2018) An architecture for programming distributed applications on fog to cloud systems, 2. In: Heras DB, Bougé L (eds) Euro-Par 2017 workshops, vol 10659. LNCS. Springer International Publishing AG, Berlin, pp 325–337Google Scholar
  27. 27.
    Madni SHH, Latiff MSA, Ali J (2019) Multi-objective-oriented cuckoo search optimization-based resource scheduling algorithm for clouds. Arab J Sci Eng 44(4):3585–3602CrossRefGoogle Scholar
  28. 28.
    Mahmud R, Koch FL, Buyya R (2018) Cloud–fog interoperability in IoT-enabled healthcare solutions. In: ICDCN’18: 19th international conference on distributed computing and networking, January 4–7, 2018, Varanasi, India. ACM, New York, NY, USA, pp 4–7.  https://doi.org/10.1145/3154273.3154347
  29. 29.
    Mahmud R, Kotagiri R, Buyya R (2018) Fog computing : a taxonomy, survey and future directions. In: Di Martino B et al (eds) Internet of everything, internet of things. Springer Nature, Singapore.  https://doi.org/10.1007/978-981-10-5861-5_5 CrossRefGoogle Scholar
  30. 30.
    Mart G (2018) Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain Comput Inform Syst.  https://doi.org/10.1016/j.suscom.2018.02.010 CrossRefGoogle Scholar
  31. 31.
    Modarresi A, Gangadhar S, Sterbenz JP (2017) A framework for improving network resilience using SDN and fog nodes. In: 2017 9th international workshop on resilient networks design and modeling (RNDM).  https://doi.org/10.1109/RNDM.2017.8093036
  32. 32.
    Mukherjee B, Wang S, Lu W, Neupane RL, Dunn D, Ren Y et al (2018) Flexible IoT security middleware for end-to-end cloud–fog communication. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2017.12.031 CrossRefGoogle Scholar
  33. 33.
    Neto ECP, Callou G, Aires F (2017) An algorithm to optimise the load distribution of fog environments. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC), Banff Center, Banff, Canada, October 5–8, 2017, (October), pp 1292–1297Google Scholar
  34. 34.
    Neto AJV, Zhao Z, Rodrigues JJPC, Member S, Camboim HB, Braun T (2018) Fog-based crime-assistance in smart IoT transportation system. IEEE Access 6:11101–11111CrossRefGoogle Scholar
  35. 35.
    Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20:601–628.  https://doi.org/10.1109/COMST.2017.2762345 CrossRefGoogle Scholar
  36. 36.
    Rahmani AM, Nguyen T, Negash B, Anzanpour A (2018) Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener Comput Syst 78:641–658.  https://doi.org/10.1016/j.future.2017.02.014 CrossRefGoogle Scholar
  37. 37.
    Rios R, Roman R, Onieva JA, Lopez J (2017) From SMOG to fog: a security perspective. In: 2017 2nd International conference on fog and mobile edge computing, FMEC 2017, pp 56–61.  https://doi.org/10.1109/FMEC.2017.7946408
  38. 38.
    Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698.  https://doi.org/10.1016/j.future.2016.11.009 CrossRefGoogle Scholar
  39. 39.
    Santoro D, Zozin D, Pizzolli D, De Pellegrini F, Cretti S Create-net FBK, Cascata D (2017). Foggy : a platform for workload orchestration in a fog computing environment. In: 2017 IEEE 9th international conference on cloud computing technology and science, pp 9–12.  https://doi.org/10.1109/CloudCom.2017.62
  40. 40.
    Sharma PK, Chen M, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Spec Sect Intell Syst Internet Things 6:115–124.  https://doi.org/10.1109/ACCESS.2017.2757955 CrossRefGoogle Scholar
  41. 41.
    Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Select Areas Commun 35(11):2586–2595CrossRefGoogle Scholar
  42. 42.
    Shropshire J (2014) Extending the cloud with fog : security challenges & opportunities. In: Americas conference on information systems, pp 1–10Google Scholar
  43. 43.
