Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which...

Full description

Bibliographic Details
Main Authors: Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
Format: Article
Language:English
Published: MDPI AG 2021-05-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/10/1171
_version_ 1797534084364238848
author Abdullah Al-Noman Patwary
Ranesh Kumar Naha
Saurabh Garg
Sudheer Kumar Battula
Md Anwarul Kaium Patwary
Erfan Aghasian
Muhammad Bilal Amin
Aniket Mahanti
Mingwei Gong
author_facet Abdullah Al-Noman Patwary
Ranesh Kumar Naha
Saurabh Garg
Sudheer Kumar Battula
Md Anwarul Kaium Patwary
Erfan Aghasian
Muhammad Bilal Amin
Aniket Mahanti
Mingwei Gong
author_sort Abdullah Al-Noman Patwary
collection DOAJ
description Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.
first_indexed 2024-03-10T11:24:38Z
format Article
id doaj.art-2b2f1e05472d47afbbf253d2f708e730
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T11:24:38Z
publishDate 2021-05-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-2b2f1e05472d47afbbf253d2f708e7302023-11-21T19:42:32ZengMDPI AGElectronics2079-92922021-05-011010117110.3390/electronics10101171Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access ControlAbdullah Al-Noman Patwary0Ranesh Kumar Naha1Saurabh Garg2Sudheer Kumar Battula3Md Anwarul Kaium Patwary4Erfan Aghasian5Muhammad Bilal Amin6Aniket Mahanti7Mingwei Gong8School of Computer Science, Nanjing University of Science and Technology, Nanjing 150001, ChinaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaFaculty of Engineering, Computing and Mathematics, University of Western Australia, Perth, WA 6009, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Computer Science, University of Auckland, Auckland 1010, New ZealandFaculty of Science and Technology, Mathematics and Computing, Mount Royal University, Calgary, AB T3E 6K6, CanadaFog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.https://www.mdpi.com/2079-9292/10/10/1171Fog securityIoT securityaccess controlfog computingauthenticationtrust management
spellingShingle Abdullah Al-Noman Patwary
Ranesh Kumar Naha
Saurabh Garg
Sudheer Kumar Battula
Md Anwarul Kaium Patwary
Erfan Aghasian
Muhammad Bilal Amin
Aniket Mahanti
Mingwei Gong
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Electronics
Fog security
IoT security
access control
fog computing
authentication
trust management
title Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
title_full Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
title_fullStr Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
title_full_unstemmed Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
title_short Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
title_sort towards secure fog computing a survey on trust management privacy authentication threats and access control
topic Fog security
IoT security
access control
fog computing
authentication
trust management
url https://www.mdpi.com/2079-9292/10/10/1171
work_keys_str_mv AT abdullahalnomanpatwary towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT raneshkumarnaha towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT saurabhgarg towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT sudheerkumarbattula towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT mdanwarulkaiumpatwary towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT erfanaghasian towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT muhammadbilalamin towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT aniketmahanti towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol
AT mingweigong towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol