Skip to main content

Review: Security and Privacy Issues of Fog Computing for the Internet of Things (IoT)

  • Chapter
  • First Online:
Cognitive Computing for Big Data Systems Over IoT

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alrawais, A., Alhothail, A., Hu, C., Cheng, X.: Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Computer Society (2017)

    Google Scholar 

  2. Chen, S., Zhang, T., Shi, W.: Fog Computing. IEEE Computer Society (2017)

    Google Scholar 

  3. Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: MobiHoc Mobile and Ad Hoc Networking and Computing. ACM, New York (2015)

    Google Scholar 

  4. Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: IEEE Symposium on Security and Privacy Workshops (2012)

    Google Scholar 

  5. Lee, K., Kim, D., Ha, D., Rajpu, U., Oh, H.: On Security and Privacy Issues of Fog Computing supported Internet of Things Environment. IEEE Computer Society (2015)

    Google Scholar 

  6. Stojmenovic, I., Wen, S.: The Fog Computing Paradigm: Scenarios and Security Issues. Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1–8 (2014)

    Google Scholar 

  7. Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., Yao, X.: Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Thing. IEEE Computer Society (2017)

    Google Scholar 

  8. Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: Third IEEE Workshop on Hot Topics in Web Systems and Technologies (2015)

    Google Scholar 

  9. Chiang, M., Zhang, T.: Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3(6) (2016)

    Google Scholar 

  10. Elkhatib, Y., Porter, B., Ribeiro, H.B., Faten Zhani, M., Qadir, J., Rivière, E.: On Using Micro-Clouds to Deliver the Fog. IEEE Computer Society (2017)

    Google Scholar 

  11. Hao, Z., Novak, E., Yi, S., Li, Q.: Challenges and Software Architecture for Fog Computing. IEEE Computer Society (2017)

    Google Scholar 

  12. Wen, C., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog Orchestration for Internet of Things Services. IEEE Computer Society (2017)

    Google Scholar 

  13. Xiao, Y., Zhu, C.: Vehicular fog computing: vision and challenges. In: IEEE International Conference on Pervasive Computing and Communications (2017)

    Google Scholar 

  14. Pham, X.-Q., Huh, E.-N.: Towards task scheduling in a cloud-fog computing system. In: 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–4, Oct (2016)

    Google Scholar 

  15. Huang, C.Y., Xu, K.: Reliable realtime streaming in vehicular cloud fog computing networks. In: IEEE/CIC International Conference on Communications, (ICCC), China, pp. 1–6, July 2016

    Google Scholar 

  16. Lin, Y., Shen, H.: Cloud fog: towards high quality of experience in cloud gaming. In: The 44th International Conference on Parallel Processing (ICPP), pp. 500–509, Sept 2015

    Google Scholar 

  17. Mtibaa, A., Harras, K., Alnuweiri, H.: Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms. In: IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 42–49, Nov 2015

    Google Scholar 

  18. Law, Y.W., Palaniswami, M., Kounga, G., Lo, A.: Wake: Key management scheme for wide-area measurement systems in smart grid. IEEE Commun. Mag. 51(1), 34–41 (2013)

    Article  Google Scholar 

  19. Fadlullah, Z.M., Fouda, M.M., Kato, N., Takeuchi, A., Iwasaki, N., Nozaki, Y.: Toward intelligent machine-to-machine communications in smart grid. IEEE Commun. Mag. 49(4), 60–65 (2011)

    Article  Google Scholar 

  20. Niranjanamurthy, M., Kavitha, P.B., Priyanka, K., Vishnu, S.N.: Research study on Fog computing for secure data security. Int. J. Sci. Technol. Manage. 5 (2016)

    Google Scholar 

  21. Fakeeh, K.A.: Privacy and security problems in fog computing. Commun. Appl. Electron. (CAE) 4(6) (2016). ISSN: 2394-4714

    Google Scholar 

  22. Dsouza, C., Joon, G., Taguinod, M.: Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study. IEEE Computer Society (2014)

    Google Scholar 

  23. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. IEEE INFOCOM (2010)

    Google Scholar 

  24. Kumar, P., Zaidi, N., Choudhur, T.: Fog computing: common security issues and proposed countermeasures. In: IEEE Conference, 5th International Conference on System Modeling and Advancement in Research Trends, 25–27 Nov 2016

