Open Access Open Access  Restricted Access Subscription or Fee Access

Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft

Riyaz Ahmad Shah, Danish Ali Khan

Abstract


Fog computing is one of the most important decentralized computing infrastructure in which data, computation, storage and applications are distributed in the most logical and efficient way between the data source and the cloud. It is extension of cloud computing and provides data storage, processing and computation of data just like cloud computing itself, but is located at the edge of the network, i.e. at the user end. This research paper deals with the security, privacy and data confidentiality issues in fog computing. Main sources of attacks on fog and cloud by service providers, hackers, government agencies and other organizations that access user’s data is covered. Furthermore, current security solutions are discussed. Finally, the concept of decoy technique with some modification for data privacy in case of password theft is covered.

Keywords


Authentication, Cloud Computing, Device Identifier, Device Token, Fog Computing, IoT, Privacy, Password Theft, Push Notification, Security.

Full Text:

PDF

References


K. ChandraHasan," Research Challenges and Security Issues in Cloud Computing" International Journal of Computational Intelligence and Information Security, March 2012 VoI. 3, No. 3.

Dave Evans. The internet of things how the next evolution of the internet is changing everything. Technical report, CISCO IBSG, April 2011.

Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li (2015) “Fog Computing- Platform and Applications”: IEEE Workshop on Hot Topics in Web Systems and Technologies.

Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685-695). Springer, Cham.

Vaquero, Luis M., and Luis Rodero-Merino. "Finding your way in the fog: Towards a comprehensive definition of fog computing." ACM SIGCOMM Computer Communication Review 44.5 (2014): 27-32.

Murthy, J. S. (2019). EdgeCloud: A Distributed Management System for Resource Continuity in Edge to Cloud Computing Environment. In the Rise of Fog Computing in the Digital Era (pp. 108-128). IGI Global.

F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in workshop on Mobile cloud computing. ACM, 2012.

S. Sarkar, S. Chatterjee, and S. Misra, ‘‘Assessment of the suitability of fog computing in the context of Internet of things,’’ IEEE Trans. Cloud Comput., to be published.

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 2, pages 1–8 (2014)

Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013, February). A Survey on Sensor-Cloud: Architecture, Applications, and Approaches. International Journal of Distributed Sensor Networks, 2013, 1–18.

M. Díaz, C.Martín,andB.Rubio, ‘‘State-of-the-art,challenges,andopen issues in the integration of Internet of Things and cloud computing,’’ J. Netw. Comput. Appl., vol. 67, 99–117, May 2016.

Atlam, H., Walters, R. and Wills, G., 2018. Fog Computing and the Internet of Things: A Review. Big Data and Cognitive Computing, 2(2), p.10.

F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, ‘‘Fog computing: A platform for Internet of Things and analytics, in Big Data and Internet of Things”: A Roadmap for Smart Environments (Studies in Computational Intelligence). New York, NY, USA: Springer, 2014, pp. 169–186.

R. Roman, J. Lopez, and M. Manbo, “Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security, Threats and Challenges,” Futur. Gener. Comp. Syst., vol. 78, pp. 680–698, 2018.

Buchegger, S. and Le Boudec, J.Y., 2003. A robust reputation system for mobile ad-hoc networks (No. REP_WORK).

Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L.L., 2009, September. On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). Ieee.

Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005.

Stojmenovic I, Wen S (2014) “The fog computing paradigm: Scenarios and security issues” In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On. IEEE. pp 1–8

Stolfo, S.J., Salem, M.B. and Keromytis, A.D., 2012, May. Fog computing: Mitigating insider data theft attacks in the cloud. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on (pp. 125-128). IEEE.

Anawar, M.R., Wang, S., Azam Zia, M., Jadoon, A.K., Akram, U. and Raza, S., 2018. Fog computing: An overview of big IoT data analytics. Wireless Communications and Mobile Computing, 2018.

Sevak, B., 2013. Security against side channel attack in cloud computing. International journal of engineering and advanced technology (IJEAT), 2(2), p.183.

Alliance CS (2016) The Treacherous 12 Cloud Computing Top Threats in 2016.

Wang, C., Wang, Q., Ren, K. and Lou, W., 2010, March. Privacy-preserving public auditing for data storage security in cloud computing. In 2010 proceedings ieee infocom (pp. 1-9). Ieee.

Cao, R. and Yang, L., 2012. Decomposed LT codes for cooperative relay communications. IEEE Journal on selected areas in communications, 30(2), pp.407-414.

Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), pp.131-143.

Zhang, Y., Krishnan, R., Patwa, F. and Sandhu, R., 2019. Access Control in Cloud IaaS. Security, Privacy, and Digital Forensics in the Cloud, p.81.

Ruj, S., Nayak, A. and Stojmenovic, I., 2011, May. Distributed fine-grained access control in wireless sensor networks. In Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International (pp. 352-362). IEEE

Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: Preliminary framework and a case study. In: IRI. IEEE (2014)

Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9):1621–1631.

T1 - Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions- Georgakopoulos, Dimitrios, - Jayaraman, Prem Prakash,AU - Gao, Longxiang, - Xiang, Yong, - Ranjan.

M. E. Elhamahmy, H. N. Elmahdy, and I. A. Saroit, “A New Approach for Evaluating Intrusion Detection System,” Int. J. Artif. Intell. Syst. Mach. Learn., vol. 2, no. 11, pp. 290–298, 2010.

Ashraf, N., Ahmad, W. and Ashraf, R., 2018. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System. Annals of Emerging Technologies in Computing (AETiC), 2(1).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.