Call for Paper
CAE solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 30, 2023.
Privacy and Security Problems in Fog Computing
Khalid A Fakeeh. Article: Privacy and Security Problems in Fog Computing. Communications on Applied Electronics 4(6):1-7, March 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX
@article{key:article, author = {Khalid A. Fakeeh}, title = {Article: Privacy and Security Problems in Fog Computing}, journal = {Communications on Applied Electronics}, year = {2016}, volume = {4}, number = {6}, pages = {1-7}, month = {March}, note = {Published by Foundation of Computer Science (FCS), NY, USA} }
Abstract
Fog Computing is a term made by Cisco that insinuates extending cloud computing to the edge of a network. Generally called Edge Computing or preliminaries, fog computing supports the operation of Fog/cloud, storage and networking services between end devices and conveyed processing data centers. Fog computing is a gifted computing perspective that extends cloud computing to the edge of frameworks/networks. Like cloud computing however with specific characteristics, fog computing faces new-fangled security and assurance defies other than those procured from cloud computing. We have reviewed these defies/concerns and prospective plans briefly in this paper.
References
- ”Dsouza et al ”, Policy-driven security management for fog computing: Preliminary framework and a case study, IRI. IEEE (2014)
- ”Dwork”, Di erential privacy, An Encyclopedia of Cryptography and Security. Springer (2011)
- ”Bonomi et al”, Fog computing and its role in the internet of things, workshop on Mobile cloud computing. ACM (2012) [4] ”Han et al”, A timing-based scheme for rogue ap detection, TPDS 22 (2011)
- ”Bouzefrane et al”, Cloudlets authentica-tion in nfc-based mobile computing, MobileCloud. IEEE (2014)
- ”Cash et al”, Dynamic searchable encryption in very-large databases: Data structures and implementation, NDSS. vol. 14 (2014)
- ”Damiani et al”, A reputation-based approach for choosing reliable resources in peer-to-peer networks, CCS. ACM (2002) [8] ”Balfanz et al”, Talking to strangers, Au-thentication in ad-hoc wireless networks, NDSS (2002)
- ”Dinh et al”, A survey of mobile cloud computing: architecture, applications, and approaches. WCMC 13 (2013)
- ”ETSI”, http://goo.gl/7NwTLE (2014) [11] ”Cao et al”, Privacy-preserving multi-keyword ranked search over encrypted cloud data. TPDS 25 (2014)
- ”Cao et al”, Lt codes-based secure and reliable cloud storage service. In: INFOCOM. IEEE (2012)
- ”Gao et al”, Location privacy in database-driven cog-nitive radio networks: Attacks and countermeasures, INFOCOM. IEEE (2013)
- ”Gil Press 2015”, http://goo.gl/zFujnE.
- ”Lu et al”,An efficient and privacy-preserving aggregation scheme for secure smart grid communications. TPDS 23 (2012) [16] ”Zhu et al”, Improving web sites performance using edge servers in fog computing architecture, SOSE. IEEE (2013)
- ”Zissis et al”, Addressing cloud computing security issues, Future Gener-ation computer systems 28 (2012)
- ”Han et al”, A measurement based rogue ap detection scheme, INFOCOM. IEEE (2009)
- ”J sang et al”, A survey of trust and reputation systems for online service provision, Decision support systems (DSS) 43 (2007) [20] ”McLaughlin et al”, Protecting consumer privacy from electric load monitoring, CCS. ACM (2011)
- ”Klaedtke et al”, Access control for sdn controllers, HotSDN. vol. 14 (2014)
- ”McKeown et al”, Open ow: enabling innovation in campus networks, ACM SIGCOMM CCR 38 (2008)
- ”Gennaro et al”, Non-interactive verifiable computing: Out-sourcing computation to untrusted workers, CRYPTO, Springer (2010) [24] ”Willis et al”, a multi-tenant platform for dynamically installed third party services on home gateways, SIGCOMM work-shop on Distributed cloud computing, ACM (2014)
- ”Yang et al”, Data storage auditing service in cloud computing, challenges, methods and opportunities, WWW 15 (2012) [26] ”Wang et al”, Privacy-preserving public auditing for data storage security in cloud computing, INFOCOM. IEEE (2010)
- ”Wei et al”, Flexible privacy-preserving location sharing in mobile online social networks, INFOCOM. IEEE (2012)
- ”Modi et al”, A survey of intrusion detection techniques in cloud., Journal of Network and Computer Applications 36 (2013) [29] ”Yap et al”, Separating authentication, access and accounting, A case study with openwi, open Networking Foundation, Tech. Rep (2011)
- ”Yu et al”, Achieving secure, scalable, and fine-grained data access control in cloud computing, INFOCOM. IEEE (2010)
- ”Parno et al”, Nearly practical verifiable computation, Security and Privacy, IEEE (2013) [32] ”Stojmenovic et al”, The fog computing paradigm, Scenarios and security issues, FedCSIS. IEEE (2014)
- ”Wang et al”, Enabling secure and e cient ranked keyword search over outsourced cloud data. TPDS 23 (2012)
- ”Ha et al”, Towards wearable cognitive assistance, Mobisys. ACM (2014)
- ”Valenzuela et al”, Real-time intrusion detection in power system operations, Power Systems, IEEE Transactions on 28 (2013)
- ”Zao et al”, Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology, Frontiers in human neuroscience 8 (2014)
- ”Zhang et al”, Cloud computing: state-of-the-art and research challenges, Journal of internet services and applications 1 (2010) [38] ”Takabi et al”, Security and privacy challenges in cloud com-puting environments, IEEE Security and Privacy 8 (2010)
- ”Vaquero et al”, Finding your way in the fog, Towards a comprehensive definition of fog computing, ACM SIGCOMM CCR 44 (2014) [40] ”Qin et al”, Defending against unidenti able attacks in electric power grids, TPDS 24 (2013)
- ”Shin et al”, Network security monitoring using open flow in dynamic cloud networks. In: ICNP. IEEE (2012)
- ”Qin et al”, Preserving secondary users' privacy in cognitive radio networks, INFOCOM, 2014 Proceedings IEEE. IEEE (2014)
- ”Novak et al”, Near-pri: Private, proximity based location sharing, INFO-COM. IEEE (2014)
- ”Satyanarayanan et al”,The case for vm-based cloudlets in mobile computing, Pervasive Computing 8 (2009)
- ”Tsugawa et al”, Cloud computing security, What changes with software-defined networking?, Secure Cloud Computing. Springer (2014)
- ”Satyanarayanan et al”, An open ecosystem for mobile-cloud convergence, Communications Magazine 53 (2015) [47] ”Rial et al”, Privacy-preserving smart metering, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society. ACM (2011)
- ”Song et al”, Practical techniques for searches on encrypted data, Security and Privacy, IEEE (2000)
- ”Shi et al”, Cloudlet mesh for securing mobile clouds from intrusions and network attacks, Mobile Cloud (2015)
Keywords
Cloud computing, Fog computing, IoT, Security, Confidentiality