메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 19293-19304

Security and Privacy in Fog Computing: Challenges

Author keywords

Fog; fog computing; fog networking; IoT; privacy; privacy threats; security; security threats

Indexed keywords

AUTHENTICATION; CLOUD COMPUTING; COMPUTER PRIVACY; DATA PRIVACY; DIGITAL STORAGE; ELECTRONIC MAIL; FOG;

EID: 85029170433     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2749422     Document Type: Article
Times cited : (477)

References (70)
  • 1
    • 85032365695 scopus 로고    scopus 로고
    • Data Center Companies. Accessed: Jul. 23
    • Data Center Companies. Accessed: Jul. 23, 2017. [Online]. Available: https://www.datacenters.com/directory/companies
    • (2017)
  • 4
    • 84971658593 scopus 로고    scopus 로고
    • Fog computing: The cloud-IoT/IoE middle-ware paradigm
    • May
    • M. Aazam and E. N. Huh, "Fog computing: The cloud-IoT/IoE middle-ware paradigm," IEEE Potentials, vol. 35, no. 3, pp. 40-44, May 2016.
    • (2016) IEEE Potentials , vol.35 , Issue.3 , pp. 40-44
    • Aazam, M.1    Huh, E.N.2
  • 5
    • 85019269553 scopus 로고    scopus 로고
    • Accessed: Jul. 23, 2017
    • OpenFog Consortium. Accessed: Jul. 23, 2017. [Online]. Available: https://www.openfogconsortium.org
    • OpenFog Consortium
  • 6
    • 85032394569 scopus 로고    scopus 로고
    • OpenFog Reference Architecture. Accessed: Jul. 23, 2017
    • OpenFog Reference Architecture. Accessed: Jul. 23, 2017. [Online]. Avail-able: https://www.openfogconsortium.org/ra/
  • 7
    • 85032394640 scopus 로고    scopus 로고
    • Accessed: Feb. 20, 2017
    • Akami Cloudlet Overview. Accessed: Feb. 20, 2017. [Online]. Available: https://www.akamai.com/us/en/products/web-performance/cloudlets/
    • Akami Cloudlet Overview
  • 8
    • 85032364238 scopus 로고    scopus 로고
    • Accessed: Feb. 20, 2017
    • Intelligent Edge Intel. Accessed: Feb. 20, 2017. [Online]. Available: https://itpeernetwork.intel.com/extending-intelligence-to-the-edge/
    • Intelligent Edge Intel
  • 9
    • 85010031130 scopus 로고    scopus 로고
    • Fog and IoT: An overview of research opportu-nities
    • Dec.
    • M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportu-nities," IEEE Internet Things J., vol. 3, no. 6, pp. 1-11, Dec. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.6 , pp. 1-11
    • Chiang, M.1    Zhang, T.2
  • 10
    • 85006216192 scopus 로고    scopus 로고
    • Front-end intelligence for large-scale application-oriented Internet-of-Things
    • Jun
    • A. Bader, H. Ghazzai, A. Kadri, and M.-S. Alouini, "Front-end intelligence for large-scale application-oriented Internet-of-Things," IEEE Access, vol. 4, pp. 3257-3272, Jun. 2016.
    • (2016) IEEE Access , vol.4 , pp. 3257-3272
    • Bader, A.1    Ghazzai, H.2    Kadri, A.3    Alouini, M.-S.4
  • 12
    • 84987842183 scopus 로고    scopus 로고
    • Edge computing: Vision and challenges
    • Oct.
    • W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
    • (2016) IEEE Internet Things J , vol.3 , Issue.5 , pp. 637-646
    • Shi, W.1    Cao, J.2    Zhang, Q.3    Li, Y.4    Xu, L.5
  • 14
    • 84966662927 scopus 로고    scopus 로고
    • Assessment of the suitability of fog computing in the context of Internet of things
    • to be published
    • S. Sarkar, S. Chatterjee, and S. Misra, "Assessment of the suitability of fog computing in the context of Internet of things," IEEE Trans. Cloud Comput., to be published.
    • IEEE Trans. Cloud Comput
    • Sarkar, S.1    Chatterjee, S.2    Misra, S.3
  • 15
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • Jun
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data (Mobidata), Jun. 2015, pp. 37-42.
