An overview of Fog computing and its security issues
Version 2 2024-06-13, 09:16Version 2 2024-06-13, 09:16
Version 1 2015-08-18, 14:06Version 1 2015-08-18, 14:06
journal contribution
posted on 2024-06-13, 09:16 authored by I Stojmenovic, S Wen, X Huang, H LuanFog computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage and application services to end users. In this article, we elaborate the motivation and advantages of Fog computing and analyse its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. We discuss the state of the art of Fog computing and similar work under the same umbrella. Distinguished from other reviewing work of Fog computing, this paper further discloses the security and privacy issues according to current Fog computing paradigm. As an example, we study a typical attack, man-in-the-middle attack, for the discussion of system security in Fog computing. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device. In addition, we discuss the authentication and authorization techniques that can be used in Fog computing. An example of authentication techniques is introduced to address the security scenario where the connection between Fog and Cloud is fragile. Copyright © 2015 John Wiley & Sons, Ltd.
History
Journal
Concurrency computation: practice and experienceVolume
28Pagination
2991-3005Location
London, Eng.Publisher DOI
ISSN
1532-0626eISSN
1532-0634Language
engPublication classification
C Journal article, C1 Refereed article in a scholarly journalCopyright notice
2015, WileyIssue
10Publisher
WileyUsage metrics
Categories
Keywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC