Skip to main content
Log in

Security challenges in fog-computing environment: a systematic appraisal of current developments

  • Review
  • Published:
Journal of Reliable Intelligent Environments Aims and scope Submit manuscript

Abstract

Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abdulhamid SM, Latiff MS (2017) A checkpointed league championship algorithm-based cloud scheduling scheme with secure fault tolerance responsiveness. Appl Soft Comput 61:670–680

    Article  Google Scholar 

  2. Abbasi BZ, Shah MA (2017) Robust practices. In: Proceedings of the 23rd international conference on automation & computing, University of Hudders Field, Hudders Field, UK, 7–8 September 2017, pp 7–8

  3. Arya D, Dave M (2017) Security-based service broker policy for fog computing environment. In: IEEE 8th ICCCNT 2017, Department of Computer Engineering

  4. Barik RK, Dubey AC, Tripathi A, Pratik T, Lenka K, Pratik T et al (2018) Mist data: leveraging mist computing for secure and scalable architecture for smart and connected health. Procedia Comput Sci 125:647–653. https://doi.org/10.1016/j.procs.2017.12.083

    Article  Google Scholar 

  5. Bedi RK, Singh J, Gupta SK (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput. https://doi.org/10.1007/s11227-018-2304-y

    Article  Google Scholar 

  6. Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94–120. https://doi.org/10.1016/j.comnet.2017.10.002

    Article  Google Scholar 

  7. Christopher HA, Yakubu J, Mohammed AD (2018) An architectural framework for ant lion optimization-based feature selection technique for cloud intrusion detection system using bayesian classifier. imanagers J Cloud Comput 5(2):36

    Google Scholar 

  8. Donovan PO, Gallagher C, Bruton K, Sullivan DTJO (2018) A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manuf Lett. https://doi.org/10.1016/j.mfglet.2018.01.005

    Article  Google Scholar 

  9. Ebebe A, Naveen C (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56:169–175. https://doi.org/10.1109/MCOM.2018.1700332

    Article  Google Scholar 

  10. El-Latif AAA, Abd-El-Atty B, Hossain MS, Member S (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Spec Sect Recent Adv Cloud Radio Access Netw 6:10332–10340. https://doi.org/10.1109/ACCESS.2018.2799879

    Article  Google Scholar 

  11. Escamilla-Ambrosio PJ, Rodríguez-Mota A, Aguirre-Anaya E, Acosta-Bermejo R, Salinas-Rosales M (2018) Distributing computing in the internet of things : cloud, fog and edge computing overview, pp 87–115. https://doi.org/10.1007/978-3-319-64063-1_4

    Google Scholar 

  12. Fu J, Liu Y, Chao H, Member S, Bhargava BK (2018) Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2018.2793350

    Article  Google Scholar 

  13. Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Netw. https://doi.org/10.1109/MNET.2018.1700250

    Article  Google Scholar 

  14. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42. https://doi.org/10.1016/j.jnca.2017.09.002

    Article  Google Scholar 

  15. Huang C, Lu R, Choo KR (2017) Vehicular fog computing: architecture, use case, and security and forensic challenges. IEEE Commun Mag 55:105–111. https://doi.org/10.1109/MCOM.2017.1700322

    Article  Google Scholar 

  16. Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener Comput Syst 78:720–729. https://doi.org/10.1016/j.future.2017.01.026

    Article  Google Scholar 

  17. Kang J, Yu R, Huang X, Zhang Y, Member S (2017) Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2017.2764095

    Article  Google Scholar 

  18. Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 1:1. https://doi.org/10.1186/s13677-017-0090-3

    Article  Google Scholar 

  19. Kitchenham B, Brereton OP, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering—a systematic literature review. Inform Softw Technol 51(1):7–15

    Article  Google Scholar 

  20. Koo D, Hur J (2018) Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gener Comput Syst 78:739–752. https://doi.org/10.1016/j.future.2017.01.024

    Article  Google Scholar 

  21. Kumar P, Zaidi N, Choudhury T (2017) Fog computing: common security issues and proposed countermeasures. In: Proceedings of the 5th international conference on system modeling and advancement in research trends, SMART 2016, pp 311–315. https://doi.org/10.1109/SYSMART.2016.7894541

