A Survey of Security in Cloud, Edge, and Fog Computing
Abstract
:1. Introduction
2. Background on Computing Paradigms
2.1. Cloud-Related Aspects
2.2. Edge-Related Aspects
2.3. Fog-Related Aspects
2.4. Differences and Similarities of Paradigms
3. Security and Privacy of Computing Paradigms
3.1. Cloud-Related Aspects
3.1.1. Cloud Data Security
3.1.2. Cloud Data Privacy
- Trust: Disclosing data of an individual or organization is considered a breach of privacy. Trust plays a very pivotal role in decreasing or eliminating fear [59]. There are various trust standards every customer can agree to, but in general, their concern is to see minimal or zero breaches of privacy at a reasonable scale [60].
- Access Control: Cloud systems present massive issues, such that an unauthorized person or group of individuals can obtain access if not properly addressed. An effective way of handling this is by answering the questions [61]:
- -
- Who? The privileged persons to access certain data and who not to.
- -
- What? Some detailed data are not made accessible to every worker. So what specific files are permitted for whom?
- -
- When? Some data are needed for a period of time, and that period must strictly be controlled when that information has been accessed.
These can be made functional by establishing management policies, checks on multi-domain, and providing strong management keys. - Encryption of data needs to be sufficiently strong to protect the privacy of the client’s files. Weak encryption of data poses a serious challenge to Cloud privacy [61].
3.2. Edge-Related Aspects
3.2.1. Edge Data Security
- Confidentiality, in the case of mobile clients intending to use the services of mobile applications, is always taken seriously, and for this reason, some clients find it difficult to decide whether to use it [69]. The authors of [70] list some shortcomings relating to Edge computing confidentiality, showing a very high risk posed by the providers of services gaining unpermitted passage to classified information. This occurs during data transmission in a distributed or unsecured network later stored and processed in the Edge distributed network. Data security has constantly been breached. Good enough, restricting access today to project confidentiality is achievable due to some newly created mechanisms [71].
- Detecting Attacks: Edge systems can operate smoothly with the assistance of Edge nodes where the Edge applications are located to offer maximum standard services. This ensures that the entire Edge system is free from abnormalities or threats. The Edge node consists of harsh surroundings with an inadequate security guarantee, exposing the Edge nodes to threats. The performance of an Edge system can massively be hindered when the threats from one Edge node are mismanaged and might subsequently extend to another Edge node. Thus, finding a quick solution can be hard because of the weight of the threat that spreads across the Edge nodes. Furthermore, added costs would be incurred to find the baseline reason for the problem, and even recovery might take a while [72]. Therefore, regular checks must be performed to detect any previous potential or imminent attacks.
3.2.2. Edge Data Privacy
- Protection of Data Privacy: At the Edge nodes, huge amounts of data belonging to clients are retrieved from applications and other users’ pieces of equipment. This collected information is then processed and analyzed. Despite the trustworthiness of the Edge computing nodes, they can still display some level of vulnerability. Classified information such as an individual’s medical data must be top secret. Therefore, information privacy protection is very important to avoid leakage at the nodes of Edge computing [75].
- Identity Privacy: Compared to the Cloud systems, especially Mobile Cloud, Edge models still lack adequate research attention in protecting the identity of customers well. Identity privacy protection is a major concern for several organizations and even individual customers. The third-party identity-designed model is said to still pose vulnerability [76].
- Location Privacy: Several software and services from Worldwide Web render functional capabilities based on location. For a client to gain access when they want to use the services in Edge computing, that client must deliver their location as required by the service provider [77,78]. One of the particularly concerning fears is breaching data location through possible leaks. Different researchers gave some solution schemes on how to deal with issues on data leakage. A dynamic distribution in location privacy protection was presented in a mobile model of social internet platforms. This model can sort out visitors with low trust levels within a certain range of social interactions. It performs this by dividing customers’ data location (unidentifiable) and personalities in individual storage systems. This separation enables the service provider to hide customers’ location data safely. The importance of this model is that even if an attacker manages to breach one of the storage facilities, for example, data location, it will not pose a major threat since the identity of the client is not leaked or exposed [79].
3.3. Fog-Related Aspects
3.3.1. Fog Data Security
3.3.2. Fog Data Privacy
4. Main Security and Privacy Challenges
4.1. Cloud Paradigm Challenges
- Multi-tenancy is used in providing services to different customers and organizations with a particular software operating on the SaaS provider’s servers within the architectural design. Every user company can use an application that is virtually designed in dividing data and configuring it virtually with the help of specially designed software. In this SaaS model, there is a high risk of vulnerability because clients turn to work with applications of multi-tenancy manufactured by Cloud Service Providers (CSP). The maximum-security of customer’s data is the direct responsibility of the Cloud provider since sensitive information such as financial and individual data are hosted in their Cloud system [55].Managing resources and scheduling work are some methods used by certain Cloud providers [98], but hardware potential is fully attained through virtualization by CSPs providers. Sandboxed setups refer to Virtual Machines (VM)being completely separate. Hardware sharing with the clients is considered safe according to this mindset. On the other hand, cybercriminals can gain access to the host when the sandboxed system has security setbacks [99]. The virtualization software is strongly recommended since it is capable of showing recent vulnerabilities in Cloud security, such as retrieving data by targeting a VM on one machine through attacks through cross-Virtual Machine side channel [100].
- Data Integrity: Security attention is greatly put on data integrity in the Cloud, which means any reply to a data request sent must be from someone with an access privilege. Establishing a general basic data integrity standard is important, though it is not still in place [101]. Trust is one of those many values that clients are expected to demonstrate in the computing facet. Today, a lot of companies or institutions encounter the issue of trust, and this hugely impacts the handling of their data [102].
- Unauthorized Access: One of the most vulnerable aspects of Cloud computing is giving unauthorized access to management platforms and resources. Users are exposed to this due to the shared technologies often involved in Cloud services. An acceptable way of mitigating the security solution of such a scenario is by introducing access control, and this helps in securing the client’s personal information and its domain for privacy [103]. It is worth noting that cybercriminals can simply have unauthorized access to Cloud service systems because of a single-style authentication model and not very strong authentication mechanisms being used [104].
- Data loss and Leakage: The low cost of Cloud services is one reason customers turn to migrate to the Cloud, and it is warned that customers should pay attention to their important information since various diverse aspects can easily breach their data security. There is an increased chance of data leakage or loss due to high traffic and usage of the Cloud. The vulnerabilities and threats in Cloud service are undeniable, posing a great security threat to businesses and institutions. Significantly, it can be frustrating when you cannot retrieve and restore data after accidentally deleting files from the Cloud due to a lack of a backup system [105].