    • (2015) Proc. Workshop Mobile Big Data (Mobidata) , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 18
    • 84923117513 scopus 로고    scopus 로고
    • Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
    • Nov
    • I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks," in Proc. Austral. Telecommun. Netw. Appl. Conf. (ATNAC), Nov. 2014, pp. 117-122.
    • (2014) Proc. Austral. Telecommun. Netw. Appl. Conf. (ATNAC) , pp. 117-122
    • Stojmenovic, I.1
  • 20
    • 85015190263 scopus 로고    scopus 로고
    • Fog computing for the Internet of Things: Security and privacy issues
    • Mar
    • A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, "Fog computing for the Internet of Things: Security and privacy issues," IEEE Internet Comput., vol. 21, no. 2, pp. 34-42, Mar. 2017.
    • (2017) IEEE Internet Comput. , vol.21 , Issue.2 , pp. 34-42
    • Alrawais, A.1    Alhothaily, A.2    Hu, C.3    Cheng, X.4
  • 21
    • 85028437162 scopus 로고    scopus 로고
    • Security, privacy, and fairness in fog-based vehicular crowdsensing
    • Jun
    • J. Ni, A. Zhang, X. Lin, and X. S. Shen, "Security, privacy, and fairness in fog-based vehicular crowdsensing," IEEE Commun. Mag., vol. 55, no. 6, pp. 146-152, Jun. 2017.
    • (2017) IEEE Commun. Mag. , vol.55 , Issue.6 , pp. 146-152
    • Ni, J.1    Zhang, A.2    Lin, X.3    Shen, X.S.4
  • 22
    • 85021174017 scopus 로고    scopus 로고
    • A hybrid scheme for fine-grained search and access authorization in fog computing environment
    • Jun
    • M. Xiao, J. Zhou, X. Liu, and M. Jiang, "A hybrid scheme for fine-grained search and access authorization in fog computing environment," Sensors, vol. 17, no. 6, pp. 1-22, Jun. 2017.
    • (2017) Sensors , vol.17 , Issue.6 , pp. 1-22
    • Xiao, M.1    Zhou, J.2    Liu, X.3    Jiang, M.4
  • 23
    • 85042114742 scopus 로고    scopus 로고
    • A differential privacy-based query model for sustainable fog data centers
    • to be published
    • M. Du, K. Wang, X. Liu, S. Guo, and Y. Zhang, "A differential privacy-based query model for sustainable fog data centers," IEEE Trans. Sustain. Comput., to be published.
    • IEEE Trans. Sustain. Comput
    • Du, M.1    Wang, K.2    Liu, X.3    Guo, S.4    Zhang, Y.5
  • 25
    • 80053414801 scopus 로고    scopus 로고
    • TrustCloud: A framework for accountability and trust in cloud computing
    • Jul
    • R. K. L. Ko et al., "TrustCloud: A framework for accountability and trust in cloud computing," in Proc. IEEE World Congr. Services, Jul. 2011, pp. 584-588.
    • (2011) Proc. IEEE World Congr. Services , pp. 584-588
    • Ko, R.K.L.1
  • 26
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • Sep.
    • K. M. Khan and Q. Malluhi, "Establishing trust in cloud computing," IT Prof., vol. 12, no. 5, pp. 20-27, Sep. 2010.
    • (2010) IT Prof. , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.M.1    Malluhi, Q.2
  • 27
    • 84872126433 scopus 로고    scopus 로고
    • WAKE: Key management scheme for wide-area measurement systems in smart grid
    • Jan
    • Y. W. Law, M. Palaniswami, G. Kounga, and A. Lo, "WAKE: Key management scheme for wide-area measurement systems in smart grid," IEEE Commun. Mag., vol. 51, no. 1, pp. 34-41, Jan. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.1 , pp. 34-41
    • Law, Y.W.1    Palaniswami, M.2    Kounga, G.3    Lo, A.4
  • 28
    • 85041790486 scopus 로고    scopus 로고
    • Privacy-preserving schemes for ad hoc social networks: A survey
    • to be published
    • M. A. Ferrag, L. Maglaras, and A. Ahmim, "Privacy-preserving schemes for ad hoc social networks: A survey," IEEE Commun. Surveys Tuts., to be published.
