Abstract

Internet of Things (IoT) is an emerging paradigm involving intelligent sensor networks that incorporates embedded technology for collecting data, communicating with external environments. Recently, cloud computing together with fog computing has become an important research area of the Internet of Things because of big data processing capabilities. It is a promising technology that utilizes cloud or fog computing / architecture to improve sensor computing, storage, and communication capabilities. However, recently it has been shown that this computing/architecture may be vulnerable to various attacks because of the openness nature of the wireless network. Therefore, it becomes more and more important to ensure the security and privacy in these scenes. Encryption security and information hiding technology can provide authentication, confidentiality, integrity, anti-eavesdropping, availability and so on for these computing models or architectures. The purpose of this review is to look for original articles with novel ideas and solutions to address encryption security and information hiding technologies in cloud or fog-based Internet of Things systems. We hope this review will provide an opportunity for scientists, researchers and industry engineers to study original manuscripts and know developments in all aspects of security, privacy, trust, and covert communication issues in cloud or fog computing/architecture Internet of Things systems.

Highlights

  • With the development of information technology, Internet of things (IoT) [Atzori, Iera and Morabito (2010)] is booming

  • Since the Cloud and Fog technology can provide new paradigms for the development of distributed, heterogeneous and complex systems that are characterized by large storage space, large amounts of data, high-end computing capabilities and interoperable networks, a system based on Cloud or Fog can provide different conveniences for IoT [Arfat, Aqib, Mehmood et al (2017)]

  • 3.2 Encryption security and information hiding technology in fog computing In Wang et al.’s [Wang, Zhang, Bhuiyan et al (2018)], a hierarchical trust mechanism based on fog is proposed to solve the defects of trust mechanism in order to solve these network security defects

Read more

Summary

Introduction

With the development of information technology, Internet of things (IoT) [Atzori, Iera and Morabito (2010)] is booming. IoT can connect sensors, controllers, machines, people and things together with the local networks or the Internet using wireless communications, which achieves information exchange, remote management control and intellisense [Kaur and Kaur (2017)]. This means that a large amount of data will be generated, and the management of sensitive outsourcing data will be a great challenge [Liu, Peng and Wang (2018)]. According to a report released by Forbes in 2015, security spending of CoT is expected to grow by 42% From this we can see that the security of cloud based IoT will be more and more important.

Abuse of cloud service
Related applications based on Cloud or Fog
Related applications based on the Cloud
Related applications based on Fog
Related works based on cloud security
Encryption security and information hiding technology in fog computing
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.