Abstract
Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS (2002)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Workshop on Mobile Cloud Computing. ACM (2012)
Bouzefrane, S., Mostefa, A.F.B., Houacine, F., Cagnon, H.: Cloudlets authentication in nfc-based mobile computing. In: MobileCloud. IEEE (2014)
Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS 25(1), 222–233 (2014)
Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T.: Lt codes-based secure and reliable cloud storage service. In: INFOCOM. IEEE (2012)
Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol. 14 (2014)
Damiani, E., et al.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: CCS. ACM (2002)
Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. WCMC 13(18), 1587–1611 (2013)
Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: preliminary framework and a case study. In: IRI. IEEE (2014)
Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. LNCS, vol. 2011. Springer, Heidelberg (2011)
ETSI: Mobile-edge computing (2014). http://goo.gl/7NwTLE
Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In: INFOCOM. IEEE (2013)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010)
Gil Press: Idc: Top 10 technology predictions (2015). http://goo.gl/zFujnE
Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., Satyanarayanan, M.: Towards wearable cognitive assistance. In: Mobisys. ACM (2014)
Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A measurement based rogue ap detection scheme. In: INFOCOM. IEEE (2009)
Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue ap detection. TPDS 22(11), 1912–1925 (2011)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for sdn controllers. In: HotSDN, vol. 14 (2014)
Lu, R., et al.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS 23(9), 1621–1631 (2012)
McKeown, N., et al.: Openflow: enabling innovation in campus networks. ACM SIGCOMM CCR 38(2), 69–74 (2008)
McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: CCS. ACM (2011)
Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Novak, E., Li, Q.: Near-pri: Private, proximity based location sharing. In: INFOCOM. IEEE (2014)
Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: Security and Privacy. IEEE (2013)
Qin, Z., Li, Q., Chuah, M.C.: Defending against unidentifiable attacks in electric power grids. TPDS 24(10), 1961–1971 (2013)
Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, 2014 Proceedings IEEE. IEEE (2014)
Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2011)
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. Perv. Comput. 8(4), 14–23 (2009)
Satyanarayanan, M., et al.: An open ecosystem for mobile-cloud convergence. Commun. Mag. 53(3), 63–70 (2015)
Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Mobile Cloud 2015)
Shin, S., Gu, G.: Cloudwatcher: network security monitoring using openflow in dynamic cloud networks. In: ICNP. IEEE (2012)
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy. IEEE (2000)
Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: FedCSIS. IEEE (2014)
Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Tsugawa, M., et al.: Cloud computing security: what changes with software-defined networking? In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. LNCS. Springer, Heidelberg (2014)
Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Trans. Pow. Syst. 28(2), 1052–1062 (2013)
Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM CCR 44(5), 27–32 (2014)
Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. TPDS 23(8), 1467–1479 (2012)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM. IEEE (2010)
Wei, W., Xu, F., Li, Q.: Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. In: INFOCOM. IEEE (2012)
Willis, D.F., Dasgupta, A., Banerjee, S.: Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In: SIGCOMM Workshop on Distributed Cloud Computing. ACM (2014)
Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)
Yap, K.K., et al.: Separating authentication, access and accounting: a case study with openwifi. Technical report, Open Networking Foundation (2011)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM. IEEE (2010)
Zao, J.K., et al.: Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology. Frontiers in Human Neuroscience 8 (2014)
Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
Zhu, J., et al.: Improving web sites performance using edge servers in fog computing architecture. In: SOSE. IEEE (2013)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yi, S., Qin, Z., Li, Q. (2015). Security and Privacy Issues of Fog Computing: A Survey. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_67
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_67
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)