    • IEEE Commun. Surveys Tuts
    • Ferrag, M.A.1    Maglaras, L.2    Ahmim, A.3
  • 29
    • 85021630757 scopus 로고    scopus 로고
    • Privacy preserving smart meter streaming against information leakage of appliance status
    • Sep.
    • Y. Hong, W. M. Liu, and L. Wang, "Privacy preserving smart meter streaming against information leakage of appliance status," IEEE Trans. Inf. Forensics Security, vol. 12, no. 9, pp. 2227-2241, Sep. 2017.
    • (2017) IEEE Trans. Inf. Forensics Security , vol.12 , Issue.9 , pp. 2227-2241
    • Hong, Y.1    Liu, W.M.2    Wang, L.3
  • 30
    • 85032357419 scopus 로고    scopus 로고
    • Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
    • to be published
    • D. Koo and J. Hur, "Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing," Future Generat. Comput. Syst., to be published.
    • Future Generat. Comput. Syst
    • Koo, D.1    Hur, J.2
  • 32
    • 84991768903 scopus 로고    scopus 로고
    • Octopus: An edge-fog mutual authentication scheme
    • Nov.
    • M. H. Ibrahim, "Octopus: An edge-fog mutual authentication scheme," Int. J. Netw. Security, vol. 18, no. 6, pp. 1089-1101, Nov. 2016.
    • (2016) Int. J. Netw. Security , vol.18 , Issue.6 , pp. 1089-1101
    • Ibrahim, M.H.1
  • 33
    • 85012979827 scopus 로고    scopus 로고
    • UAV-based IoT platform: A crowd surveillance use case
    • Feb.
    • N. H. Motlagh, M. Bagaa, and T. Taleb, "UAV-based IoT platform: A crowd surveillance use case," IEEE Commun. Mag., vol. 55, no. 2, pp. 128-134, Feb. 2017.
    • (2017) IEEE Commun. Mag. , vol.55 , Issue.2 , pp. 128-134
    • Motlagh, N.H.1    Bagaa, M.2    Taleb, T.3
  • 36
    • 84979609826 scopus 로고    scopus 로고
    • Fog-computing-based radio access networks: Issues and challenges
    • Jul.
    • M. Peng, S. Yan, K. Zhang, and C. Wang, "Fog-computing-based radio access networks: Issues and challenges," IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.4 , pp. 46-53
    • Peng, M.1    Yan, S.2    Zhang, K.3    Wang, C.4
  • 37
    • 84864250473 scopus 로고    scopus 로고
    • Jul,Accessed: Feb. 12, 2017
    • M. Arrington. (Jul. 2009). In Our Inox: Hundreds of Con-dential Twitter Documents. Accessed: Feb. 12, 2017. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-con-dential-twitter-documents/
    • (2009) Our Inox: Hundreds of Con-dential Twitter Documents
    • Arrington, M.1
  • 42
    • 85020469257 scopus 로고    scopus 로고
    • Security and pri-vacy preservation scheme of face identification and resolution framework using Fog computing in Internet of Things
    • to be published
    • P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, "Security and pri-vacy preservation scheme of face identification and resolution framework using Fog computing in Internet of Things," IEEE Internet Things J., to be published.
    • IEEE Internet Things J
    • Hu, P.1    Ning, H.2    Qiu, T.3    Song, H.4    Wang, Y.5    Yao, X.6
  • 43
    • 85018495637 scopus 로고    scopus 로고
    • A lightweight privacy-preserving data aggregation scheme for Fog computing-enhanced IoT
    • Mar.
    • R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A lightweight privacy-preserving data aggregation scheme for Fog computing-enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, Mar. 2017.
    • (2017) IEEE Access , vol.5 , pp. 3302-3312
    • Lu, R.1    Heung, K.2    Lashkari, A.H.3    Ghorbani, A.A.4
  • 44
    • 85021672640 scopus 로고    scopus 로고
    • A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing
    • Jun
    • S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing," IEEE Internet Things J., vol. 4, no. 3, pp. 772-782, Jun. 2017.
