scispace - formally typeset
Journal ArticleDOI

Fog Computing for the Internet of Things: Security and Privacy Issues

TLDR
The authors propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement and present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.
Abstract
The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently process data. The concept of fog computing has been introduced as a technology to bridge the gap between remote data centers and IoT devices. Fog computing enables a wide range of benefits, including enhanced security, decreased bandwidth, and reduced latency. These benefits make the fog an appropriate paradigm for many IoT services in various applications such as connected vehicles and smart grids. Nevertheless, fog devices (located at the edge of the Internet) obviously face many security and privacy threats, much the same as those faced by traditional data centers. In this article, the authors discuss the security and privacy issues in IoT environments and propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement. They also present potential research directions aimed at using fog computing to enhance the security and privacy issues in IoT environments.

read more

Citations
More filters
Journal ArticleDOI

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

TL;DR: A detailed review of the security-related challenges and sources of threat in the IoT applications is presented and four different technologies, blockchain, fog computing, edge computing, and machine learning, to increase the level of security in IoT are discussed.
Journal ArticleDOI

All one needs to know about fog computing and related edge computing paradigms: A complete survey

TL;DR: This paper provides a tutorial on fog computing and its related computing paradigms, including their similarities and differences, and provides a taxonomy of research topics in fog computing.
Journal ArticleDOI

Distributed attack detection scheme using deep learning approach for Internet of Things

TL;DR: The experiments have shown that the distributed attack detection system is superior to centralized detection systems using deep learning model, and it has been demonstrated that the deep model is more effective in attack detection than its shallow counter parts.
Journal ArticleDOI

A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT

TL;DR: The results of the evaluation show that performance is improved by reducing the induced delay, reducing the response time, increasing throughput, and the ability to detect real-time attacks in the IoT network with low performance overheads.
Journal ArticleDOI

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

TL;DR: The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture.
References
More filters
Book ChapterDOI

Security and Privacy Issues of Fog Computing: A Survey

TL;DR: Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks but with distinct characteristics that faces new security and privacy challenges besides those inherited from cloud computing.
Journal ArticleDOI

Energy Management-as-a-Service Over Fog Computing Platform

TL;DR: The scalability, adaptability, and open source software/hardware featured in the proposed platform enable the user to implement the energy management with the customized control-as-services, while minimizing the implementation cost and time-to-market.
Proceedings ArticleDOI

Policy-driven security management for fog computing: Preliminary framework and a case study

TL;DR: A policy-based management of resources in fog computing is proposed, expanding the current fog computing platform to support secure collaboration and interoperability between different user-requested resources in Fog computing.
Proceedings ArticleDOI

Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement

TL;DR: A hierarchy of P2P reputation systems is suggested to protect clouds and datacenters at the site level and to safeguard the data objects at the file-access level to protect cloud service models, currently implemented by Amazon, IBM, and Google.
Proceedings ArticleDOI

MobiShare: Flexible privacy-preserving location sharing in mobile online social networks

TL;DR: MobiShare is flexible to support a variety of location-based applications, in that it enables location sharing between both trusted social relations and untrusted strangers, and it supports range query and user-defined access control.
Related Papers (5)