  22. Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 International conference on the network of the future, NOF 2015. https://doi.org/10.1109/NOF.2015.7333287

  23. Li G (2018) Fog computing-enabled secure demand response for internet of energy against collusion attacks using consensus and ACE. IEEE Spec Sect Internet Energy Archit Cyber Secur Appl 6:11278–11288. https://doi.org/10.1109/ACCESS.2018.2799543

    Article  Google Scholar 

  24. Lisbon AA, Kavitha R (2017) A study on cloud and fog computing security issues and solutions. Int J Innov Res Adv Eng 3(4):2349–2163. http://ijirae.com/volumes/Vol4/iss03/03.MRAE10083.pdf

  25. Liu X, Deng RH, Yang Y, Tran HN, Zhong S (2018) Hybrid privacy-preserving clinical decision support system in fog–cloud computing. Future Gener Comput Syst 78:825–837. https://doi.org/10.1016/j.future.2017.03.018

    Article  Google Scholar 

  26. Lordan F, Lezzi D, Ejarque J, Badia RM (2018) An architecture for programming distributed applications on fog to cloud systems, 2. In: Heras DB, Bougé L (eds) Euro-Par 2017 workshops, vol 10659. LNCS. Springer International Publishing AG, Berlin, pp 325–337

    Google Scholar 

  27. Madni SHH, Latiff MSA, Ali J (2019) Multi-objective-oriented cuckoo search optimization-based resource scheduling algorithm for clouds. Arab J Sci Eng 44(4):3585–3602

    Article  Google Scholar 

  28. Mahmud R, Koch FL, Buyya R (2018) Cloud–fog interoperability in IoT-enabled healthcare solutions. In: ICDCN’18: 19th international conference on distributed computing and networking, January 4–7, 2018, Varanasi, India. ACM, New York, NY, USA, pp 4–7. https://doi.org/10.1145/3154273.3154347

  29. Mahmud R, Kotagiri R, Buyya R (2018) Fog computing : a taxonomy, survey and future directions. In: Di Martino B et al (eds) Internet of everything, internet of things. Springer Nature, Singapore. https://doi.org/10.1007/978-981-10-5861-5_5

    Chapter  Google Scholar 

  30. Mart G (2018) Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain Comput Inform Syst. https://doi.org/10.1016/j.suscom.2018.02.010

    Article  Google Scholar 

  31. Modarresi A, Gangadhar S, Sterbenz JP (2017) A framework for improving network resilience using SDN and fog nodes. In: 2017 9th international workshop on resilient networks design and modeling (RNDM). https://doi.org/10.1109/RNDM.2017.8093036

  32. Mukherjee B, Wang S, Lu W, Neupane RL, Dunn D, Ren Y et al (2018) Flexible IoT security middleware for end-to-end cloud–fog communication. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.12.031

    Article  Google Scholar 

  33. Neto ECP, Callou G, Aires F (2017) An algorithm to optimise the load distribution of fog environments. In: 2017 IEEE international conference on systems, man, and cybernetics (SMC), Banff Center, Banff, Canada, October 5–8, 2017, (October), pp 1292–1297

  34. Neto AJV, Zhao Z, Rodrigues JJPC, Member S, Camboim HB, Braun T (2018) Fog-based crime-assistance in smart IoT transportation system. IEEE Access 6:11101–11111

    Article  Google Scholar 

  35. Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20:601–628. https://doi.org/10.1109/COMST.2017.2762345

    Article  Google Scholar 

  36. Rahmani AM, Nguyen T, Negash B, Anzanpour A (2018) Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Gener Comput Syst 78:641–658. https://doi.org/10.1016/j.future.2017.02.014

    Article  Google Scholar 

  37. Rios R, Roman R, Onieva JA, Lopez J (2017) From SMOG to fog: a security perspective. In: 2017 2nd International conference on fog and mobile edge computing, FMEC 2017, pp 56–61. https://doi.org/10.1109/FMEC.2017.7946408

  38. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698. https://doi.org/10.1016/j.future.2016.11.009

    Article  Google Scholar 

  39. Santoro D, Zozin D, Pizzolli D, De Pellegrini F, Cretti S Create-net FBK, Cascata D (2017). Foggy : a platform for workload orchestration in a fog computing environment. In: 2017 IEEE 9th international conference on cloud computing technology and science, pp 9–12. https://doi.org/10.1109/CloudCom.2017.62

