Abstract
Fog computing model was designed to provide computing at network’s edge among Internet of Things (IoT) devices. Its main purpose was to overcome the problems faced in cloud computing and provide services more effectively and efficiently. Being an extension of cloud computing, many security and privacy challenges that were faced by cloud computing are inherited by fog computing also. This paper presents different security and privacy challenges and work done by different researchers to overcome those challenges. Different techniques are represented with various metrices which they try to solve. We also proposed a method using ciphertext and shared key method to solve the problem of authentication and provide secure data sharing among the nodes. This method is supposed to be better than others in term of providing confidentiality, access control, authenticity and also protect from multiple splitting of private key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Naha, R.K., et al.: Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6, 47980–48009 (2018). https://doi.org/10.1109/ACCESS.2018.2866491
Alraddady, S.I.S., Li, A., Soh, B., AlZain, M.: Dependability in fog computing: challenges and solutions. La Trobe J. Contrib. (2021). https://doi.org/10.26181/60bf1fc0bad1f
OFC: Openfog reference architecture for fog computing, OpenFog Consortium, Fremont, USA (2017)
Guan, Y., Shao, J., Wei, G., **e, M.: Data security and privacy in fog computing. IEEE Netw. 32(5), 106–111 (2018). https://doi.org/10.1109/MNET.2018.1700250
Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017). https://doi.org/10.1109/ACCESS.2017.2749422
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Patwary, A.: Towards secure fog computing: a survey on trust management, privacy, authentication threats and access control. Electronics 10, 1171 (2021). https://doi.org/10.3390/electronics10101171
Aghasian, E., Garg, S., Montgomery, J.: User’s Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy, ar**v 2018, ar**v:1806.07629
Fu, A., Song, J., Li, S., Zhang, G., Zhang, Y.: A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks. Secur. Commun. Netw. 9, 2002–2014 (2016)
Aghasian, E., Garg, S., Montgomery, J.: An automated model to score the privacy of unstructured information—social media case. Comput Secur 92, 101778 (2020)
Koo, D., Shin, Y., Yun, J., Hur, J.: A hybrid deduplication for secure and efficient data outsourcing in fog computing. In: Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, pp. 285–293, 12–15 December 2016
Butun, I., Sari, A., Österberg, P.: Security implications of fog computing on the internet of things. In: 2019 IEEE International Conference on Consumer Electronics (ICCE), pp. 1–6 (2019). https://doi.org/10.1109/ICCE.2019.8661909
Lee, K., Kim, D., Ha, D., Rajput, U., Oh, H.: On security and privacy issues of fog computing supported internet of things environment. In: 6th International Conference on the Network of the Future (NOF), pp. 1–3 (2015). https://doi.org/10.1109/NOF.2015.7333287
Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8, 16 (2019). https://doi.org/10.3390/jsan8010016
Amor, A.B., Abid, M., Meddeb, A.: SAMAFog: service-aware mutual authentication fog-based protocol. In: 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1049–1054 (2019). https://doi.org/10.1109/IWCMC.2019.8766575
Chen, C.-M., Huang, Y., Wang, F., Kumari, S., Wu, M.-E.: A secure authenticated and key exchange scheme for fog computing. Enterp. Inf. Syst. 1–16 (2020). https://doi.org/10.1080/17517575.2020.1712746
Ahsan, M.A.M., Ali, I., Imran, M., Idris, M.Y.I., Khan, S., Khan, A.: A fog-centric secure cloud storage scheme. IEEE Trans. Sustain. Comput. https://doi.org/10.1109/TSUSC.2019.2914954
Noura, H., Salman, O., Chehab, A., Couturier, R.: Preserving data security in distributed fog computing. Ad Hoc Netw. 94 (2019). https://doi.org/10.1016/j.adhoc.2019.101937,
Jiang, Y., Susilo, W., Mu, Y., Guo, F.: Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Future Gener. Comput. Syst. 78 (2017). https://doi.org/10.1016/j.future.2017.01.026
Zhang, P., Chen, Z., Liu, J., Liang, K., Liu, H: An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Gener. Comput. Syst. 78 (2016). https://doi.org/10.1016/j.future.2016.12.015
Ibrahim, M.H.: Octopus: an edge-fog mutual authentication scheme. IJ Netw. Secur. 18(6), 1089–1101 (2016)
Amor, A.B., Abid, M., Meddeb, A.: A privacy-preserving authentication scheme in an edge-fog environment. In: IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1225–1231. IEEE (2017)
Jia, X., He, D., Kumar, N., Choo, K.-K.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25(8), 4737–4750 (2018). https://doi.org/10.1007/s11276-018-1759-3
Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Futur. Gener. Comput. Syst. 91, 475–492 (2019). https://doi.org/10.1016/j.future.2018.09.017
Jia, X., Debiao, H., Kumar, N., Choo, K.-K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Netw. 25, 4737–4750 (2019). https://doi.org/10.1007/s11276-018-1759-3
Wang, T., Zhou, J., Chen, X., Wang, G., Liu, A., Liu, Y.: A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1), 3–12 (2018)
Tu, S., et al.: Security in fog computing: a novel technique to tackle an impersonation attack. IEEE Access 6, 74993–75001 (2018). https://doi.org/10.1109/ACCESS.2018.2884672
Alharbi, S., Rodriguez, P., Maharaja, R., Iyer, P., Bose, N., Ye, Z.: FOCUS: a fog computing-based security system for the Internet of Things. In: 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 1–5. https://doi.org/10.1109/CCNC.2018.8319238, 2018
Alrawais, A., Alhothaily, A., Hu, C., **ng, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131–9138 (2017). https://doi.org/10.1109/ACCESS.2017.2705076
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shruti, Rani, S. (2022). Mitigating Security Problems in Fog Computing System. In: Abraham, A., et al. Innovations in Bio-Inspired Computing and Applications. IBICA 2021. Lecture Notes in Networks and Systems, vol 419. Springer, Cham. https://doi.org/10.1007/978-3-030-96299-9_58
Download citation
DOI: https://doi.org/10.1007/978-3-030-96299-9_58
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96298-2
Online ISBN: 978-3-030-96299-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)