- Malicious Insider: Every organization has different rules and regulations regarding recruitment policies and employee information. However, some employees have higher status, which guarantees them the privilege of accessing certain essential data within the company. Based on CSA, they proposed the implementation of transparency in the general data security and management activities standard, outlining notification procedures during security failures, while using Service Level Agreement (SLA) as a demand for human resource, and finally establishing and exercising strict rules in the management of supply chain [105].It may be far easier for a person with malicious ideas to work for a CSP since no one is seen as a suspect [106]. This individual can quickly be involved in malicious events, especially if they have unhindered access to sensitive information, especially if the CSP cannot strictly monitor its workers.
- Identity Theft: Victims or organizations can suffer heavy impact due to weak passwords due to phishing attacks by some attackers who turn to disguise as authentic persons to steal the different important data of their victims. The sole reason for identity theft is to gain access to sensitive digital resources of individuals and companies by any malicious means. Every protected communication within the Cloud system happens with access control, and this is made possible using an encryption key [107].
- Man-in-the-Middle Attack: During the flow of data from one end to another or between different systems, cybercriminals can easily take advantage and gain access, therefore having control of classified data. This can easily occur when the secure socket layer (SSL) is insecure due to inadequate configuration. Specifically, in Cloud systems, hackers can attack the communication within the information centers. Efficient SSL configuration and data analysis among accepted entities can go a long way to significantly lower the threat posed by a middle-man attacker [108].
- The DoS attack aims to limit or stop the execution of service and from accessing needed data. This creates a scenario where actual users partially or fully lack service availability. Whenever the right person uses the Cloud services to reach the data server to access information, access is denied. This happens because the attacker uses a method in which he constantly congests the server of a precise resource through request flooding, and the targeted server will then be unable to reply to a legitimate access request. There exist several ways this attack can be performed, for example, by way of SQL injection attack, bandwidth wastage, and also by way of incorrectly using model resources [109].
- Phishing Attack is one of the most common attacks in which the criminal turns to impersonate and deceive their victims by leading them to malicious links. The presence of the Cloud makes it flexible for hackers to hide their Cloud hosting of numerous accounts of different clients that uses Cloud services using phishing activities. There are two kinds of threat divisions in which phishing can be grouped. Primary, irresponsible attitude whereby a cybercriminal can also make full use of Cloud services to simply host a site for a phishing attack. Secondary, Cloud computing services and their many accounts can be hijacked [110].
4.2. Edge Paradigm Challenges
- Data Injection: When a machine is vulnerable, an attacker can push harmful information to share negative information. The act of injecting dangerous data by a malicious attacker into a device is known as poisoning. Data can be faked, then used to create fraudulent messages to render the nodes of the target compromised, and it is called an external forgery, for example, in a modern digital industrial production line where the adversary happens to give false machine readings, therefore causing severe functional changes with the bad aim to harm the devices [65].
- Eavesdropping: In this scenario, an attacker can mask itself and observe network traffic during transmission and capture data illegally. It is quite hard to point out this type of attack because the attacker happens to hide inside the platform [111].
- Privacy Leakage: The absence of strict access control to the node of Edge can easily lead to data privacy being tampered with. However, the attack strength is very low. The information generated from devices situated at Edge proximity is stored and processed in the Edge data building. Customers classified these Edge data buildings can leak information since the content is known [112].
- Distributed DoS: Attackers usually take advantage of network protocol vulnerabilities to launch attacks on Edge nodes, causing network damage and restricting resource access and provision of services. Attackers carry out these attacks by loading the server with many data packets to shut down the channel by jamming the server’s bandwidth. Another option is where the Cloud data server or the Edge systems are being flooded with data packets to massively take out resources [65].
- Permission and Access Control: Unauthorized access is a major challenge in the Edge paradigm. It is important to know an individual or employee before authorizing them to access any sensitive information in the system. It can be achieved by establishing access control protocols. Connectivity between several pieces of equipment and other services can be considered secured when access control measures and permission are implemented [113].
4.3. Fog Paradigm Challenges
- Trust Issue: Fog systems face trust design challenges due to the reciprocal demand for trust and the distributed nature of their network. Cloud computing platforms are different since they already consist of pre-designed security models that match the industrial security requirements, granting customers and enterprises some trust measures within the Cloud system. However, this is not so with Fog computing networks which are more exposed and liable to security and privacy attacks. Even though the same security mechanism can be deployed to every Fog node that makes up the Fog computing network, the distributed design also makes it quite challenging to resolve the trust problem [24].
- Malware Attacks: Infecting the Fog computing system with a malware attack is a very high-level challenge in the network. It is carried out to steal sensitive data, breach confidential information, and even refuse service with the help of a virus, spyware, Trojan horse, or Ransomware. To assist Fog computing applications in mitigating these malicious attacks, authentic defense mechanisms for virus or worm detection and advanced anti-malware must be introduced [114].
- Computation—Data Processing: Fog nodes often receive data collected from end-user equipment, processed, sent to the Cloud system, or end-user pieces of equipment are forwarded information transmitted from the Cloud. After the various processes, the data sent from end-users to Cloud systems and the data sent from Fog nodes to the Cloud are different in size and nature. Another challenge here is that several providers have these Fog nodes, making them hard to be trusted due to the many security and privacy shortcomings arising after the processing of data [115].
- Node Attack: Here, the attacker engages physically by targeting to capture the vulnerable nodes. There are moments when the attacker can decide to alter the whole node, cause defects to the hardware, or steal sensitive information from the Fog nodes by digitally sending messages and causing sensor nodes distortion of classified data. Such attacks can have damaging effects on the nodes of the Fog network, and observing these node sensors will help identify issues and deploy some node capturing defense of algorithmic cryptography [114].
- Privacy Preservation: There is a huge concern as customers using CSP, IoT, and wireless systems face data leaks of personal information. It is not easy to preserve this privacy in the Fog network due to the closeness of Fog nodes to the customers’ environment, and it can also facilitate gathering plenty of vital information such as identity, location, and utility usages. Privacy leakage can also occur when communication between Fog nodes becomes more frequent [94].
4.4. Major Attacks and Countermeasures
5. Discussion and Conclusions
- Review Methodology: The systematic literature review is based on PRISMA guidelines [10]. The publication date range was set from 2017 to 2021. We used the most popular ICT sector databases for research works, such as IEEE, Web of Science, Science Direct, Springer, and Scopus, while not considering pre-prints, duplicates, and gray literature. Later on, we analyzed the titles, abstracts, and keywords of the various academic publications to figure out specific journal articles and other important papers related to security and privacy in Cloud, Edge, and Fog paradigms. The following search query was formulated for reproducibility:
- Not related to security and privacy in Cloud, Edge, and Fog computing;
- Not in English;
- Works with no technical content;
- Purely review papers;
- Full text not available.
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Abbreviations
5G | 5th Generation Networks |
AES | Advanced Encryption Standard |
AP | Access Point |
APT | Advanced Persistent Threats |
AR | Augmented Reality |
BE | Back End |
BLE | BLuetooth Low Energy |
BS | Base station |
CCTV | Closed-circuit television |
CSA | Cloud Security Alliance |
CSP | Cloud service providers |
DDoS | Distributed Denial of Service |
DoS | Denial of Service |
FE | Front End |
FN | Fog Nodes |
GCM | Galois/Counter Mode |
HTTP | Hypertext Transfer Protocol |
LTE | Long Term Evolution |
IaaS | Infrastructure as a service |
IBC | Identity Based Cryptography |
IBE | Identity-Based Encryption |
ICT | Information and Communication Technology |
IDS | Intrusion Detection System |
IoE | Internet of Everything |
IoWT | Internet of Wearable Things |
MAC | Mediul Access Control |
MITM | Man-in-the-Middle Attack |
MR | Mixed Reality |
NIST | National Institute of 66 Standards and Technology |
OS | Operating System |
OSI | Open Systems Interconnection model |
PaaS | Platform as a Service |
PKI | Public Key Infrastructure |
PRISMA | Preferred Reporting Items for Systematic Reviews and Meta-Analyses |
QoS | Quality of Service |
SaaS | Software as a Service |
SLA | Service Level Agreement |
SQL | Structured Query Language |
SSL | Secure Socket Layer |
SYN | SYNchronize message |
TCP | Transmission Control Protocol |
TIP | threat intelligence Platform |
TLS | Transport Layer Security |
UDP | User Datagram Protocol |
V2X | Vehicle-to-Vehicle |
VM | Virtual Machines |
VR | Virtual Reality |
WAF | Web Application Firewalls |
Wi-Fi | Wireless Fidelity |
References
- Chalapathi, G.S.S.; Chamola, V.; Vaish, A.; Buyya, R. Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions. In Fog/Edge Computing For Security, Privacy, and Applications; Springer: Cham, Switzerland, 2021; pp. 293–325. [Google Scholar]
- Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Survey on Multi-Access Edge Computing Security and Privacy. IEEE Commun. Surv. Tutor. 2021, 23, 1078–1124. [Google Scholar] [CrossRef]
- Alhroob, A.; Samawi, V.W. Privacy in Cloud Computing: Intelligent Approach. In Proceedings of the International Conference on High Performance Computing Simulation (HPCS), Orléans, France, 16–20 July 2018; pp. 1063–1065. [Google Scholar]
- Parikh, S.; Dave, D.; Patel, R.; Doshi, N. Security and Privacy Issues in Cloud, Fog and Edge Computing. Procedia Comput. Sci. 2019, 160, 734–739. [Google Scholar] [CrossRef]
- Aljumah, A.; Ahanger, T.A. Fog Computing and Security Issues: A Review. In Proceedings of the 7th International Conference on Computers Communications and Control (ICCCC), Oradea, Romania, 8–12 May 2018; pp. 237–239. [Google Scholar]
- Ometov, A.; Chukhno, O.; Chukhno, N.; Nurmi, J.; Lohan, E.S. When Wearable Technology Meets Computing in Future Networks: A Road Ahead. In Proceedings of the 18th ACM International Conference on Computing Frontiers, Virtual Event, Italy 11–13 May 2021; pp. 185–190. [Google Scholar]
- Guilloteau, S.; Venkatesen, M. Privacy in Cloud Computing-ITU-T Technology Watch Teport March 2012; International Telecommunication Union: Geneva, Switzerland, 2013. [Google Scholar]
- Cook, A.; Robinson, M.; Ferrag, M.A.; Maglaras, L.A.; He, Y.; Jones, K.; Janicke, H. Internet of Cloud: Security and Privacy Issues. In Cloud Computing for Optimization: Foundations, Applications, and Challenges; Springer: Berlin/Heidelberg, Germany, 2018; pp. 271–301. [Google Scholar]
- Xiao, Z.; Xiao, Y. Security and Privacy in Cloud Computing. IEEE Commun. Surv. Tutor. 2013, 15, 843–859. [Google Scholar] [CrossRef]
- PRISMA Guidelines. Available online: http://www.prisma-statement.org/ (accessed on 21 December 2021).
- Nieuwenhuis, L.J.; Ehrenhard, M.L.; Prause, L. The Shift to Cloud Computing: The Impact of Disruptive Technology on the Enterprise Software Business Ecosystem. Technol. Forecast. Soc. Chang. 2018, 129, 308–313. [Google Scholar] [CrossRef]
- NIST Special Publication 800-145: Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf (accessed on 21 December 2021).
- Five Characteristics of Cloud Computing. Available online: https://www.controleng.com/articles/five-characteristics-of-cloud-computing/ (accessed on 21 December 2021).
- Application Management in the Cloud. Available online: http://www.sciencedirect.com/science/article/pii/B9780128040188000048 (accessed on 21 December 2021).
- Cloud Computing. Available online: https://masterworkshop.skillport.com/skillportfe/main.action?assetid=47045 (accessed on 21 December 2021).
- Spatharakis, D.; Dimolitsas, I.; Dechouniotis, D.; Papathanail, G.; Fotoglou, I.; Papadimitriou, P.; Papavassiliou, S. A Scalable Edge Computing Architecture Enabling Smart Offloading for Location Based Services. Pervasive Mob. Comput. 2020, 67, 101217. [Google Scholar] [CrossRef]
- Jadeja, Y.; Modi, K. Cloud Computing—Concepts, Architecture and Challenges. In Proceedings of the International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Nagercoil, India, 21–22 March 2012; pp. 877–880. [Google Scholar]
- Satyanarayanan, M. Edge Computing. Computer 2017, 50, 36–38. [Google Scholar] [CrossRef]
- Edge Computing Learning Objectives. Available online: https://www.cloudflare.com/en-gb/learning/serverless/glossary/what-is-edge-computing/ (accessed on 21 December 2021).
- Edge Computing—What Is Edge Computing? Available online: https://stlpartners.com/edge-computing/what-is-edge-computing/ (accessed on 21 December 2021).
