Skip to main content

Orchestration Security Challenges in the Fog Computing

  • Conference paper
  • First Online:
Information and Software Technologies (ICIST 2020)

Abstract

Fog Computing is a new paradigm which is meant to solve some new challenges in IoT like a wide-spread geographical distribution and mobility of the devices, multiple nodes, heterogeneity of the hardware capabilities and communication technologies. A Fog Computing Orchestration enables the control of multiple devices connected to the Fog Computing network. It offers some new application areas like a smart home, smart grid, smart vehicles, or health data management. Since security issues of both the Fog Computing and Orchestration are not fully explored yet, it poses different challenges. This review paper firstly aims to identify the Fog Computing security challenges as it is the environment for an Orchestration. It reviews some proposed Orchestration solutions as well. Secondly, Orchestration challenges are identified themselves by reviewing over 150 papers. The results suggest that security/privacy is among the top concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. OpenFog Consortium Architecture Working Group, et al.: OpenFog reference architecture for fog computing. In: OPFRA001, vol. 20817, p. 162 (2017)

    Google Scholar 

  2. Bonomi, F., Milito, R., Zhu, J.¸ Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)

    Google Scholar 

  3. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)

    Article  Google Scholar 

  4. Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Archit. 98, 289–330 (2019). https://doi.org/10.1016/j.sysarc.2019.02.009

    Article  Google Scholar 

  5. Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan, R.: Fog computing security challenges and future directions [energy and security]. IEEE Consum. Electron. Mag. 8(3), 92–96 (2019). https://doi.org/10.1109/MCE.2019.2893674

    Article  Google Scholar 

  6. Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for Internet of Things services. IEEE Internet Comput. 21(2), 16–24 (2017). https://doi.org/10.1109/MIC.2017.36

    Article  Google Scholar 

  7. Martin, B.A., et al.: OpenFog security requirements and approaches. In: 2017 IEEE Fog World Congress (FWC), October 2017, pp. 1–6. https://doi.org/10.1109/fwc.2017.8368537

  8. Bormann, C., Ersue, M., Keränen, A.: Terminology for Constrained-Node Networks. RFC Editor (2014)

    Google Scholar 

  9. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  10. Jiang, Y., Huang, Z., Tsang, D.H.: Challenges and solutions in fog computing orchestration. IEEE Netw. 32(3), 122–129 (2017)

    Article  Google Scholar 

  11. Liu, F., et al.: NIST cloud computing reference architecture: recommendations of the National Institute of Standards and Technology (Special Publication 500-292) (2012)

    Google Scholar 

  12. de Brito, M.S., et al.: A service orchestration architecture for Fog-enabled infrastructures. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), May 2017, pp. 127–132. https://doi.org/10.1109/fmec.2017.7946419

  13. Velasquez, K., et al.: Fog orchestration for the Internet of Everything: state-of-the-art and research challenges. J. Internet Serv. Appl. 9(1), 1–23 (2018). https://doi.org/10.1186/s13174-018-0086-3

    Article  Google Scholar 

  14. Velasquez, K., et al.: Service orchestration in fog environments. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), August 2017, pp. 329–336. https://doi.org/10.1109/ficloud.2017.49

  15. Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG). ETSI NFV Work Group: Network Functions Virtualisation (NFV); Management and Orchestration (2013). https://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf. Accessed 17 February 2020

  16. Liu, J., Zhao, T., Zhou, S., Cheng, Y., Niu, Z.: CONCERT: a cloud-based architecture for next-generation cellular systems. IEEE Wirel. Commun. 21(6), 14–22 (2014). https://doi.org/10.1109/MWC.2014.7000967

    Article  Google Scholar 

  17. Venckauskas, A., Stuikys, V., Toldinas, J., Jusas, N.: A model-driven framework to develop personalized health monitoring. Symmetry-Basel 8(7), 65 (2016). https://doi.org/10.3390/sym8070065

    Article  Google Scholar 

Download references

Acknowledgement

This paper is supported in part by European Union’s Horizon 2020 research and innovation program under Grant Agreement No. 830892, project “Strategic programs for advanced research and technology in Europe” (SPARTA).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Algimantas Venčkauskas or Nerijus Morkevičius .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Šatkauskas, N., Venčkauskas, A., Morkevičius, N., Liutkevičius, A. (2020). Orchestration Security Challenges in the Fog Computing. In: Lopata, A., Butkienė, R., Gudonienė, D., Sukackė, V. (eds) Information and Software Technologies. ICIST 2020. Communications in Computer and Information Science, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-59506-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59506-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59505-0

  • Online ISBN: 978-3-030-59506-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics