| Literature DB >> 35161675 |
Aleksandr Ometov1,2, Oliver Liombe Molua1, Mikhail Komarov3, Jari Nurmi1.
Abstract
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings.Entities:
Keywords: computational offloading; computing; distributed systems; privacy; security; survey
Mesh:
Year: 2022 PMID: 35161675 PMCID: PMC8838093 DOI: 10.3390/s22030927
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Most common task offloading models.
Figure 2Most commonly analyzed computing architectures.
Comparison on different computing paradigms.
| Attributes | Cloud Computing | Edge Computing | Fog Computing |
|---|---|---|---|
| Architecture | Centralized | Distributed | Distributed |
| Expected Task Execution Time | High | High-Medium | Low |
| Provided Services | Universal services | Often uses mobile networks | Vital for a particular domain and distributed |
| Security | Centralized (guaranteed by the Cloud provider) | Centralized (guaranteed by the Cellular operator) | Mixed (depending on the implementation) |
| Energy Consumption | High | Low | Varying but higher than for Edge |
| Identifying location | No | Yes | Yes |
| Main Providers | Amazon and Google | Cellular network providers | Proprietary |
| Mobility | Inadequate | Offered with limited support | Supported |
| Interaction in Real-Time | Available | Available | Available |
| Latency | High | Low | Varying but higher than for Edge |
| Bandwidth Cost | High | Low | Low |
| Storage capacity and Computation | High | Very limited | Varying |
| Scalability | Average | High | High |
| Overall usage | Computation distribution for huge data (Google MapReduce), Apps virtualization, Storage of data scalability | Control of traffic, data caching, wearable applications | CCTV surveillance, imaging of subsurface in real-time, IoT, Smart city, Vehicle-to-Vehicle (V2X) |
1 Importantly, Edge may provide higher results but only for computationally simple tasks (benefiting in terms of communication latency), while Fog would provide higher computational speed maintaining the latency (for, e.g., AR/VR applications). Executions in the Cloud would always provide the worst results as the computational unit is geographically distant from the user, which would naturally require tremendous communication overheads compared to geographically closer locations.
Attack specifics of paradigms and suggested countermeasures.
| Layer | Brief Description | Attack | Specifics of Paradigm/Main Proposed Countermeasures | ||
|---|---|---|---|---|---|
| Cloud | Edge | Fog | |||
| Application | Data inclined applications faces attacks and if breached, unpermitted access on websites is reached.
Malware is of different forms, e.g., Trojan horses and viruses. An illegal software used to access legitimate information. Attacks HTTP [ | HTTP Flood | Application monitoring is highly recommended. Web Application Firewalls (WAF), Anti-virus, privacy protection management [ | Filtering mechanisms and intrusion detection systems [ | HTTP-Redirect scheme [ |
| SQL Injection | SQL injection detection using adaptive deep learning [ | Modifying circuits to minimize information leakage by adding random noise or delay, implementing a constant execution path code and balancing Hamming weights [ | SQL injection detection using Elastic-pooling [ | ||
| Malwares | Use of Antivirus Softwares [ | Signature-based and behavior-based detection [ | Mirai botnet detector [ | ||
| Session/Presentation | “It is defined as a pool of virtualized computer resources.” Virtualization offers better usage of hardware assets with an opportunity for additional services avoiding extra costs for infrastructures. Customers are provided with virtual storage [ | Hyper- visor | Strong configurations, up-to-date Operating System (OS). | Computational Auditing | Robust Authentication scheme. |
| Data leakage | Encrypt stored data/use secured transmission medium, e.g., SSL/TLS, Virtual Firewall [ | Homomorphic Encryption [ | Isolation of user’s data, Access control strictly based on positions [ | ||
| VM-Based | Anti-viruses, anti-spyware to monitor illegal events in guest OS [ | Identity and Authentication scheme such as Identity-Based Encryption (IBE) [ | Intrusion detection and prevention mechanism use for anomaly detection, behavioral assessment, and machine learning approach in classifying attacks [ | ||
| Transport | “Provides a total end-to-end solution for reliable communications”. The two main protocols are TCP and UDP. The smooth performance in communication strongly depends on TCP/IP between user and server [ | TCP Flood | Firewalls, SYN Cache [ | SYN cookies [ | Integrated Firewalls [ |
| UDP Flood | Graphene design for secure communication [ | Response rate for UDP packets should be reduced [ | Response rate for UDP packets same as in Edge, should be reduced [ | ||
| Session hijacking | AES-GCM symmetric encryption [ | User light-weight authentication algorithm [ | Encrypting communication using two-ways or multi-purpose authentication [ | ||
| Network | The routing of data packets across different networks from a source to an end node, is performed by the network layer [ | DoS attack | Intrusion Detection System (IDS) [ | Network Authentication mechanisms | Deploy routing security and observing the behaviour of nodes [ |
| MITM | Data Encryption [ | Time stamps, encryption algorithm [ | Use of Authentication schemes [ | ||
| Spoofing attacks | Identity Authentication [ | Secure trust schemes [ | Secured identification and Strong authentication [ | ||
| PHY/MAC | The manner how types of equipment are physically hooked up to a wired or wireless network system and can be sorted for physical addressing with the help of a designated MAC address [ | Eaves-dropping | Encryption, Cryptography [ | Data Encryption using asymmetric AES scheme [ | Protection of identity by use of IBC [ |
| Tampe-ring | Detection of behavioural pattern | Observe manner of behaviour [ | Multicast authentication as PKI [ | ||
| Replay attack | Dynamic identity-based authentication model [ | Authentication mechanisms [ | Key generation approach [ | ||