Abstract

With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues.

Highlights

  • As more systems start to rely on cloud computing, the need for new technologies that leverage the benefits of cloud computing but considered a lightweight solution without all the complexity of the cloud is needed to fit with the properties of lightweight systems such as Internet of things (IoT) systems

  • There are different definition for cloud computing but we can consider the definition provided by NIST as one of the most broad definition which define cloud computing as “a model for enabling convenient, on demand network access to a shared of pool configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” cloud computing provide three different service models which are infrastructure as a service (IaaS), platform as a service (Paas) and software as a service (SaaS)

  • It is employed in fog computing to detect and protect from attacks including Denial of Service (DoS), insider attacks, port scanning attacks, flooding attacks on virtual machine, man-in-the-middle attacks, hypervisors etc.the authors of [51] proposed a lightweight intrusion detection system based on a vector space representation using a Multilayer Perceptron (MLP) model

Read more

Summary

Introduction

IoT systems are Fog computing and Edge computing [4] These new technologies open doors to enhancement and growth of IoT systems it introduced several security and privacy issues that may affect deployment and usage of IoT systems. In [8], the authors survey security and privacy issues for edge computing and they classified the attacks based on the layer that the attack aims to effect. The following section will go over some of the security and privacy issues for the two technologies fallowed by countermeasure section where we will list some of the methods to mitigate these attacks for both fog and edge computing. In the last section we will provide a conclusion and a future work

A General Overview of Cloud Computing
Cloud Computing Service Models
Fog Computing Overview
Edge Computing Overview
Attacks in Fog Computing
Privacy Issues in Fog Computing
Security and Privacy Issues of Edge Computing
Countermeasures for Attacks in Fog Computing
Countermeasures for Attacks in Edge Computing
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.