- Gezer, V.; Um, J.; Ruskowski, M. An Extensible Edge Computing Architecture: Definition, Requirements and Enablers. In Proceedings of the UBICOMM, Barcelona, Spain, 12–16 November 2017. [Google Scholar]
- Mäkitalo, N.; Flores-Martin, D.; Berrocal, J.; Garcia-Alonso, J.; Ihantola, P.; Ometov, A.; Murillo, J.M.; Mikkonen, T. The Internet of Bodies Needs a Human Data Model. IEEE Internet Comput. 2020, 24, 28–37. [Google Scholar] [CrossRef]
- Sarkar, S.; Misra, S. Theoretical Modelling of Fog Computing: A Green Computing Paradigm to Support IoT Applications. IET Netw. 2016, 5, 23–29. [Google Scholar] [CrossRef] [Green Version]
- Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and Privacy in Fog Computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar] [CrossRef]
- Ometov, A.; Olshannikova, E.; Masek, P.; Olsson, T.; Hosek, J.; Andreev, S.; Koucheryavy, Y. Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective. IEEE Access 2016, 4, 7692–7702. [Google Scholar] [CrossRef]
- Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge Computing Security: State of the Art and Challenges. Proc. IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
- Kozyrev, D.; Ometov, A.; Moltchanov, D.; Rykov, V.; Efrosinin, D.; Milovanova, T.; Andreev, S.; Koucheryavy, Y. Mobility-Centric Analysis of Communication Offloading for Heterogeneous Internet of Things Devices. Wirel. Commun. Mob. Comput. 2018, 2018, 3761075. [Google Scholar] [CrossRef]
- Jiang, C.; Cheng, X.; Gao, H.; Zhou, X.; Wan, J. Toward Computation Offloading in Edge Computing: A Survey. IEEE Access 2019, 7, 131543–131558. [Google Scholar] [CrossRef]
- Dolui, K.; Datta, S.K. Comparison of Edge Computing Implementations: Fog Computing, Cloudlet and Mobile Edge Computing. In Proceedings of the Global Internet of Things Summit (GIoTS), Geneva, Switzerland, 6–9 June 2017; pp. 1–6. [Google Scholar]
- Mäkitalo, N.; Aaltonen, T.; Raatikainen, M.; Ometov, A.; Andreev, S.; Koucheryavy, Y.; Mikkonen, T. Action-Oriented Programming Model: Collective Executions and Interactions in the Fog. J. Syst. Softw. 2019, 157, 110391. [Google Scholar] [CrossRef]
- Stojmenovic, I.; Wen, S.; Huang, X.; Luan, H. An Overview of Fog Computing and Its Security Issues. Concurr. Comput. Pract. Exp. 2016, 28, 2991–3005. [Google Scholar] [CrossRef]
- NIST Special Publication 500-325: Fog Computing Conceptual Model Recommendations of the National Institute of Standards and Technology. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.500-325.pdf (accessed on 21 December 2021).
- Ometov, A.; Shubina, V.; Klus, L.; Skibińska, J.; Saafi, S.; Pascacio, P.; Flueratoru, L.; Gaibor, D.Q.; Chukhno, N.; Chukhno, O.; et al. A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges. Comput. Netw. 2021, 193, 108074. [Google Scholar] [CrossRef]
- Mahmood, Z.; Ramachandran, M. Fog Computing: Concepts, Principles and Related Paradigms. In Fog Computing; Springer International Publishing: Cham, Switzerland, 2018; pp. 3–21. [Google Scholar]
- Qaim, W.B.; Ometov, A.; Molinaro, A.; Lener, I.; Campolo, C.; Lohan, E.S.; Nurmi, J. Towards Energy Efficiency in the Internet of Wearable Things: A Systematic Review. IEEE Access 2020, 8, 175412–175435. [Google Scholar] [CrossRef]
- IEEE Std 1934-2018; IEEE Standard for Adoption of OpenFog Reference Architecture for Fog Computing; IEEE: New York, NY, USA, 2018; pp. 1–176.
- Peng, M.; Yan, S.; Zhang, K.; Wang, C. Fog-Computing-based Radio Access Networks: Issues and Challenges. IEEE Netw. 2016, 30, 46–53. [Google Scholar] [CrossRef] [Green Version]
- Naha, R.K.; Garg, S.; Georgakopoulos, D.; Jayaraman, P.P.; Gao, L.; Xiang, Y.; Ranjan, R. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions. IEEE Access 2018, 6, 47980–48009. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- OpenFog Consortium. OpenFog Reference Architecture for Fog Computing; OpenFog Consortium: Fremont, CA, USA, 2017; pp. 1–162. [Google Scholar]
- Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on Fog Computing: Architecture, Key Technologies, Applications and Open Issues. J. Netw. Comput. Appl. 2017, 98, 27–42. [Google Scholar] [CrossRef]
- OpenFog Consortium Architecture Working Group. OpenFog Architecture Overview. White Pap. OPFWP001 2016, 216, 35. [Google Scholar]
- De Donno, M.; Tange, K.; Dragoni, N. Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog. IEEE Access 2019, 7, 150936–150948. [Google Scholar] [CrossRef]
- Fog Computing: An Overview of Big IoT Data Analytics. Available online: https://www.hindawi.com/journals/wcmc/2018/7157192/#references (accessed on 21 December 2021).
- Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog Computing and Its Role in the Internet of Things. In Proceedings of the MCC workshop on Mobile Cloud Computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
- Chiang, M.; Zhang, T. Fog and IoT: An Overview of Research Opportunities. IEEE Internet Things J. 2016, 3, 854–864. [Google Scholar] [CrossRef]
- Khan, S.U. The Curious Case of Distributed Systems and Continuous Computing. IT Prof. 2016, 18, 4–7. [Google Scholar] [CrossRef]
- Anawar, M.R.; Wang, S.; Azam Zia, M.; Jadoon, A.K.; Akram, U.; Raza, S. Fog Computing: An overview of big IoT data analytics. Wirel. Commun. Mob. Comput. 2018, 2018, 7157192. [Google Scholar] [CrossRef]
- Zar, J. Privacy and Security As Assets: Beyond Risk Thinking to Profitable Payback. In Proceedings of the IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–6. [Google Scholar]
- Lee, K. Security Threats in Cloud Computing Environments. Int. J. Secur. Appl. 2012, 6, 25–32. [Google Scholar]
- Cloud Security Alliance. Cloud Security Alliance Releases ‘The Treacherous Twelve’ Cloud Computing Top Threats. 2016. Available online: https://cloudsecurityalliance.org/press-releases/2016/02/29/cloud-security-alliance-releases-the-treacherous-twelve-cloud-computing-top-threats-in-2016/ (accessed on 21 December 2021).
- Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A Survey of Intrusion Detection Techniques in Cloud. J. Netw. Comput. Appl. 2013, 36, 42–57. [Google Scholar] [CrossRef]
- Chang, V.; Ramachandran, M. Towards Achieving Data Security with the Cloud Computing Adoption Framework. IEEE Trans. Serv. Comput. 2016, 9, 138–151. [Google Scholar] [CrossRef] [Green Version]
- Fox, A.; Griffith, R.; Joseph, A.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; Zaharia, M. Above the Clouds: A Berkeley View of Cloud Computing; Technical Report UCB/EECS-2009-28; EECS Department, University of California: Berkeley, CA, USA, 2009. [Google Scholar]
- Pearson, S.; Benameur, A. Privacy, Security and Trust Issues Arising from Cloud Computing. In Proceedings of the IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, IN, USA, 30 November–3 December 2010; pp. 693–702. [Google Scholar]
- Mulazzani, M.; Schrittwieser, S.; Leithner, M.; Huber, M.; Weippl, E. Dark Clouds on the Horizon: Using Cloud Storage as Attack Vector and Online Slack Space. In Proceedings of the 20th USENIX conference on SecurityAugust, San Francisco, CA, USA, 8–12 August 2011; pp. 1–11. [Google Scholar]
- Di Vimercati, S.D.C.; Foresti, S.; Jajodia, S.; Paraboschi, S.; Samarati, P. Over-Encryption: Management of Access Control Evolution on Outsourced Data. In Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria, 23–27 September 2007; pp. 123–134. [Google Scholar]
- Mogull, R.; Arlen, J.; Gilbert, F.; Lane, A.; Mortman, D.; Peterson, G.; Rothman, M.; Moltz, J.; Moren, D.; Scoboria, E. Security Guidance for Critical Areas of Focus in Cloud Computing v4.0. Cloud Security Alliance. 2017. Available online: https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf (accessed on 21 December 2021).
- Tyagi, A.K.; Niladhuri, S.; Priya, R. Never Trust Anyone: Trust-Privacy Trade-Offs in Vehicular Ad-hoc Networks. J. Adv. Math. Comput. Sci. 2016, 19, 1–23. [Google Scholar] [CrossRef]
- Rusk, J.D. Trust and Decision Making in the Privacy Paradox? In Proceedings of the Southern Association for Information Systems Conference, Macon, GA, USA, 21–22 March 2014. [Google Scholar]
- Sun, P.J. Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions. IEEE Access 2019, 7, 147420–147452. [Google Scholar] [CrossRef]
- Ai, Y.; Peng, M.; Zhang, K. Edge Computing Technologies for Internet of Things: A Primer. Digit. Commun. Netw. 2018, 4, 77–86. [Google Scholar] [CrossRef]
- Moltchanov, D.; Ometov, A.; Andreev, S.; Koucheryavy, Y. Upper Bound on Capacity of 5G mmWave Cellular with Multi-Connectivity Capabilities. Electron. Lett. 2018, 54, 724–726. [Google Scholar] [CrossRef]
- França, R.P.; Iano, Y.; Monteiro, A.C.B.; Arthur, R. Lower Memory Consumption for Data Transmission in Smart Cloud Environments with CBEDE Methodology. In Smart Systems Design, Applications, and Challenges; IGI Global: Hershey, PA, USA, 2020; pp. 216–237. [Google Scholar]
- Roman, R.; Lopez, J.; Mambo, M. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar] [CrossRef] [Green Version]
- Zissis, D.; Lekkas, D. Addressing Cloud Computing Security Issues. Future Gener. Comput. Syst. 2012, 28, 583–592. [Google Scholar] [CrossRef]
- Stojmenovic, I.; Wen, S. The Fog Computing Paradigm: Scenarios and Security Issues. In Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
- Bhat, S.A.; Sofi, I.B.; Chi, C.Y. Edge Computing and Its Convergence With Blockchain in 5G and Beyond: Security, Challenges, and Opportunities. IEEE Access 2020, 8, 205340–205373. [Google Scholar] [CrossRef]
- Khan, A.N.; Ali, M.; Khan, A.R.; Khan, F.G.; Khan, I.A.; Jadoon, W.; Shamshirband, S.; Chronopoulos, A.T. A Comparative Study and Workload Distribution Model for Re-encryption Schemes in a Mobile Cloud Computing Environment. Int. J. Commun. Syst. 2017, 30, e3308. [Google Scholar] [CrossRef]
- Du, M.; Wang, K.; Chen, Y.; Wang, X.; Sun, Y. Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things. IEEE Commun. Mag. 2018, 56, 62–67. [Google Scholar] [CrossRef]
- Hou, Y.; Garg, S.; Hui, L.; Jayakody, D.N.K.; Jin, R.; Hossain, M.S. A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing. IEEE Access 2020, 8, 136119–136130. [Google Scholar] [CrossRef]
- Zeyu, H.; Geming, X.; Zhaohang, W.; Sen, Y. Survey on Edge Computing Security. In Proceedings of the International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Fuzhou, China, 12–14 June 2020; pp. 96–105. [Google Scholar]
- Cao, K.; Liu, Y.; Meng, G.; Sun, Q. An Overview on Edge Computing Research. IEEE Access 2020, 8, 85714–85728. [Google Scholar] [CrossRef]
- Zhang, J.; Chen, B.; Zhao, Y.; Cheng, X.; Hu, F. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access 2018, 6, 18209–18237. [Google Scholar] [CrossRef]
- Liu, D.; Yan, Z.; Ding, W.; Atiquzzaman, M. A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J. 2019, 6, 4946–4967. [Google Scholar] [CrossRef] [Green Version]
- Khalil, I.; Khreishah, A.; Azeem, M. Consolidated Identity Management System for Secure Mobile Cloud Computing. Comput. Netw. 2014, 65, 99–110. [Google Scholar] [CrossRef]
- Flueratoru, L.; Shubina, V.; Niculescu, D.; Lohan, E.S. On the High Fluctuations of Received Signal Strength Measurements with BLE Signals for Contact Tracing and Proximity Detection. IEEE Sens. J. 2021. [Google Scholar] [CrossRef]
- Shubina, V.; Ometov, A.; Andreev, S.; Niculescu, D.; Lohan, E.S. Privacy versus Location Accuracy in Opportunistic Wearable Networks. In Proceedings of the International Conference on Localization and GNSS (ICL-GNSS), Tampere, Finland, 2–4 June 2020; pp. 1–6. [Google Scholar]
