The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information...

Full description

Bibliographic Details
Main Authors: Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
Format: Article
Language:English
Published: MDPI AG 2019-04-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/19/8/1788
_version_ 1828393054432657408
author Noshina Tariq
Muhammad Asim
Feras Al-Obeidat
Muhammad Zubair Farooqi
Thar Baker
Mohammad Hammoudeh
Ibrahim Ghafir
author_facet Noshina Tariq
Muhammad Asim
Feras Al-Obeidat
Muhammad Zubair Farooqi
Thar Baker
Mohammad Hammoudeh
Ibrahim Ghafir
author_sort Noshina Tariq
collection DOAJ
description The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
first_indexed 2024-12-10T07:32:14Z
format Article
id doaj.art-d83a227b115842b5ab424f370ef9922f
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-12-10T07:32:14Z
publishDate 2019-04-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-d83a227b115842b5ab424f370ef9922f2022-12-22T01:57:32ZengMDPI AGSensors1424-82202019-04-01198178810.3390/s19081788s19081788The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A SurveyNoshina Tariq0Muhammad Asim1Feras Al-Obeidat2Muhammad Zubair Farooqi3Thar Baker4Mohammad Hammoudeh5Ibrahim Ghafir6Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, PakistanDepartment of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, PakistanCollege of Technological Innovation, Zayed University, Abu Dhabi 144534, UAEDepartment of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, PakistanDepartment of Computer Science, Liverpool John Moores University, Liverpool L3 3AF, UKSchool of Computing, Mathematics and Digital Technology, Manchester Metropolitan University, Manchester M1 5GD, UKFaculty of Informatics, Masaryk University, 60177 Brno, Czech RepublicThe proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.https://www.mdpi.com/1424-8220/19/8/1788securitybig dataInternet of Thingsfog computingedge computingblockchain
spellingShingle Noshina Tariq
Muhammad Asim
Feras Al-Obeidat
Muhammad Zubair Farooqi
Thar Baker
Mohammad Hammoudeh
Ibrahim Ghafir
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
Sensors
security
big data
Internet of Things
fog computing
edge computing
blockchain
title The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_full The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_fullStr The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_full_unstemmed The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_short The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_sort security of big data in fog enabled iot applications including blockchain a survey
topic security
big data
Internet of Things
fog computing
edge computing
blockchain
url https://www.mdpi.com/1424-8220/19/8/1788
work_keys_str_mv AT noshinatariq thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT muhammadasim thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ferasalobeidat thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT muhammadzubairfarooqi thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT tharbaker thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT mohammadhammoudeh thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ibrahimghafir thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT noshinatariq securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT muhammadasim securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ferasalobeidat securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT muhammadzubairfarooqi securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT tharbaker securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT mohammadhammoudeh securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ibrahimghafir securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey