Full text

Turn on search term navigation

© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for user’s data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.

Details

Title
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
Author
Abdullah Al-Noman Patwary 1   VIAFID ORCID Logo  ; Naha, Ranesh Kumar 2   VIAFID ORCID Logo  ; Garg, Saurabh 2 ; Battula, Sudheer Kumar 2   VIAFID ORCID Logo  ; Md Anwarul Kaium Patwary 3   VIAFID ORCID Logo  ; Aghasian, Erfan 2   VIAFID ORCID Logo  ; Muhammad Bilal Amin 2 ; Mahanti, Aniket 4 ; Gong, Mingwei 5 

 School of Computer Science, Nanjing University of Science and Technology, Nanjing 150001, China; [email protected] 
 School of Information and Communication Technology, University of Tasmania, Hobart, TAS 7001, Australia; [email protected] (S.G.); [email protected] (S.K.B.); [email protected] (E.A.); [email protected] (M.B.A.) 
 Faculty of Engineering, Computing and Mathematics, University of Western Australia, Perth, WA 6009, Australia; [email protected] 
 School of Computer Science, University of Auckland, Auckland 1010, New Zealand; Department of Computer Science, University of New Brunswick, Saint John, NB E2L 4L5, Canada 
 Faculty of Science and Technology, Mathematics and Computing, Mount Royal University, Calgary, AB T3E 6K6, Canada 
First page
1171
Publication year
2021
Publication date
2021
Publisher
MDPI AG
e-ISSN
20799292
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2532450086
Copyright
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.