Security Challenges in Fog Computing

Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.

2017 ◽  
Vol 17 (3) ◽  
pp. 165-185 ◽  
Author(s):  
P. Sanyasi Naidu ◽  
Babita Bhagat

Abstract Cloud computing is emerging as a significant new paradigm in the fields of Service-oriented computing, software engineering, etc. The paper aims to characterize the cloud environment and to study the cloud optimization problems. About 50 papers are collected from the standard journals, and it is first reviewed chronologically to find out the contributions in cloud security. After reviewing, the various challenges addressed in the cloud environment and its performance analysis is discussed. In the next section, the exploration of the meta-heuristic study of cloud optimization is done. The algorithms used in the cloud security challenges are discussed and reviewed. The algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) are exploited for the finding the cloud security problems. As the research outcome, case studies are taken and reviewed. Cloud computing is a vast field, and a lot of problems in it had to be addressed and solved.


2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


Author(s):  
Dr. Satwinder Singh Rupra

Cloud computing can help organizations accomplish more by paying less and breaking the physical boundaries between IT infrastructure and its users, however heightened security threats must be overcome in order to benefit fully from this new computing exemplar. The objective of this research was to determine the fundamental cloud security challenges experienced by SMEs in Kenya. Descriptive survey was therefore chosen for this study because the researcher was interested in the opinions of the respondents in terms of security challenges in cloud computing. The primary area of study for this research was Nairobi, Kisumu and Mombasa and the target population for this study were the Top 100 SME companies in Kenya as of 2016. This information could be useful and vital to policy makers and researchers who are making efforts to improve security in the field of Cloud Computing.


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 606
Author(s):  
G Sri Gnana Deepika ◽  
P Sai Kiran

Smart vehicles participating in VANET have high computing capabilities which lead the demand to support more applications that give safety and effective measures to people. The vehicles in VANET are taking the help of cloud services for communication, computation and storage which benefits in economical way and we call that as vehicular cloud computing (VCC). Due to certain limitations in VCC and also demand for more quality of service applications in smart vehicles a new paradigm called vehicular fog computing (VFC) is proposed which helps to overcome limitations in VCC and provide more quality services to users participating in VANET. Some of the security challenges and possible attacks in VFC are also stated.  


Author(s):  
R. Priyadarshini ◽  
N. Malarvizhi ◽  
E. A. Neeba

Fog computing is a new paradigm believed to be an extension of cloud computing and services to the sting of the network. Similarly, like Cloud, Fog provides computing, data, storage, and various application services to the connected end-users. Fog computing uses one or a lot of combined end users or nearby end users edge devices to perform the configuration, communication, storage, control activity, and management functions over the infrastructure supported. This new paradigm solves the latency and information measure limitation issues encountered from the cloud computing. Primarily, the architecture of the fog computing is discussed and analyzed during this work and then indicates the connected potential security and trust problems. Then, however such problems are tackled within the existing literature is systematically reportable. Finally, the open challenges, analysis, trends, and future topics of security and trust in fog computing are mentioned.


Author(s):  
Stojan Kitanov ◽  
Toni Janevski

Pushing computing, control, data storage, and processing into the cloud has been a key trend in the past decade. However, the cloud alone encounters growing limitations, such as reduced latency, high mobility, high scalability, and real-time execution in order to meet the upcoming computing and intelligent networking demands. A new paradigm called fog computing has emerged to overcome these limits. Fog extends cloud computing and services to the edge of the network. It provides data, computing, storage, and application services to end-users that can be hosted at the network edge. It reduces service latency, and improves QoS/QoE, that results in superior user experience. This chapter is about introduction and overview of fog computing, comparison between fog computing and cloud computing, fog computing and mobile edge computing, possible fog computing architecture, applications of fog computing, and possible research directions.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2783 ◽  
Author(s):  
Kun Ma ◽  
Antoine Bagula ◽  
Clement Nyirenda ◽  
Olasupo Ajayi

The internet of things (IoT) and cloud computing are two technologies which have recently changed both the academia and industry and impacted our daily lives in different ways. However, despite their impact, both technologies have their shortcomings. Though being cheap and convenient, cloud services consume a huge amount of network bandwidth. Furthermore, the physical distance between data source(s) and the data centre makes delays a frequent problem in cloud computing infrastructures. Fog computing has been proposed as a distributed service computing model that provides a solution to these limitations. It is based on a para-virtualized architecture that fully utilizes the computing functions of terminal devices and the advantages of local proximity processing. This paper proposes a multi-layer IoT-based fog computing model called IoT-FCM, which uses a genetic algorithm for resource allocation between the terminal layer and fog layer and a multi-sink version of the least interference beaconing protocol (LIBP) called least interference multi-sink protocol (LIMP) to enhance the fault-tolerance/robustness and reduce energy consumption of a terminal layer. Simulation results show that compared to the popular max–min and fog-oriented max–min, IoT-FCM performs better by reducing the distance between terminals and fog nodes by at least 38% and reducing energy consumed by an average of 150 KWh while being at par with the other algorithms in terms of delay for high number of tasks.


2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.


Sign in / Sign up

Export Citation Format

Share Document