    • (2017) IEEE Internet Things J. , vol.4 , Issue.3 , pp. 772-782
    • Basudan, S.1    Lin, X.2    Sankaranarayanan, K.3
  • 45
    • 85029660522 scopus 로고    scopus 로고
    • Secure intelligent traffic light control using fog computing
    • to be published
    • J. Liu et al., "Secure intelligent traffic light control using fog computing," Futur Gener. Comput. Syst., to be published.
    • Futur Gener. Comput. Syst
    • Liu, J.1
  • 47
    • 85057914009 scopus 로고    scopus 로고
    • Position based cryptography with location privacy: A step for fog computing
    • to be published
    • R. Yang, Q. Xu, M. H. Au, Z. Yu, H. Wang, and L. Zhou, "Position based cryptography with location privacy: A step for fog computing," Futur Gener. Comput. Syst., to be published.
    • Futur Gener. Comput. Syst
    • Yang, R.1    Xu, Q.2    Au, M.H.3    Yu, Z.4    Wang, H.5    Zhou, L.6
  • 48
    • 85028358232 scopus 로고    scopus 로고
    • Trajectory privacy preservation based on a fog structure for Cloud location services
    • May
    • T.Wang et al., "Trajectory privacy preservation based on a fog structure for Cloud location services," IEEE Access, vol. 5, pp. 7692-7701, May 2017.
    • (2017) IEEE Access , vol.5 , pp. 7692-7701
    • Wang, T.1
  • 49
    • 85032391108 scopus 로고    scopus 로고
    • LoDPD: A location difference-based proximity detection protocol for fog computing
    • to be published
    • Y. Huo, C. Hu, X. Qi, and T. Jing, "LoDPD: A location difference-based proximity detection protocol for fog computing," IEEE Internet Things J., to be published.
    • IEEE Internet Things J
    • Huo, Y.1    Hu, C.2    Qi, X.3    Jing, T.4
  • 50
    • 84975226328 scopus 로고    scopus 로고
    • Private proximity detection for convex polygons
    • Jun
    • B. Mu and S. Bakiras, "Private proximity detection for convex polygons," Tsinghua Sci. Technol., vol. 21, no. 3, pp. 270-280, Jun. 2016.
    • (2016) Tsinghua Sci. Technol. , vol.21 , Issue.3 , pp. 270-280
    • Mu, B.1    Bakiras, S.2
  • 51
    • 85029146894 scopus 로고    scopus 로고
    • Anonymous and secure aggregation scheme in Fog-based public Cloud computing
    • to be published
    • H. Wang, Z. Wang, and J. Domingo-Ferrer, "Anonymous and secure aggregation scheme in Fog-based public Cloud computing," Futur Gener. Comput. Syst., to be published.
    • Futur Gener. Comput. Syst
    • Wang, H.1    Wang, Z.2    Domingo-Ferrer, J.3
  • 52
    • 84875286190 scopus 로고    scopus 로고
    • An enhanced remote user authentication scheme with smart card
    • May
    • M. Kumar, "An enhanced remote user authentication scheme with smart card," Int. J. Netw. Security, vol. 10, no. 3, pp. 175-184, May 2010.
    • (2010) Int. J. Netw. Security , vol.10 , Issue.3 , pp. 175-184
    • Kumar, M.1
  • 53
    • 70349791260 scopus 로고    scopus 로고
    • Asimple user authentication scheme for grid computing
    • R. Lu, Z. Cao, Z. Chai, and X. Liang, "Asimple user authentication scheme for grid computing," Int. J. Netw. Security, vol. 7, no. 2, pp. 202-206, 2008.
    • (2008) Int. J. Netw. Security , vol.7 , Issue.2 , pp. 202-206
    • Lu, R.1    Cao, Z.2    Chai, Z.3    Liang, X.4
  • 54
    • 78651063942 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initia-tion protocol
    • L. T. Jia, "Efficient nonce-based authentication scheme for session initia-tion protocol," Int. J. Netw. Security, vol. 9, no. 1, pp. 12-16, 2009.
    • (2009) Int. J. Netw. Security , vol.9 , Issue.1 , pp. 12-16
    • Jia, L.T.1
  • 55
    • 84875095444 scopus 로고    scopus 로고
    • Guessing attacks on strong-password authentication protocol
    • C. C. Lee, C. H. Liu, and M. S. Hwang, "Guessing attacks on strong-password authentication protocol," Int. J. Netw. Security, vol. 15, no. 1, pp. 64-67, 2013.