    Google Scholar 

  25. Petac, E., Petac, A.O.: About Security Solutions in Fog Computing. Ovidius University Press (2016)

    Google Scholar 

  26. Wang, Y., Uehara, T., Sasaki, R.: Fog Computing: Issues and Challenges in Security and Forensics. IEEE Computer Society (2015)

    Google Scholar 

  27. Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Proceedings of 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 109–118 (2015)

    Google Scholar 

  28. Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput.: Pract. Exp. 28(10), 2991–3005 (2016)

    Google Scholar 

  29. Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: Xu, K., Zhu, H. (eds.) Wireless Algorithms, Systems, and Applications. WASA. Lecture Notes in Computer Science, vol. 9204. Springer (2015)

    Google Scholar 

  30. Chiang, M., Doty, A.L.: Fog Networking: An Overview on Research Opportunities. Electrical Engineering Princeton University (2015)

    Google Scholar 

  31. Xu, F., Tan, C.C., Li, Q., Yan, G., Wu, J.: Designing a practical access point association protocol. In: INFOCOM. IEEE (2010)

    Google Scholar 

  32. Bonomi, F.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)

    Google Scholar 

  33. Bonomi, F.: Vehicles, the internet of things, and fog computing. In: The Eighth ACM International Workshop on Vehicular InterNetworking (VANET), Las Vegas, USA (2011)

    Google Scholar 

  34. Baccarelli, E., Naranjo, P.G.V., Scarpiniti, M.S., Shojafar, M., Abawajy, J.H.: Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study. IEEE Computer Society (2016)

    Google Scholar 

  35. Hong, K., Lillethun, D., Ramachandran, U., Ottenwalder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the internet of things. In: ACM SIGCOMM Workshop on Mobile Cloud Computing (2013)

    Google Scholar 

  36. Vargas, V., Syed, A., Mohammad, A., Halgamuge, M.N.: Pentaho and Jaspersoft: a comparative study of business intelligence open source tools processing big data to evaluate performances. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(10), 20–29 (2016)

    Google Scholar 

  37. Kalid, S., Syed, A., Mohammad, A., Halgamuge, M.N.: Big-data NoSQL databases: comparison and analysis of “Big-Table”, “DynamoDB”, and “Cassandra”. In: IEEE 2nd International Conference on Big Data Analysis (ICBDA’17), pp. 89–93, Beijing, China, 10–12 Mar 2017

    Google Scholar 

  38. Kaur, K., Syed, A., Mohammad, A., Halgamuge, M.N.: Review: an evaluation of major threats in cloud computing associated with big data. In: IEEE 2nd International Conference on Big Data Analysis (ICBDA’17), pp. 368–372, Beijing, China, 10–12 Mar 2017

    Google Scholar 

  39. Pham, D.V., Syed, A., Mohammad, A., Halgamuge, M.N.: Threat analysis of portable hack tools from USB storage devices and protection solutions. In: International Conference on Information and Emerging Technologies (ICIET’10), pp. 1–5, Karachi, Pakistan, 14–16 June 2010

    Google Scholar 

  40. Gupta, A., Mohammad, A., Syed, A., Halgamuge, M.N.: A comparative study of classification algorithms using data mining: crime and accidents in Denver City the USA. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(7), 374–381 (2016)

    Google Scholar 

  41. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. https://doi.org/10.1016/j.jnca.2017.07.001 (2017)

  42. Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., Sangaiah, A.K.: A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.03.030 (2017)

  43. Xiao, X., Chen, C., Sangaiah, A.K., Hu, G., Ye, R., Jiang, Y.: CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.01.035 (2017)

Download references

Author information

Authors and Affiliations

Authors

Contributions

Binara N. B. Ekanayake and Malka N. Halgamuge conceived the study idea and developed the analysis plan. Binara N. B. Ekanayake analyzed the data and wrote the initial paper. Malka N. Halgamuge helped to prepare the figures and tables, and finalizing the manuscript. All authors read the manuscript.

Corresponding author

Correspondence to Malka N. Halgamuge .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ekanayake, B.N.B., Halgamuge, M.N., Syed, A. (2018). Review: Security and Privacy Issues of Fog Computing for the Internet of Things (IoT). In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70688-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70687-0

  • Online ISBN: 978-3-319-70688-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics