| Literature DB >> 34960320 |
Ahmed M Alwakeel1,2.
Abstract
With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues.Entities:
Keywords: IoT; cloud computing; cloud security; edge computing; fog computing; fog security; privacy of IoT
Mesh:
Year: 2021 PMID: 34960320 PMCID: PMC8708798 DOI: 10.3390/s21248226
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cloud services level compression.
Figure 2Cloud, fog and edge interconnection.
Figure 3Edge computing applications.
Security attack in fog computing with some researches contribution.
| Security Attack | Research Contribution |
|---|---|
| Forgery | In [ |
| Tampering | In [ |
| Sybil | In [ |
| Jamming | In [ |
| Eavesdropping | In [ |
| Denial of Service | In [ |
| Man-in-the-Middle | In [ |
| Collusion | In [ |
| Impersonation | In [ |
| Side Channel Attack | In [ |
| Session Hijacking | In [ |
Figure 4Security areas in fog computing.
Privacy and issues in fog.
| Sr. No. | Privacy Aspects | Privacy Issues |
|---|---|---|
| 1. | User Privacy | Limited Network Visibility |
| 2. | Identity Privacy | Inefficient Attack Detection techniques |
| 3. | Data Privacy | Unavailability of user selective data collection |
| 4. | Usage Privacy | Issues of Virtualization |
| 5. | Location Privacy | Issues of Multitenancy |
| 6. | Network Privacy | Suspected fog nodes |
Security Attack in Edge Computing Architecture.
| Core Side | Edge Servers | Edge Network | Mobile Edge Devices | |
|---|---|---|---|---|
| Challenges | Privacy Leakage | Privacy Leakage | DoS | Data Injection |
| Data Tampering | DoS | Man-in-the-middle | Service Manipulation | |
| DoS | Privilege Escalation | Rogue Gateway | ||
| Service Manipulation | Service Manipulation | |||
| Rogue Data Center | ||||
| Physical Damage |
Security attacks and privacy-preserving countermeasures.
| Countermeasures | Brief Description |
|---|---|
| Efficient Encryption Techniques | With efficient encryption techniques, the privacy issue can be resolved as the attackers will be unable to decode the complex encryption algorithms. the authors of [ |
| Decoy Technique | It is a security technique that is used to authenticate the data of a user present in the computing network by replacing the original information with the fake one which is then provided to the attackers. The authors of [ |
| Intrusion Detection System | It is employed in fog computing to detect and protect from attacks including DoS, insider attacks, port scanning attacks, flooding attacks on virtual machine, man-in-the-middle attacks, hypervisors etc.the authors of [ |
| Authentication Schemes | It allows verification of user’s identity by verifying user’s given credentials that whether or not they match with information present in the database through an authentication server. In [ |
| Blockchain Security | Blockchain allows network transaction with highly secure encryption algorithm and reduces failure of single point. In [ |
Security attacks and privacy-preserving countermeasures in edge.
| Countermeasures | Brief Description |
|---|---|
| Edge Node Security | Same level of security must be applied on all nodes of the edge network to ensure proper safety protocols. In case of different security levels, the attacker may break through the node having weak security algorithm. |
| Full-time Monitoring | It refers to constantly keep an eye on all the edge nodes and provide network visibility to the users in an interactive interface. |
| Proper Encryption | It involves a complex algorithm or a secret key which is properly secured and shared between the legitimate sender and receiver that allows the genuine users to decrypt the algorithm and access the data. |
| Intrusion Detection System | It is a system which informs the user about any anomaly or unauthorized access it detects in the system. |
| User Behavior Profiling | It refers to the observation, monitoring and maintenance of general behavior of users so that any activity apart from the normal behavior will determine the presence of an attacker. |
| Cryptographic Techniques | These techniques are used to deal with the security attacks launched by hackers and intruders by using a secret key. |
| Data Confidentiality | This mechanisms deal with different privacy issues that are caused by the illegal data operations, loss of data, data manipulation, data breach etc. by network attackers. |
Summary of IoT challenges and fog solutions.
| Challenges in IoT | Solution Offered by Fog |
|---|---|
| Security Challenge | Fog network is able to scan malware and determine the security status of surrounding IoT devices. It is also able to act as proxy to update software and detect threats timely. |
| Delay Constraints | Fog can perform various time-sensitive computation tasks. |
| Network Bandwidth Constraints | Fog enables hierarchical data processing for transferring data from cloud to IoT devices. |
| Uninterrupted Services | Fog promises uninterrupted services even if there is some connection issue. |
| Resource Constrained Devices | Fog is able to reduce device complexity, cost and consumption of power when certain operations cannot be delivered to the cloud. |
Main threats of fog and edge computing and related researches.
| Threat | Related Description | Related Resources |
|---|---|---|
| Access control | This includes all attacks that give the attacker access to sensitive or private data in unauthorized manner. |
In [ In [ In [ In [ |
| Denial of service (DOS) | In this type of attacks fake data is sent towards the fog nodes by attackers and these nodes are flooded with innumerous fake requests so that they remain unavailable for the legitimate users. |
In [ In [ |
| Virtualization threats | This type of attacks includes all attacks related to virtual machine including shared resources attacks where attackers try to take over some of the resources in unauthorized manner as well as migration attacks where attacker try to compromise the virtual machine during migration process. |
In [ In [ In [ |
| Trust Management | This includes all attacks where attackers gain a trust allowing them to communicate with different nodes and establish unauthorized connection to the network. Some examples of such attacks are: Self-promotion attack, Bad-mounting attack and on-off attack. |
In [ In [ In [ |