Skip to main content

Security and Privacy Issues of Fog Computing: A Survey

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks. Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing. In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: NDSS (2002)

    Google Scholar 

  2. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Workshop on Mobile Cloud Computing. ACM (2012)

    Google Scholar 

  3. Bouzefrane, S., Mostefa, A.F.B., Houacine, F., Cagnon, H.: Cloudlets authentication in nfc-based mobile computing. In: MobileCloud. IEEE (2014)

    Google Scholar 

  4. Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS 25(1), 222–233 (2014)

    Google Scholar 

  5. Cao, N., Yu, S., Yang, Z., Lou, W., Hou, Y.T.: Lt codes-based secure and reliable cloud storage service. In: INFOCOM. IEEE (2012)

    Google Scholar 

  6. Cash, D., et al.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS, vol. 14 (2014)

    Google Scholar 

  7. Damiani, E., et al.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: CCS. ACM (2002)

    Google Scholar 

  8. Dinh, H.T., Lee, C., Niyato, D., Wang, P.: A survey of mobile cloud computing: architecture, applications, and approaches. WCMC 13(18), 1587–1611 (2013)

    Google Scholar 

  9. Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: preliminary framework and a case study. In: IRI. IEEE (2014)

    Google Scholar 

  10. Dwork, C.: Differential privacy. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security. LNCS, vol. 2011. Springer, Heidelberg (2011)

    Google Scholar 

  11. ETSI: Mobile-edge computing (2014). http://goo.gl/7NwTLE

  12. Gao, Z., Zhu, H., Liu, Y., Li, M., Cao, Z.: Location privacy in database-driven cognitive radio networks: Attacks and countermeasures. In: INFOCOM. IEEE (2013)

    Google Scholar 

  13. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  14. Gil Press: Idc: Top 10 technology predictions (2015). http://goo.gl/zFujnE

  15. Ha, K., Chen, Z., Hu, W., Richter, W., Pillai, P., Satyanarayanan, M.: Towards wearable cognitive assistance. In: Mobisys. ACM (2014)

    Google Scholar 

  16. Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A measurement based rogue ap detection scheme. In: INFOCOM. IEEE (2009)

    Google Scholar 

  17. Han, H., Sheng, B., Tan, C.C., Li, Q., Lu, S.: A timing-based scheme for rogue ap detection. TPDS 22(11), 1912–1925 (2011)

    Google Scholar 

  18. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  19. Klaedtke, F., Karame, G.O., Bifulco, R., Cui, H.: Access control for sdn controllers. In: HotSDN, vol. 14 (2014)

    Google Scholar 

  20. Lu, R., et al.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS 23(9), 1621–1631 (2012)

    Google Scholar 

  21. McKeown, N., et al.: Openflow: enabling innovation in campus networks. ACM SIGCOMM CCR 38(2), 69–74 (2008)

    Article  Google Scholar 

  22. McLaughlin, S., McDaniel, P., Aiello, W.: Protecting consumer privacy from electric load monitoring. In: CCS. ACM (2011)

    Google Scholar 

  23. Modi, C., et al.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)

    Article  MathSciNet  Google Scholar 

  24. Novak, E., Li, Q.: Near-pri: Private, proximity based location sharing. In: INFOCOM. IEEE (2014)

    Google Scholar 

  25. Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: Security and Privacy. IEEE (2013)

    Google Scholar 

  26. Qin, Z., Li, Q., Chuah, M.C.: Defending against unidentifiable attacks in electric power grids. TPDS 24(10), 1961–1971 (2013)

    Google Scholar 

  27. Qin, Z., Yi, S., Li, Q., Zamkov, D.: Preserving secondary users’ privacy in cognitive radio networks. In: INFOCOM, 2014 Proceedings IEEE. IEEE (2014)

    Google Scholar 

  28. Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2011)

    Google Scholar 

  29. Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. Perv. Comput. 8(4), 14–23 (2009)

    Article  Google Scholar 

  30. Satyanarayanan, M., et al.: An open ecosystem for mobile-cloud convergence. Commun. Mag. 53(3), 63–70 (2015)

    Article  Google Scholar 

  31. Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Mobile Cloud 2015)

    Google Scholar 

  32. Shin, S., Gu, G.: Cloudwatcher: network security monitoring using openflow in dynamic cloud networks. In: ICNP. IEEE (2012)

    Google Scholar 

  33. Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Security and Privacy. IEEE (2000)

    Google Scholar 

  34. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: FedCSIS. IEEE (2014)

    Google Scholar 

  35. Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  36. Tsugawa, M., et al.: Cloud computing security: what changes with software-defined networking? In: Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. LNCS. Springer, Heidelberg (2014)

    Google Scholar 

  37. Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Trans. Pow. Syst. 28(2), 1052–1062 (2013)

    Article  Google Scholar 

  38. Vaquero, L.M., Rodero-Merino, L.: Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM CCR 44(5), 27–32 (2014)

    Article  Google Scholar 

  39. Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. TPDS 23(8), 1467–1479 (2012)

    Google Scholar 

  40. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM. IEEE (2010)

    Google Scholar 

  41. Wei, W., Xu, F., Li, Q.: Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. In: INFOCOM. IEEE (2012)

    Google Scholar 

  42. Willis, D.F., Dasgupta, A., Banerjee, S.: Paradrop: a multi-tenant platform for dynamically installed third party services on home gateways. In: SIGCOMM Workshop on Distributed Cloud Computing. ACM (2014)

    Google Scholar 

  43. Yang, K., Jia, X.: Data storage auditing service in cloud computing: challenges, methods and opportunities. World Wide Web 15(4), 409–428 (2012)

    Article  Google Scholar 

  44. Yap, K.K., et al.: Separating authentication, access and accounting: a case study with openwifi. Technical report, Open Networking Foundation (2011)

    Google Scholar 

  45. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM. IEEE (2010)

    Google Scholar 

  46. Zao, J.K., et al.: Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology. Frontiers in Human Neuroscience 8 (2014)

    Google Scholar 

  47. Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)

    Article  Google Scholar 

  48. Zhu, J., et al.: Improving web sites performance using edge servers in fog computing architecture. In: SOSE. IEEE (2013)

    Google Scholar 

  49. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanhe Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yi, S., Qin, Z., Li, Q. (2015). Security and Privacy Issues of Fog Computing: A Survey. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_67

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics