eCite Digital Repository

Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control

Citation

Patwary, AAN and Naha, RK and Garg, S and Battula, SK and Patwary, MAK and Aghasian, E and Amin, MB and Mahanti, A and Gong, M, Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control, Electronics, 10, (10) Article 1171. ISSN 2079-9292 (2021) [Refereed Article]


Preview
PDF (Published version)
2Mb
  

Copyright Statement

Copyright: © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons 4.0 International (CC BY 4.0) license (https://creativecommons.org/licenses/by/4.0/).

DOI: doi:10.3390/electronics10101171

Abstract

Fog computing is an emerging computing paradigm that has come into consideration for the deployment of Internet of Things (IoT) applications amongst researchers and technology industries over the last few years. Fog is highly distributed and consists of a wide number of autonomous end devices, which contribute to the processing. However, the variety of devices offered across different users are not audited. Hence, the security of Fog devices is a major concern that should come into consideration. Therefore, to provide the necessary security for Fog devices, there is a need to understand what the security concerns are with regards to Fog. All aspects of Fog security, which have not been covered by other literature works, need to be identified and aggregated. On the other hand, privacy preservation for userís data in Fog devices and application data processed in Fog devices is another concern. To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.

Item Details

Item Type:Refereed Article
Keywords:fog security, IoT security, access control, fog computing, authentication, trust management, privacy, threats and attacks, auditing, blockchain
Research Division:Information and Computing Sciences
Research Group:Cybersecurity and privacy
Research Field:Data security and protection
Objective Division:Information and Communication Services
Objective Group:Information systems, technologies and services
Objective Field:Cybersecurity
UTAS Author:Naha, RK (Mr Ranesh Kumar Naha)
UTAS Author:Garg, S (Dr Saurabh Garg)
UTAS Author:Battula, SK (Mr Sudheer Kumar Battula)
UTAS Author:Aghasian, E (Mr Erfan Aghasian)
UTAS Author:Amin, MB (Dr Muhammad Bilal Amin)
ID Code:148007
Year Published:2021
Web of Science® Times Cited:12
Deposited By:Information and Communication Technology
Deposited On:2021-11-29
Last Modified:2022-01-14
Downloads:4 View Download Statistics

Repository Staff Only: item control page