You are not logged in.

An overview of Fog computing and its security issues

Stojmenovic, Ivan, Wen, Sheng, Huang, Xinyi and Luan, Hao 2016, An overview of Fog computing and its security issues, Concurrency computation: practice and experience, vol. 28, no. 10, pp. 2991-3005, doi: 10.1002/cpe.3485.

Attached Files
Name Description MIMEType Size Downloads

Title An overview of Fog computing and its security issues
Author(s) Stojmenovic, Ivan
Wen, Sheng
Huang, Xinyi
Luan, Hao
Journal name Concurrency computation: practice and experience
Volume number 28
Issue number 10
Start page 2991
End page 3005
Total pages 15
Publisher Wiley
Place of publication London, Eng
Publication date 2016-07
ISSN 1532-0626
1532-0634
Keyword(s) fog computing
security
Summary Fog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile.
Language eng
DOI 10.1002/cpe.3485
Field of Research 0805 Distributed Computing
0803 Computer Software
080503 Networking and Communications
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, Wiley
Persistent URL http://hdl.handle.net/10536/DRO/DU:30075634

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 5 times in TR Web of Science
Scopus Citation Count Cited 13 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 252 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Mon, 18 Jan 2016, 15:59:04 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.