CFP last date
01 January 2025
Reseach Article

Privacy and Security Problems in Fog Computing

by Khalid A. Fakeeh
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 6
Year of Publication: 2016
Authors: Khalid A. Fakeeh
10.5120/cae2016652088

Khalid A. Fakeeh . Privacy and Security Problems in Fog Computing. Communications on Applied Electronics. 4, 6 ( March 2016), 1-7. DOI=10.5120/cae2016652088

@article{ 10.5120/cae2016652088,
author = { Khalid A. Fakeeh },
title = { Privacy and Security Problems in Fog Computing },
journal = { Communications on Applied Electronics },
issue_date = { March 2016 },
volume = { 4 },
number = { 6 },
month = { March },
year = { 2016 },
issn = { 2394-4714 },
pages = { 1-7 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume4/number6/556-2016652088/ },
doi = { 10.5120/cae2016652088 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:53:40.358922+05:30
%A Khalid A. Fakeeh
%T Privacy and Security Problems in Fog Computing
%J Communications on Applied Electronics
%@ 2394-4714
%V 4
%N 6
%P 1-7
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fog Computing is a term made by Cisco that insinuates extending cloud computing to the edge of a network. Generally called Edge Computing or preliminaries, fog computing supports the operation of Fog/cloud, storage and networking services between end devices and conveyed processing data centers. Fog computing is a gifted computing perspective that extends cloud computing to the edge of frameworks/networks. Like cloud computing however with specific characteristics, fog computing faces new-fangled security and assurance defies other than those procured from cloud computing. We have reviewed these defies/concerns and prospective plans briefly in this paper.

References
  1. ”Dsouza et al ”, Policy-driven security management for fog computing: Preliminary framework and a case study, IRI. IEEE (2014)
  2. ”Dwork”, Di erential privacy, An Encyclopedia of Cryptography and Security. Springer (2011)
  3. ”Bonomi et al”, Fog computing and its role in the internet of things, workshop on Mobile cloud computing. ACM (2012) [4] ”Han et al”, A timing-based scheme for rogue ap detection, TPDS 22 (2011)
  4. ”Bouzefrane et al”, Cloudlets authentica-tion in nfc-based mobile computing, MobileCloud. IEEE (2014)
  5. ”Cash et al”, Dynamic searchable encryption in very-large databases: Data structures and implementation, NDSS. vol. 14 (2014)
  6. ”Damiani et al”, A reputation-based approach for choosing reliable resources in peer-to-peer networks, CCS. ACM (2002) [8] ”Balfanz et al”, Talking to strangers, Au-thentication in ad-hoc wireless networks, NDSS (2002)
  7. ”Dinh et al”, A survey of mobile cloud computing: architecture, applications, and approaches. WCMC 13 (2013)
  8. ”ETSI”, http://goo.gl/7NwTLE (2014) [11] ”Cao et al”, Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS 25 (2014)
  9. ”Cao et al”, Lt codes-based secure and reliable cloud storage service. In: INFOCOM. IEEE (2012)
  10. ”Gao et al”, Location privacy in database-driven cog-nitive radio networks: Attacks and countermeasures, INFOCOM. IEEE (2013)
  11. ”Gil Press 2015”, http://goo.gl/zFujnE.
  12. ”Lu et al”,An efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS 23 (2012) [16] ”Zhu et al”, Improving web sites performance using edge servers in fog computing architecture, SOSE. IEEE (2013)
  13. ”Zissis et al”, Addressing cloud computing security issues, Future Gener-ation computer systems 28 (2012)
  14. ”Han et al”, A measurement based rogue ap detection scheme, INFOCOM. IEEE (2009)
  15. ”J sang et al”, A survey of trust and reputation systems for online service provision, Decision support systems (DSS) 43 (2007) [20] ”McLaughlin et al”, Protecting consumer privacy from electric load monitoring, CCS. ACM (2011)
  16. ”Klaedtke et al”, Access control for sdn controllers, HotSDN. vol. 14 (2014)
  17. ”McKeown et al”, Open ow: enabling innovation in campus networks, ACM SIGCOMM CCR 38 (2008)
  18. ”Gennaro et al”, Non-interactive verifiable computing: Out-sourcing computation to untrusted workers, CRYPTO, Springer (2010) [24] ”Willis et al”, a multi-tenant platform for dynamically installed third party services on home gateways, SIGCOMM work-shop on Distributed cloud computing, ACM (2014)
  19. ”Yang et al”, Data storage auditing service in cloud computing, challenges, methods and opportunities, WWW 15 (2012) [26] ”Wang et al”, Privacy-preserving public auditing for data storage security in cloud computing, INFOCOM. IEEE (2010)
  20. ”Wei et al”, Flexible privacy-preserving location sharing in mobile online social networks, INFOCOM. IEEE (2012)
  21. ”Modi et al”, A survey of intrusion detection techniques in cloud., Journal of Network and Computer Applications 36 (2013) [29] ”Yap et al”, Separating authentication, access and accounting, A case study with openwi, open Networking Foundation, Tech. Rep (2011)
  22. ”Yu et al”, Achieving secure, scalable, and fine-grained data access control in cloud computing, INFOCOM. IEEE (2010)
  23. ”Parno et al”, Nearly practical verifiable computation, Security and Privacy, IEEE (2013) [32] ”Stojmenovic et al”, The fog computing paradigm, Scenarios and security issues, FedCSIS. IEEE (2014)
  24. ”Wang et al”, Enabling secure and e cient ranked keyword search over outsourced cloud data. TPDS 23 (2012)
  25. ”Ha et al”, Towards wearable cognitive assistance, Mobisys. ACM (2014)
  26. ”Valenzuela et al”, Real-time intrusion detection in power system operations, Power Systems, IEEE Transactions on 28 (2013)
  27. ”Zao et al”, Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology, Frontiers in human neuroscience 8 (2014)
  28. ”Zhang et al”, Cloud computing: state-of-the-art and research challenges, Journal of internet services and applications 1 (2010) [38] ”Takabi et al”, Security and privacy challenges in cloud com-puting environments, IEEE Security and Privacy 8 (2010)
  29. ”Vaquero et al”, Finding your way in the fog, Towards a comprehensive definition of fog computing, ACM SIGCOMM CCR 44 (2014) [40] ”Qin et al”, Defending against unidenti able attacks in electric power grids, TPDS 24 (2013)
  30. ”Shin et al”, Network security monitoring using open flow in dynamic cloud networks. In: ICNP. IEEE (2012)
  31. ”Qin et al”, Preserving secondary users' privacy in cognitive radio networks, INFOCOM, 2014 Proceedings IEEE. IEEE (2014)
  32. ”Novak et al”, Near-pri: Private, proximity based location sharing, INFO-COM. IEEE (2014)
  33. ”Satyanarayanan et al”,The case for vm-based cloudlets in mobile computing, Pervasive Computing 8 (2009)
  34. ”Tsugawa et al”, Cloud computing security, What changes with software-defined networking?, Secure Cloud Computing. Springer (2014)
  35. ”Satyanarayanan et al”, An open ecosystem for mobile-cloud convergence, Communications Magazine 53 (2015) [47] ”Rial et al”, Privacy-preserving smart metering, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. ACM (2011)
  36. ”Song et al”, Practical techniques for searches on encrypted data, Security and Privacy, IEEE (2000)
  37. ”Shi et al”, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, Mobile Cloud (2015)
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Fog computing IoT Security Confidentiality