File
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Digital Document
Content type |
Content type
|
---|---|
Collection(s) |
Collection(s)
|
Resource Type |
Resource Type
|
Genre |
Genre
|
Origin Information |
|
---|
Persons |
Author (aut): Patwary, Abdullah Al-Noman
Author (aut): Naha, Ranesh
Author (aut): Garg, Saurabh
Author (aut): Battula, Sudheer Kumar
Author (aut): Patwary, Md Anwarul Kaium
Author (aut): Aghasian, Erfan
Author (aut): Amin, Muhammad Bilal
Author (aut): Mahanti, Aniket
Author (aut): Gong, Mingwei
|
---|---|
Organizations |
Funder (fnd): Library OA fund
|
Abstract |
Abstract
Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed. |
---|---|
Language |
Language
|
Publication Title |
Publication Title
|
---|---|
Publication Number |
Publication Number
Volume 10, Issue 10
|
Physical Description Note |
Physical Description Note
PUBLISHED
|
---|
DOI |
DOI
10.3390/electronics10101171
|
---|---|
Handle |
Handle
Handle placeholder
|
Use and Reproduction |
Use and Reproduction
author
|
---|---|
Use License |
Use License
|
Cite this
Language |
English
|
---|---|
Name |
Towards Secure Fog Computing
|
Authored on |
|
MIME type |
application/pdf
|
File size |
2376547
|
Media Use |