Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which...
Main Authors: | , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-05-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/10/1171 |
_version_ | 1797534084364238848 |
---|---|
author | Abdullah Al-Noman Patwary Ranesh Kumar Naha Saurabh Garg Sudheer Kumar Battula Md Anwarul Kaium Patwary Erfan Aghasian Muhammad Bilal Amin Aniket Mahanti Mingwei Gong |
author_facet | Abdullah Al-Noman Patwary Ranesh Kumar Naha Saurabh Garg Sudheer Kumar Battula Md Anwarul Kaium Patwary Erfan Aghasian Muhammad Bilal Amin Aniket Mahanti Mingwei Gong |
author_sort | Abdullah Al-Noman Patwary |
collection | DOAJ |
description | Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed. |
first_indexed | 2024-03-10T11:24:38Z |
format | Article |
id | doaj.art-2b2f1e05472d47afbbf253d2f708e730 |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-10T11:24:38Z |
publishDate | 2021-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-2b2f1e05472d47afbbf253d2f708e7302023-11-21T19:42:32ZengMDPI AGElectronics2079-92922021-05-011010117110.3390/electronics10101171Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access ControlAbdullah Al-Noman Patwary0Ranesh Kumar Naha1Saurabh Garg2Sudheer Kumar Battula3Md Anwarul Kaium Patwary4Erfan Aghasian5Muhammad Bilal Amin6Aniket Mahanti7Mingwei Gong8School of Computer Science, Nanjing University of Science and Technology, Nanjing 150001, ChinaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaFaculty of Engineering, Computing and Mathematics, University of Western Australia, Perth, WA 6009, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, AustraliaSchool of Computer Science, University of Auckland, Auckland 1010, New ZealandFaculty of Science and Technology, Mathematics and Computing, Mount Royal University, Calgary, AB T3E 6K6, CanadaFog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.https://www.mdpi.com/2079-9292/10/10/1171Fog securityIoT securityaccess controlfog computingauthenticationtrust management |
spellingShingle | Abdullah Al-Noman Patwary Ranesh Kumar Naha Saurabh Garg Sudheer Kumar Battula Md Anwarul Kaium Patwary Erfan Aghasian Muhammad Bilal Amin Aniket Mahanti Mingwei Gong Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control Electronics Fog security IoT security access control fog computing authentication trust management |
title | Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control |
title_full | Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control |
title_fullStr | Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control |
title_full_unstemmed | Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control |
title_short | Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control |
title_sort | towards secure fog computing a survey on trust management privacy authentication threats and access control |
topic | Fog security IoT security access control fog computing authentication trust management |
url | https://www.mdpi.com/2079-9292/10/10/1171 |
work_keys_str_mv | AT abdullahalnomanpatwary towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT raneshkumarnaha towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT saurabhgarg towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT sudheerkumarbattula towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT mdanwarulkaiumpatwary towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT erfanaghasian towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT muhammadbilalamin towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT aniketmahanti towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol AT mingweigong towardssecurefogcomputingasurveyontrustmanagementprivacyauthenticationthreatsandaccesscontrol |