Abstract
Fog Computing is a new paradigm which is meant to solve some new challenges in IoT like a wide-spread geographical distribution and mobility of the devices, multiple nodes, heterogeneity of the hardware capabilities and communication technologies. A Fog Computing Orchestration enables the control of multiple devices connected to the Fog Computing network. It offers some new application areas like a smart home, smart grid, smart vehicles, or health data management. Since security issues of both the Fog Computing and Orchestration are not fully explored yet, it poses different challenges. This review paper firstly aims to identify the Fog Computing security challenges as it is the environment for an Orchestration. It reviews some proposed Orchestration solutions as well. Secondly, Orchestration challenges are identified themselves by reviewing over 150 papers. The results suggest that security/privacy is among the top concerns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
OpenFog Consortium Architecture Working Group, et al.: OpenFog reference architecture for fog computing. In: OPFRA001, vol. 20817, p. 162 (2017)
Bonomi, F., Milito, R., Zhu, J.¸ Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16 (2012)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78, 680–698 (2018)
Yousefpour, A., et al.: All one needs to know about fog computing and related edge computing paradigms: a complete survey. J. Syst. Archit. 98, 289–330 (2019). https://doi.org/10.1016/j.sysarc.2019.02.009
Puthal, D., Mohanty, S.P., Bhavake, S.A., Morgan, G., Ranjan, R.: Fog computing security challenges and future directions [energy and security]. IEEE Consum. Electron. Mag. 8(3), 92–96 (2019). https://doi.org/10.1109/MCE.2019.2893674
Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for Internet of Things services. IEEE Internet Comput. 21(2), 16–24 (2017). https://doi.org/10.1109/MIC.2017.36
Martin, B.A., et al.: OpenFog security requirements and approaches. In: 2017 IEEE Fog World Congress (FWC), October 2017, pp. 1–6. https://doi.org/10.1109/fwc.2017.8368537
Bormann, C., Ersue, M., Keränen, A.: Terminology for Constrained-Node Networks. RFC Editor (2014)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Jiang, Y., Huang, Z., Tsang, D.H.: Challenges and solutions in fog computing orchestration. IEEE Netw. 32(3), 122–129 (2017)
Liu, F., et al.: NIST cloud computing reference architecture: recommendations of the National Institute of Standards and Technology (Special Publication 500-292) (2012)
de Brito, M.S., et al.: A service orchestration architecture for Fog-enabled infrastructures. In: 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC), May 2017, pp. 127–132. https://doi.org/10.1109/fmec.2017.7946419
Velasquez, K., et al.: Fog orchestration for the Internet of Everything: state-of-the-art and research challenges. J. Internet Serv. Appl. 9(1), 1–23 (2018). https://doi.org/10.1186/s13174-018-0086-3
Velasquez, K., et al.: Service orchestration in fog environments. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), August 2017, pp. 329–336. https://doi.org/10.1109/ficloud.2017.49
Network Functions Virtualisation (NFV) ETSI Industry Specification Group (ISG). ETSI NFV Work Group: Network Functions Virtualisation (NFV); Management and Orchestration (2013). https://www.etsi.org/deliver/etsi_gs/NFV/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf. Accessed 17 February 2020
Liu, J., Zhao, T., Zhou, S., Cheng, Y., Niu, Z.: CONCERT: a cloud-based architecture for next-generation cellular systems. IEEE Wirel. Commun. 21(6), 14–22 (2014). https://doi.org/10.1109/MWC.2014.7000967
Venckauskas, A., Stuikys, V., Toldinas, J., Jusas, N.: A model-driven framework to develop personalized health monitoring. Symmetry-Basel 8(7), 65 (2016). https://doi.org/10.3390/sym8070065
Acknowledgement
This paper is supported in part by European Union’s Horizon 2020 research and innovation program under Grant Agreement No. 830892, project “Strategic programs for advanced research and technology in Europe” (SPARTA).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Šatkauskas, N., Venčkauskas, A., Morkevičius, N., Liutkevičius, A. (2020). Orchestration Security Challenges in the Fog Computing. In: Lopata, A., Butkienė, R., Gudonienė, D., Sukackė, V. (eds) Information and Software Technologies. ICIST 2020. Communications in Computer and Information Science, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-59506-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-59506-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59505-0
Online ISBN: 978-3-030-59506-7
eBook Packages: Computer ScienceComputer Science (R0)