  40. Sharma PK, Chen M, Park JH (2018) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Spec Sect Intell Syst Internet Things 6:115–124. https://doi.org/10.1109/ACCESS.2017.2757955

    Article  Google Scholar 

  41. Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Select Areas Commun 35(11):2586–2595

    Article  Google Scholar 

  42. Shropshire J (2014) Extending the cloud with fog : security challenges & opportunities. In: Americas conference on information systems, pp 1–10

  43. Singh A, Sandhu R, Sood SK (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354. https://doi.org/10.1016/j.cose.2017.08.016

    Article  Google Scholar 

  44. Sood SK, Mahajan I (2018) Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.01.008

    Article  Google Scholar 

  45. Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Proceedings of the 2014 federated conference on computer science and information systems, vol 2, pp 1–8. https://doi.org/10.15439/2014F503

  46. Stojmenovic I, Wen S, Huang X, Luan H (2016) An overview of Fog computing and its security issues. Concurrency Comput Pract Exp 28:2991–3005. https://doi.org/10.1002/cpe

    Article  Google Scholar 

  47. Sun Y, Lin F, Zhang N (2018) A security mechanism based on evolutionary game in fog computing. Saudi J Biol Sci 25(2):237–241. https://doi.org/10.1016/j.sjbs.2017.09.010

    Article  Google Scholar 

  48. Wang H, Wang Z, Domingo-ferrer J (2018) Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener Comput Syst 78:712–719. https://doi.org/10.1016/j.future.2017.02.032

    Article  Google Scholar 

  49. Wang T, Zeng J, Lai Y, Cai Y, Tian H, Chen Y, Wang B (2017) Data collection from WSNs to the cloud based on mobile fog elements. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.07.031

    Article  Google Scholar 

  50. Wang T, Zhou J, Huang M, Alam Z, Liu A (2018) Fog-based storage technology to fight with cyber threat. Future Gener Comput Syst 83:208–218. https://doi.org/10.1016/j.future.2017.12.036

    Article  Google Scholar 

  51. Wang Y, Uehara T, Sasaki R (2015) Fog computing: issues and challenges in security and forensics. Proc Int Comput Softw Appl Conf 3:53–59. https://doi.org/10.1109/COMPSAC.2015.173

    Article  Google Scholar 

  52. Xiong C, Xiang R, Li Y, Han X, Du H (2018) Large-scale image-based fog detection based on cloud platform. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5597-6

    Article  Google Scholar 

  53. Yang R, Xu Q, Ho M, Yu Z, Wang H, Zhou L (2018) Position based cryptography with location privacy: a step for Fog computing. Future Gener Comput Syst 78:799–806. https://doi.org/10.1016/j.future.2017.05.035

    Article  Google Scholar 

  54. Yaseen Q, Aldwairi M, Jararweh Y, Brij MA (2017) Collusion attacks mitigation in internet of things : a fog based model. Springer Science + Business Media, LLC 2017, October. https://doi.org/10.1007/s11042-017-5288-3

    Article  Google Scholar 

  55. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: 10th International conference on wireless algorithms, systems, and applications, pp 685–695. https://doi.org/10.1007/978-3-319-21837-3_67

    Chapter  Google Scholar 

  56. Zahra S, Alam M, Javaid Q, Wahid A, Javaid N, Ur S et al (2017) Fog computing over IoT: a secure deployment and formal verification. IEEE special section on recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing 5:27132–27144. https://doi.org/10.1109/ACCESS.2017.2766180

    Article  Google Scholar 

  57. Zhang P, Chen Z, Liu JK, Liang K, Liu H (2018) An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener Comput Syst 78:753–762. https://doi.org/10.1016/j.future.2016.12.015

    Article  Google Scholar 

  58. Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) Human-driven edge computing and communication: a survey on access control in fog computing. IEEE Commun Mag 55:144–149. https://doi.org/10.1109/MCOM.2018.1700333

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shafi’i Muhammad Abdulhamid.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yakubu, J., Abdulhamid, S.M., Christopher, H.A. et al. Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliable Intell Environ 5, 209–233 (2019). https://doi.org/10.1007/s40860-019-00081-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40860-019-00081-2

Keywords

Navigation