- Wei, W.; Xu, F.; Li, Q. MobiShare: Flexible Privacy-Preserving Location Sharing in Mobile Online Social Networks. In Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2616–2620. [Google Scholar]
- Li, R.; Liu, A.X.; Wang, A.L.; Bruhadeshwar, B. Fast and Scalable Range Query Processing with Strong Privacy Protection for Cloud Computing. IEEE/ACM Trans. Netw. 2015, 24, 2305–2318. [Google Scholar] [CrossRef]
- Wang, K.; Du, M.; Yang, D.; Zhu, C.; Shen, J.; Zhang, Y. Game-Theory-based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems. ACM Trans. Embedded Comput. Syst. 2017, 16, 1–21. [Google Scholar] [CrossRef]
- Shi, W.; Zhang, L.; Wu, C.; Li, Z.; Lau, F.C. An Online Auction Framework for Dynamic Resource Provisioning in Cloud Computing. ACM SIGMETRICS Perform. Eval. Rev. 2014, 42, 71–83. [Google Scholar] [CrossRef]
- Ma, F.; Luo, X.; Litvinov, E. Cloud Computing for Power System Simulations at ISO New England—Experiences and Challenges. IEEE Trans. Smart Grid 2016, 7, 2596–2603. [Google Scholar] [CrossRef]
- Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing. IEEE/ACM Trans. Netw. 2015, 24, 2795–2808. [Google Scholar] [CrossRef] [Green Version]
- Chen, S.; Irving, S.; Peng, L. Operational Cost Optimization for Cloud Computing Data Centers Using Renewable Energy. IEEE Syst. J. 2015, 10, 1447–1458. [Google Scholar] [CrossRef]
- Zeng, D.; Gu, L.; Guo, S.; Cheng, Z.; Yu, S. Joint Optimization of Task Scheduling and Image Placement in Fog Computing Supported Software-Defined Embedded System. IEEE Trans. Comput. 2016, 65, 3702–3712. [Google Scholar] [CrossRef]
- Wang, K.; Yuan, L.; Miyazaki, T.; Zeng, D.; Guo, S.; Sun, Y. Strategic Antieavesdropping Game for Physical Layer Security in Wireless Cooperative Networks. IEEE Trans. Veh. Technol. 2017, 66, 9448–9457. [Google Scholar] [CrossRef]
- Rimal, B.P.; Maier, M. Workflow Scheduling in Multi-Tenant Cloud Computing Environments. IEEE Trans. Parallel Distrib. Syst. 2016, 28, 290–304. [Google Scholar] [CrossRef]
- Aazam, M.; Huh, E.N. Fog Computing: The Cloud-IoT∖IoE Middleware Paradigm. IEEE Potentials 2016, 35, 40–44. [Google Scholar] [CrossRef]
- Mahmud, R.; Kotagiri, R.; Buyya, R. Fog Computing: A Taxonomy, Survey and Future Directions. In Internet of Everything; Springer: Berlin/Heidelberg, Germany, 2018; pp. 103–130. [Google Scholar]
- El-Sayed, H.; Sankar, S.; Prasad, M.; Puthal, D.; Gupta, A.; Mohanty, M.; Lin, C.T. Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment. IEEE Access 2017, 6, 1706–1717. [Google Scholar] [CrossRef]
- Khan, S.; Parkinson, S.; Qin, Y. Fog Computing Security: A Review of Current Applications and Security Solutions. J. Cloud Comput. 2017, 6, 1–22. [Google Scholar] [CrossRef]
- Atlam, H.F.; Walters, R.J.; Wills, G.B. Fog Computing and the Internet of Things: A Review. Big Data Cogn. Comput. 2018, 2, 10. [Google Scholar] [CrossRef] [Green Version]
- Ni, J.; Zhang, K.; Lin, X.; Shen, X. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions. IEEE Commun. Surv. Tutor. 2018, 20, 601–628. [Google Scholar] [CrossRef]
- Modi, C.; Patel, D.; Borisaniya, B.; Patel, A.; Rajarajan, M. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. J. Supercomput. 2013, 63, 561–592. [Google Scholar] [CrossRef] [Green Version]
- Khorshed, M.T.; Ali, A.S.; Wasimi, S.A. A Survey on Gaps, Threat Remediation Challenges and Some Thoughts for Proactive Attack Detection in Cloud Computing. Future Gener. Comput. Syst. 2012, 28, 833–851. [Google Scholar] [CrossRef]
- Nenvani, G.; Gupta, H. A Survey on Attack Detection on Cloud Using Supervised Learning Techniques. In Proceedings of the Symposium on Colossal Data Analysis and Networking (CDAN), Indore, India, 18–19 March 2016; pp. 1–5. [Google Scholar]
- Ciurana, E. Developing with Google App Engine; Springer: New York, NY, USA, 2009. [Google Scholar]
- Kortchinsky, K. CloudBurst: A VMware Guest to Host Escape Story. BlackHat USA. 2009. Available online: https://docplayer.net/42925918-Cloudburst-a-vmware-guest-to-host-escape-story.html (accessed on 21 December 2021).
- Ristenpart, T.; Tromer, E.; Shacham, H.; Savage, S. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago IL, USA, 9–13 November 2009; pp. 199–212. [Google Scholar]
- Naccache, D.; Stern, J. A New Public Key Cryptosystem Based on Higher Residues. In Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, USA, 2–5 November 1998; pp. 59–66. [Google Scholar]
- Hay, B.; Nance, K.; Bishop, M. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing. In Proceedings of the 44th Hawaii International Conference on System Sciences, Kauai, HI, USA, 4–7 January 2011; pp. 1–7. [Google Scholar]
- Almtrf, A.; Alagrash, Y.; Zohdy, M. Framework Modeling for User Privacy in Cloud Computing. In Proceedings of the 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 819–826. [Google Scholar]
- Patel, A.; Shah, N.; Ramoliya, D.; Nayak, A. A Detailed Review of Cloud Security: Issues, Threats Attacks. In Proceedings of the 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 5–7 November 2020; pp. 758–764. [Google Scholar]
- Archer, J.; Boehme, A.; Cullinane, D.; Kurtz, P.; Puhlmann, N.; Reavis, J. Top Threats to Cloud Computing v1.0. Cloud Security Alliance. 2010, pp. 1–14. Available online: https://ioactive.com/wp-content/uploads/2018/05/csathreats.v1.0-1.pdf (accessed on 21 December 2021).
- Wrenn, B.; ISSEP CISSP. When Security and Compliance Are Essential, Trust Unisys. 2010. Available online: https://www.unisys.com/solutions/cloud-and-infrastructure-solutions/cloud-security-solutions/ (accessed on 21 December 2021).
