4.6 Article

An Overview of Fog Computing and Edge Computing Security and Privacy Issues

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

Secure Deduplication-Based Storage Systems With Resistance to Side-Channel Attacks via Fog Computing

Youshui Lu et al.

Summary: This paper proposes a secure data deduplication system that uses fog computing and new techniques to solve two typical side-channel attacks, achieving better results than previous works.

IEEE SENSORS JOURNAL (2022)

Article Computer Science, Information Systems

Complying With Data Handling Requirements in Cloud Storage Systems

Martin Henze et al.

Summary: Cloud storage systems have seen a significant increase in usage in recent years, but current systems do not meet regulatory, organizational, or contractual data handling requirements. PRADA introduces a transparent data handling layer to address this issue and enable cloud storage systems to comply with various data handling requirements.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things

Abdulmalik Alwarafy et al.

Summary: This article conducts a comprehensive survey on security and privacy issues in the context of EC-assisted IoT, including definitions, attack classifications, solutions, and open challenges. Furthermore, it provides future research directions for the secure EC-assisted IoT paradigm.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary et al.

Summary: Fog computing is an emerging computing paradigm that has gained attention in recent years for deploying IoT applications. Security and privacy concerns, including authentication, threats, access control, and privacy protection techniques, need to be addressed to ensure the necessary level of trust in Fog devices. Various research challenges and directions for future study in the field of secure Fog computing are discussed in the context of Blockchain-based solutions.

ELECTRONICS (2021)

Article Computer Science, Information Systems

Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

Farouq Aliyu et al.

Summary: The paper proposes an anomaly-based Intrusion Detection and Prevention System (IDPS) in fog computing to detect Man-in-the-Middle (MITM) attacks. By utilizing Intrusion Detection System (IDS) nodes and Exponentially Weighted Moving Average (EWMA), the system achieves a higher accuracy of 95% and faster intrusion detection of 0.25-0.5 seconds, although with a latency impact of 0.75-1.3 seconds on fog node services. Additionally, the lightweight nature of EWMA does not increase the energy overhead of the system.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Hardware & Architecture

Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number

Jianan Hong et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Engineering, Electrical & Electronic

Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework

Rojalina Priyadarshini et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

A Reliable Trust Computing Mechanism Based on Multisource Feedback and Fog Computing in Social Sensor Cloud

Junbin Liang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Artificial Intelligence

An Architecture for QoS-Aware Fog Service Provisioning

Elarbi Badidi et al.

11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS (2020)

Review Telecommunications

Security Issues in Fog Environment: A Systematic Literature Review

Jasleen Kaur et al.

INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS (2020)

Article Computer Science, Information Systems

Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning

Ahmed Samy et al.

IEEE ACCESS (2020)

Article Telecommunications

A survey of edge computing-based designs for IoT security

Kewei Sha et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Engineering, Civil

An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks

Jie Cui et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2019)

Article Engineering, Electrical & Electronic

Privacy Techniques for Edge Computing Systems

Fang-Yu Rao et al.

PROCEEDINGS OF THE IEEE (2019)

Article Engineering, Electrical & Electronic

Edge Computing Security: State of the Art and Challenges

Yinhao Xiao et al.

PROCEEDINGS OF THE IEEE (2019)

Article Engineering, Electrical & Electronic

A Survey of Virtual Machine Management in Edge Computing

Zeyi Tao et al.

PROCEEDINGS OF THE IEEE (2019)

Article Chemistry, Multidisciplinary

A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing

Belal Sudqi Khater et al.

APPLIED SCIENCES-BASEL (2019)

Article Telecommunications

A Mechanism for Securing IoT-enabled Applications at the Fog Layer

Nadeem Abbas et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)

Article Computer Science, Information Systems

Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges

Ruizhe Yang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Security and Privacy Issues in Cloud, Fog and Edge Computing

Shalin Parikh et al.

10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS (2019)

Article Computer Science, Information Systems

Trust Management Techniques for the Internet of Things: A Survey

Ikram Ud Din et al.

IEEE ACCESS (2019)

Article Computer Science, Theory & Methods

Security and trust issues in Fog computing: A survey

PeiYun Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A scalable distributed machine learning approach for attack detection in edge computing environments

Rafal Kozik et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)

Article Computer Science, Information Systems

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues

Jiale Zhang et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions

Ranesh Kumar Naha et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing

Farouq Aliyu et al.

9TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2018) / 8TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2018) (2018)

Article Computer Science, Information Systems

Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack

Shanshan Tu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Survey on Mobile Edge Computing: The Communication Perspective

Yuyi Mao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Software Engineering

Fog Computing for the Internet of Things: Security and Privacy Issues

Arwa Alrawais et al.

IEEE INTERNET COMPUTING (2017)

Article Computer Science, Interdisciplinary Applications

Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus

Sandeep K. Sood et al.

COMPUTERS IN INDUSTRY (2017)

Review Computer Science, Information Systems

Fog computing security: a review of current applications and security solutions

Saad Khan et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)

Article Automation & Control Systems

A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems

Tiago Cruz et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)

Review Computer Science, Information Systems

Fog and IoT: An Overview of Research Opportunities

Mung Chiang et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Interdisciplinary Applications

Cloud computing and education: A state-of-the-art survey

Jose A. Gonzalez-Martinez et al.

COMPUTERS & EDUCATION (2015)

Article Computer Science, Theory & Methods

A Survey of Security Issues in Hardware Virtualization

Gabor Pek et al.

ACM COMPUTING SURVEYS (2013)

Review Computer Science, Hardware & Architecture

A survey of intrusion detection techniques in Cloud

Chirag Modi et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)