4.4 Article

A survey on privacy and access control schemes in fog computing

Journal

Publisher

WILEY
DOI: 10.1002/dac.4181

Keywords

access control; fog computing; privacy; secure data retrieval; secure data storage; security

Funding

  1. Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2019]
  2. Brazilian National Council for Research and Development (CNPq) [309335/2017-5]
  3. FCT-Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2019]

Ask authors/readers for more resources

This study focuses on the importance of privacy and access control issues in fog computing. It explores various privacy preserving and access control schemes, and proposes future research directions.
To provide reliable data storage and retrieval services to the end users, the cloud service provider implements secure data storage, sharing, and retrieval mechanisms. However, the aforesaid services provided by cloud have certain pitfalls, such as decision latency and real-time data computation. To address these aforementioned problems, fog computing was introduced for the purpose of providing cloud services at the network's edge. While this migration of the cloud services to the network's edge raises various security concerns, such as trust, authentication, mobility, intrusion, network security, and secure data computation. Among these concerns, the most critical issues that need immediate attention of researchers and practitioners are of privacy and access control in fog computing which are in direct relation to secure data storage and retrieval purposes. So, in order to highlight their importance for research community, this survey embodies to discuss, explain, and compare various privacy preserving and access control schemes in the context of fog computing for classifying and analyzing similarities and variances with respect to other researchers. Moreover, upon classification and analysis of these schemes, various open issues and future directions are also presented for researchers and practitioners for the purpose of enhancing security algorithms to address privacy and access control issues in fog computing.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available