Mitigating Security Problems in Fog Computing System

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 419))

Abstract

Fog computing model was designed to provide computing at network’s edge among Internet of Things (IoT) devices. Its main purpose was to overcome the problems faced in cloud computing and provide services more effectively and efficiently. Being an extension of cloud computing, many security and privacy challenges that were faced by cloud computing are inherited by fog computing also. This paper presents different security and privacy challenges and work done by different researchers to overcome those challenges. Different techniques are represented with various metrices which they try to solve. We also proposed a method using ciphertext and shared key method to solve the problem of authentication and provide secure data sharing among the nodes. This method is supposed to be better than others in term of providing confidentiality, access control, authenticity and also protect from multiple splitting of private key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Naha, R.K., et al.: Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6, 47980–48009 (2018). https://doi.org/10.1109/ACCESS.2018.2866491

    Article  Google Scholar 

  2. Alraddady, S.I.S., Li, A., Soh, B., AlZain, M.: Dependability in fog computing: challenges and solutions. La Trobe J. Contrib. (2021). https://doi.org/10.26181/60bf1fc0bad1f

  3. OFC: Openfog reference architecture for fog computing, OpenFog Consortium, Fremont, USA (2017)

    Google Scholar 

  4. Guan, Y., Shao, J., Wei, G., **e, M.: Data security and privacy in fog computing. IEEE Netw. 32(5), 106–111 (2018). https://doi.org/10.1109/MNET.2018.1700250

    Article  Google Scholar 

  5. Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017). https://doi.org/10.1109/ACCESS.2017.2749422

    Article  Google Scholar 

  6. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  7. Patwary, A.: Towards secure fog computing: a survey on trust management, privacy, authentication threats and access control. Electronics 10, 1171 (2021). https://doi.org/10.3390/electronics10101171

    Article  Google Scholar 

  8. Aghasian, E., Garg, S., Montgomery, J.: User’s Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy, ar**v 2018, ar**v:1806.07629

  9. Fu, A., Song, J., Li, S., Zhang, G., Zhang, Y.: A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Secur. Commun. Netw. 9, 2002–2014 (2016)

    Google Scholar 

  10. Aghasian, E., Garg, S., Montgomery, J.: An automated model to score the privacy of unstructured information—social media case. Comput Secur 92, 101778 (2020)

    Article  Google Scholar 

  11. Koo, D., Shin, Y., Yun, J., Hur, J.: A hybrid deduplication for secure and efficient data outsourcing in fog computing. In: Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, pp. 285–293, 12–15 December 2016

    Google Scholar 

  12. Butun, I., Sari, A., Österberg, P.: Security implications of fog computing on the internet of things. In: 2019 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–6 (2019). https://doi.org/10.1109/ICCE.2019.8661909

  13. Lee, K., Kim, D., Ha, D., Rajput, U., Oh, H.: On security and privacy issues of fog computing supported internet of things environment. In: 6th International Conference on the Network of the Future (NOF), pp. 1–3 (2015). https://doi.org/10.1109/NOF.2015.7333287

  14. Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8, 16 (2019). https://doi.org/10.3390/jsan8010016

    Article  Google Scholar 

  15. Amor, A.B., Abid, M., Meddeb, A.: SAMAFog: service-aware mutual authentication fog-based protocol. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1049–1054 (2019). https://doi.org/10.1109/IWCMC.2019.8766575

  16. Chen, C.-M., Huang, Y., Wang, F., Kumari, S., Wu, M.-E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 1–16 (2020). https://doi.org/10.1080/17517575.2020.1712746

  17. Ahsan, M.A.M., Ali, I., Imran, M., Idris, M.Y.I., Khan, S., Khan, A.: A fog-centric secure cloud storage scheme. IEEE Trans. Sustain. Comput. https://doi.org/10.1109/TSUSC.2019.2914954

  18. Noura, H., Salman, O., Chehab, A., Couturier, R.: Preserving data security in distributed fog computing. Ad Hoc Netw. 94 (2019). https://doi.org/10.1016/j.adhoc.2019.101937,

  19. Jiang, Y., Susilo, W., Mu, Y., Guo, F.: Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78 (2017). https://doi.org/10.1016/j.future.2017.01.026

  20. Zhang, P., Chen, Z., Liu, J., Liang, K., Liu, H: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78 (2016). https://doi.org/10.1016/j.future.2016.12.015

  21. Ibrahim, M.H.: Octopus: an edge-fog mutual authentication scheme. IJ Netw. Secur. 18(6), 1089–1101 (2016)

    Google Scholar 

  22. Amor, A.B., Abid, M., Meddeb, A.: A privacy-preserving authentication scheme in an edge-fog environment. In: IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1225–1231. IEEE (2017)

    Google Scholar 

  23. Jia, X., He, D., Kumar, N., Choo, K.-K.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737–4750 (2018). https://doi.org/10.1007/s11276-018-1759-3

    Article  Google Scholar 

  24. Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Futur. Gener. Comput. Syst. 91, 475–492 (2019). https://doi.org/10.1016/j.future.2018.09.017

    Article  Google Scholar 

  25. Jia, X., Debiao, H., Kumar, N., Choo, K.-K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25, 4737–4750 (2019). https://doi.org/10.1007/s11276-018-1759-3

    Article  Google Scholar 

  26. Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)

    Article  Google Scholar 

  27. Tu, S., et al.: Security in fog computing: a novel technique to tackle an impersonation attack. IEEE Access 6, 74993–75001 (2018). https://doi.org/10.1109/ACCESS.2018.2884672

    Article  Google Scholar 

  28. Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Bose, N., Ye, Z.: FOCUS: a fog computing-based security system for the Internet of Things. In: 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–5. https://doi.org/10.1109/CCNC.2018.8319238, 2018

  29. Alrawais, A., Alhothaily, A., Hu, C., **ng, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131–9138 (2017). https://doi.org/10.1109/ACCESS.2017.2705076

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shalli Rani .

Editor information

Editors and Affiliations

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shruti, Rani, S. (2022). Mitigating Security Problems in Fog Computing System. In: Abraham, A., et al. Innovations in Bio-Inspired Computing and Applications. IBICA 2021. Lecture Notes in Networks and Systems, vol 419. Springer, Cham. https://doi.org/10.1007/978-3-030-96299-9_58

Download citation

Publish with us

Policies and ethics

Navigation