    Singh A, Sandhu R, Sood SK (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354.  https://doi.org/10.1016/j.cose.2017.08.016 CrossRefGoogle Scholar
  44. 44.
    Sood SK, Mahajan I (2018) Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2018.01.008 CrossRefGoogle Scholar
  45. 45.
    Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 federated conference on computer science and information systems, vol 2, pp 1–8.  https://doi.org/10.15439/2014F503
  46. 46.
    Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of Fog computing and its security issues. Concurrency Comput Pract Exp 28:2991–3005.  https://doi.org/10.1002/cpe CrossRefGoogle Scholar
  47. 47.
    Sun Y, Lin F, Zhang N (2018) A security mechanism based on evolutionary game in fog computing. Saudi J Biol Sci 25(2):237–241.  https://doi.org/10.1016/j.sjbs.2017.09.010 CrossRefGoogle Scholar
  48. 48.
    Wang H, Wang Z, Domingo-ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712–719.  https://doi.org/10.1016/j.future.2017.02.032 CrossRefGoogle Scholar
  49. 49.
    Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B (2017) Data collection from WSNs to the cloud based on mobile fog elements. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2017.07.031 CrossRefGoogle Scholar
  50. 50.
    Wang T, Zhou J, Huang M, Alam Z, Liu A (2018) Fog-based storage technology to fight with cyber threat. Future Gener Comput Syst 83:208–218.  https://doi.org/10.1016/j.future.2017.12.036 CrossRefGoogle Scholar
  51. 51.
    Wang Y, Uehara T, Sasaki R (2015) Fog computing: issues and challenges in security and forensics. Proc Int Comput Softw Appl Conf 3:53–59.  https://doi.org/10.1109/COMPSAC.2015.173 CrossRefGoogle Scholar
  52. 52.
    Xiong C, Xiang R, Li Y, Han X, Du H (2018) Large-scale image-based fog detection based on cloud platform. Multimed Tools Appl.  https://doi.org/10.1007/s11042-017-5597-6 CrossRefGoogle Scholar
  53. 53.
    Yang R, Xu Q, Ho M, Yu Z, Wang H, Zhou L (2018) Position based cryptography with location privacy: a step for Fog computing. Future Gener Comput Syst 78:799–806.  https://doi.org/10.1016/j.future.2017.05.035 CrossRefGoogle Scholar
  54. 54.
    Yaseen Q, Aldwairi M, Jararweh Y, Brij MA (2017) Collusion attacks mitigation in internet of things : a fog based model. Springer Science + Business Media, LLC 2017, October.  https://doi.org/10.1007/s11042-017-5288-3 CrossRefGoogle Scholar
  55. 55.
    Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: 10th International conference on wireless algorithms, systems, and applications, pp 685–695.  https://doi.org/10.1007/978-3-319-21837-3_67 CrossRefGoogle Scholar
  56. 56.
    Zahra S, Alam M, Javaid Q, Wahid A, Javaid N, Ur S et al (2017) Fog computing over IoT: a secure deployment and formal verification. IEEE special section on recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing 5:27132–27144.  https://doi.org/10.1109/ACCESS.2017.2766180 CrossRefGoogle Scholar
  57. 57.
    Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener Comput Syst 78:753–762.  https://doi.org/10.1016/j.future.2016.12.015 CrossRefGoogle Scholar
  58. 58.
    Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) Human-driven edge computing and communication: a survey on access control in fog computing. IEEE Commun Mag 55:144–149.  https://doi.org/10.1109/MCOM.2018.1700333 CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceFederal University of TechnologyMinnaNigeria
  2. 2.Department of Cyber Security ScienceFederal University of TechnologyMinnaNigeria
  3. 3.Department of Computer ScienceFederal College of Education (Technical)GombeNigeria
  4. 4.Department of Computer ScienceAhmadu Bello UniversityZariaNigeria

Personalised recommendations