- Grabosky, P. Organized Cybercrime and National Security. In Cybercrime Risks and Responses; Springer: Berlin/Heidelberg, Germany, 2015; pp. 67–80. [Google Scholar]
- Freier, A.; Karlton, P.; Kocher, P. RC 6101: The Secure Sockets Layer (SSL) Protocol Version 3.0; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2011. [Google Scholar]
- Chonka, A.; Xiang, Y.; Zhou, W.; Bonti, A. Cloud Security Defence to Protect Cloud Computing Against HTTP-DoS and XML-DoS Attacks. J. Netw. Comput. Appl. 2011, 34, 1097–1107. [Google Scholar] [CrossRef]
- Amara, N.; Zhiqui, H.; Ali, A. Cloud Computing Security Threats and Attacks with Their Mitigation Techniques. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Nanjing, China, 12–14 October 2017; pp. 244–251. [Google Scholar]
- He, D.; Chan, S.; Guizani, M. Security in the Internet of Things Supported by Mobile Edge Computing. IEEE Commun. Mag. 2018, 56, 56–61. [Google Scholar] [CrossRef]
- Yi, S.; Qin, Z.; Li, Q. Security and Privacy Issues of Fog Computing: A survey. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Qufu, China, 10–12 August 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 685–695. [Google Scholar]
- Abomhara, M.; Køien, G.M. Security and privacy in the Internet of Things: Current status and open issues. In Proceedings of the International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, Denmark, 11–14 May 2014; pp. 1–8. [Google Scholar]
- Veerraju, T.; Kumar, K.K. A Survey on Fog Computing: Research Challenges in Security and Privacy Issues. Int. J. Eng. Technol. 2018, 7, 335–340. [Google Scholar] [CrossRef] [Green Version]
- Guan, Y.; Shao, J.; Wei, G.; Xie, M. Data Security and Privacy in Fog Computing. IEEE Netw. 2018, 32, 106–111. [Google Scholar] [CrossRef]
- Alkadi, O.; Moustafa, N.; Turnbull, B. A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions. IEEE Access 2020, 8, 104893–104917. [Google Scholar] [CrossRef]
- Li, Y.; Li, D.; Cui, W.; Zhang, R. Research based on OSI model. In Proceedings of the 3rd International Conference on Communication Software and Networks, Xi’an, China, 27–29 May 2011; pp. 554–557. [Google Scholar]
- Ara, A.; Al-Rodhaan, M.; Tian, Y.; Al-Dhelaan, A. A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems. arXiv 2015, arXiv:1611.00374. [Google Scholar] [CrossRef]
- Krishnan, P.; Duttagupta, S.; Achuthan, K. SDN/NFV Security Framework for Fog-to-Things Computing Infrastructure. Softw. Pract. Exp. 2020, 50, 757–800. [Google Scholar] [CrossRef]
- Li, Q.; Li, W.; Wang, J.; Cheng, M. A SQL Injection Detection Method Based on Adaptive Deep Forest. IEEE Access 2019, 7, 145385–145394. [Google Scholar] [CrossRef]
- Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things. IEEE Internet Things J. 2021, 8, 4004–4022. [Google Scholar] [CrossRef]
- Xie, X.; Ren, C.; Fu, Y.; Xu, J.; Guo, J. SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN. IEEE Access 2019, 7, 151475–151481. [Google Scholar] [CrossRef]
- Soni, N.; Malekian, R.; Thakur, A. Edge Computing in Transportation: Security Issues and Challenges. arXiv 2020, arXiv:2012.11206. [Google Scholar]
- Turel, Y.; Kotowski, R. Cloud Computing Virtualization and Cyber Attacks: Evidence Centralization. 2015. Available online: https://www.researchgate.net/publication/275021701 (accessed on 21 December 2021).
- Almutairy, N.M.; Al-Shqeerat, K.H. A Survey on Security Challenges of Virtualization Technology in Cloud Computing. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 2019, 11. [Google Scholar] [CrossRef] [Green Version]
- Tao, Z.; Xia, Q.; Hao, Z.; Li, C.; Ma, L.; Yi, S.; Li, Q. A Survey of Virtual Machine Management in Edge Computing. Proc. IEEE 2019, 107, 1482–1499. [Google Scholar] [CrossRef]
- Kazim, M.; Zhu, S.Y. Virtualization Security in Cloud Computing. In Guide to Security Assurance for Cloud Computing; Springer: Berlin/Heidelberg, Germany, 2015; pp. 51–63. [Google Scholar]
- Alotaibi, A.M.; Alrashidi, B.F.; Naz, S.; Parveen, Z. Security issues in Protocols of TCP/IP Model at Layers Level. Int. J. Comput. Networks Commun. Secur. 2017, 5, 96–104. [Google Scholar]
- Kumarasamy, S.; Gowrishankar, A. An Active Defense Mechanism for TCP SYN Flooding Attacks. arXiv 2012, arXiv:1201.2103. [Google Scholar]
- Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Surv. Tutor. 2020, 22, 616–644. [Google Scholar] [CrossRef] [Green Version]
- Sinha, P.; Jha, V.K.; Rai, A.K.; Bhushan, B. Security Vulnerabilities, Attacks and Countermeasures in Wireless Sensor Networks at Various Layers of OSI Reference Model: A Survey. In Proceedings of the International Conference on Signal Processing and Communication (ICSPC), Coimbatore, India, 28–29 July 2017; pp. 288–293. [Google Scholar]
- Faisal, A.; Zulkernine, M. A Secure Architecture for TCP/UDP-based Cloud Communications. Int. J. Inf. Secur. 2021, 20, 161–179. [Google Scholar] [CrossRef]
- Radhakrishnan, R.; Edmonson, W.W.; Afghah, F.; Rodriguez-Osorio, R.M.; Pinto, F.; Burleigh, S.C. Survey of Inter-Satellite Communication for Small Satellite Systems: Physical Layer to Network Layer View. IEEE Commun. Surv. Tutor. 2016, 18, 2442–2473. [Google Scholar] [CrossRef] [Green Version]
- Younis, O.H.; Essa, S.E.; Ayman, E.S. A Survey on Security Attacks/Defenses in Mobile Ad-Hoc Networks. Commun. Appl. Electron. 2017, 6, 1–9. [Google Scholar]
- Le, A.; Loo, J.; Lasebae, A.; Vinel, A.; Chen, Y.; Chai, M. The Impact of Rank Attack on Network Topology of Routing Protocol for Low-Power and Lossy Networks. IEEE Sens. J. 2013, 13, 3685–3692. [Google Scholar] [CrossRef]
- Dimic, G.; Sidiropoulos, N.; Zhang, R. Medium Access Control—Physical Cross-Layer Design. IEEE Signal Process. Mag. 2004, 21, 40–50. [Google Scholar] [CrossRef]
- Pan, F.; Pang, Z.; Luvisotto, M.; Xiao, M.; Wen, H. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions. IEEE Ind. Electron. Mag. 2018, 12, 18–27. [Google Scholar] [CrossRef]
- Echeverría, S.; Klinedinst, D.; Williams, K.; Lewis, G.A. Establishing Trusted Identities in Disconnected Edge Environments. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC), Washington, DC, USA, 27–28 October 2016; pp. 51–63. [Google Scholar]
- Li, C.T.; Lee, C.C.; Weng, C.Y. A Dynamic Identity-Based User Authentication Scheme for Remote Login Systems. Sec. Commun. Netw. 2015, 8, 3372–3382. [Google Scholar] [CrossRef]