    • (2013) Int. J. Netw. Security , vol.15 , Issue.1 , pp. 64-67
    • Lee, C.C.1    Liu, C.H.2    Hwang, M.S.3
  • 56
  • 60
    • 84941201000 scopus 로고    scopus 로고
    • Trends and challenges in cloud datacenters
    • May
    • K. Bilal, S. U. R. Malik, S. U. Khan, and A. Y. Zomaya, "Trends and challenges in cloud datacenters," IEEE Cloud Comput., vol. 1, no. 1, pp. 10-20, May 2014.
    • (2014) IEEE Cloud Comput. , vol.1 , Issue.1 , pp. 10-20
    • Bilal, K.1    Malik, S.U.R.2    Khan, S.U.3    Zomaya, A.Y.4
  • 61
    • 56349150824 scopus 로고    scopus 로고
    • Market-oriented cloud com-puting: Vision, hype, and reality for delivering IT services as comput-ing utilities
    • Sep
    • R. Buyya, C. S. Yeo, and S. Venugopal, "Market-oriented cloud com-puting: Vision, hype, and reality for delivering IT services as comput-ing utilities," in Proc. 10th IEEE Int. Conf. High Perform. Comput. Commun. (HPCC), Sep. 2008, pp. 5-13.
    • (2008) Proc. 10th IEEE Int. Conf. High Perform. Comput. Commun. (HPCC , pp. 5-13
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3
  • 62
  • 63
    • 84894668409 scopus 로고    scopus 로고
    • Context aware computing for the Internet of Things: A survey
    • 1st Quart
    • C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, "Context aware computing for the Internet of Things: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414-454, 1st Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 414-454
    • Perera, C.1    Zaslavsky, A.2    Christen, P.3    Georgakopoulos, D.4
  • 65
    • 85009067795 scopus 로고    scopus 로고
    • Combining ensemble methods and social network metrics for improving accuracy ofOCSVMon intrusion detection in SCADA systems
    • Oct.
    • L. A. Maglaras, J. Jiang, and T. J. Cruz, "Combining ensemble methods and social network metrics for improving accuracy ofOCSVMon intrusion detection in SCADA systems," J. Inf. Security Appl., vol. 30, pp. 15-26, Oct. 2016.
    • (2016) J. Inf. Security Appl , vol.30 , pp. 15-26
    • Maglaras, L.A.1    Jiang, J.2    Cruz, T.J.3
  • 67
    • 84886436167 scopus 로고    scopus 로고
    • Real-time intrusion detection in power system operations
    • Nov.
    • J. Valenzuela, J. Wang, and N. Bissinger, "Real-time intrusion detection in power system operations," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1052-1062, Nov. 2013.
    • (2013) IEEE Trans. Power Syst. , vol.28 , Issue.2 , pp. 1052-1062
    • Valenzuela, J.1    Wang, J.2    Bissinger, N.3
  • 68
    • 85020650273 scopus 로고    scopus 로고
    • From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
    • Mar.
    • S. Anwar et al., "From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions," MDPI Algorithms, vol. 10, no. 2, pp. 1-24, Mar. 2017.
    • (2017) MDPI Algorithms , vol.10 , Issue.2 , pp. 1-24
    • Anwar, S.1
  • 69
    • 85006762171 scopus 로고    scopus 로고
    • A cyber security detection framework for supervisory control and data acquisition systems
    • Aug.
    • T. Cruz et al., "A cyber security detection framework for supervisory control and data acquisition systems," IEEE Trans. Ind. Informat., vol. 12, no. 6, pp. 2236-2246, Aug. 2016.
    • (2016) IEEE Trans. Ind. Informat , vol.12 , Issue.6 , pp. 2236-2246
    • Cruz, T.1
  • 70
    • 79959322079 scopus 로고    scopus 로고
    • Cloud application logging for forensics
    • Mar
    • R. Marty, "Cloud application logging for forensics," in Proc. ACM Symp. Appl. Comput. (SAC), Mar. 2011, pp. 178-184.
    • (2011) Proc. ACM Symp. Appl. Comput. (SAC) , pp. 178-184
    • Marty, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.