- Wang, D.; Bai, B.; Lei, K.; Zhao, W.; Yang, Y.; Han, Z. Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City. IEEE Access 2019, 7, 54508–54521. [Google Scholar] [CrossRef]
- Davis, B.D.; Mason, J.C.; Anwar, M. Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study. IEEE Internet Things J. 2020, 7, 10102–10110. [Google Scholar] [CrossRef]
Attributes | Cloud Computing | Edge Computing | Fog Computing |
---|---|---|---|
Architecture | Centralized | Distributed | Distributed |
Expected Task Execution Time | High | High-Medium | Low |
Provided Services | Universal services | Often uses mobile networks | Vital for a particular domain and distributed |
Security | Centralized (guaranteed by the Cloud provider) | Centralized (guaranteed by the Cellular operator) | Mixed (depending on the implementation) |
Energy Consumption | High | Low | Varying but higher than for Edge |
Identifying location | No | Yes | Yes |
Main Providers | Amazon and Google | Cellular network providers | Proprietary |
Mobility | Inadequate | Offered with limited support | Supported |
Interaction in Real-Time | Available | Available | Available |
Latency | High | Low | Varying but higher than for Edge |
Bandwidth Cost | High | Low | Low |
Storage capacity and Computation | High | Very limited | Varying |
Scalability | Average | High | High |
Overall usage | Computation distribution for huge data (Google MapReduce), Apps virtualization, Storage of data scalability | Control of traffic, data caching, wearable applications | CCTV surveillance, imaging of subsurface in real-time, IoT, Smart city, Vehicle-to-Vehicle (V2X) |
Layer | Brief Description | Attack | Specifics of Paradigm/Main Proposed Countermeasures | ||
---|---|---|---|---|---|
Cloud | Edge | Fog | |||
Application | Data inclined applications faces attacks and if breached, unpermitted access on websites is reached. Malware is of different forms, e.g., Trojan horses and viruses. An illegal software used to access legitimate information. Attacks HTTP [117]. | HTTP Flood | Application monitoring is highly recommended. Web Application Firewalls (WAF), Anti-virus, privacy protection management [118]. | Filtering mechanisms and intrusion detection systems [26]. | HTTP-Redirect scheme [119]. |
SQL Injection | SQL injection detection using adaptive deep learning [120]. | Modifying circuits to minimize information leakage by adding random noise or delay, implementing a constant execution path code and balancing Hamming weights [121]. | SQL injection detection using Elastic-pooling [122]. | ||
Malwares | Use of Antivirus Softwares [118]. | Signature-based and behavior-based detection [123]. | Mirai botnet detector [119]. | ||
Session/Presentation | “It is defined as a pool of virtualized computer resources.” Virtualization offers better usage of hardware assets with an opportunity for additional services avoiding extra costs for infrastructures. Customers are provided with virtual storage [124]. | Hyper- visor | Strong configurations, up-to-date Operating System (OS). | Computational Auditing | Robust Authentication scheme. |
Data leakage | Encrypt stored data/use secured transmission medium, e.g., SSL/TLS, Virtual Firewall [125] | Homomorphic Encryption [126]. | Isolation of user’s data, Access control strictly based on positions [114]. | ||
VM-Based | Anti-viruses, anti-spyware to monitor illegal events in guest OS [127]. | Identity and Authentication scheme such as Identity-Based Encryption (IBE) [126]. | Intrusion detection and prevention mechanism use for anomaly detection, behavioral assessment, and machine learning approach in classifying attacks [119]. | ||
Transport | “Provides a total end-to-end solution for reliable communications”. The two main protocols are TCP and UDP. The smooth performance in communication strongly depends on TCP/IP between user and server [128]. | TCP Flood | Firewalls, SYN Cache [129]. | SYN cookies [130]. | Integrated Firewalls [131]. |
UDP Flood | Graphene design for secure communication [132]. | Response rate for UDP packets should be reduced [131]. | Response rate for UDP packets same as in Edge, should be reduced [131]. | ||
Session hijacking | AES-GCM symmetric encryption [132]. | User light-weight authentication algorithm [130]. | Encrypting communication using two-ways or multi-purpose authentication [92]. | ||
Network | The routing of data packets across different networks from a source to an end node, is performed by the network layer [133]. | DoS attack | Intrusion Detection System (IDS) [134], Access Security | Network Authentication mechanisms | Deploy routing security and observing the behaviour of nodes [135]. |
MITM | Data Encryption [118]. | Time stamps, encryption algorithm [121]. | Use of Authentication schemes [114]. | ||
Spoofing attacks | Identity Authentication [118]. | Secure trust schemes [39]. | Secured identification and Strong authentication [39]. | ||
PHY/MAC | The manner how types of equipment are physically hooked up to a wired or wireless network system and can be sorted for physical addressing with the help of a designated MAC address [136]. | Eaves-dropping | Encryption, Cryptography [137] | Data Encryption using asymmetric AES scheme [121]. | Protection of identity by use of IBC [138]. |
Tampe-ring | Detection of behavioural pattern | Observe manner of behaviour [137]. | Multicast authentication as PKI [67]. | ||
Replay attack | Dynamic identity-based authentication model [139]. | Authentication mechanisms [140]. | Key generation approach [140]. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ometov, A.; Molua, O.L.; Komarov, M.; Nurmi, J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors 2022, 22, 927. https://doi.org/10.3390/s22030927
Ometov A, Molua OL, Komarov M, Nurmi J. A Survey of Security in Cloud, Edge, and Fog Computing. Sensors. 2022; 22(3):927. https://doi.org/10.3390/s22030927
Chicago/Turabian StyleOmetov, Aleksandr, Oliver Liombe Molua, Mikhail Komarov, and Jari Nurmi. 2022. "A Survey of Security in Cloud, Edge, and Fog Computing" Sensors 22, no. 3: 927. https://doi.org/10.3390/s22030927
APA StyleOmetov, A., Molua, O. L., Komarov, M., & Nurmi, J. (2022). A Survey of Security in Cloud, Edge, and Fog Computing. Sensors, 22(3), 927. https://doi.org/10.3390/s22030927