Fog Computing: Common Security Issues and Proposed Countermeasure for Intrusion due to Password Theft
Abstract
Keywords
Full Text:
PDFReferences
K. ChandraHasan," Research Challenges and Security Issues in Cloud Computing" International Journal of Computational Intelligence and Information Security, March 2012 VoI. 3, No. 3.
Dave Evans. The internet of things how the next evolution of the internet is changing everything. Technical report, CISCO IBSG, April 2011.
Shanhe Yi, Zijiang Hao, Zhengrui Qin, and Qun Li (2015) “Fog Computing- Platform and Applications”: IEEE Workshop on Hot Topics in Web Systems and Technologies.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685-695). Springer, Cham.
Vaquero, Luis M., and Luis Rodero-Merino. "Finding your way in the fog: Towards a comprehensive definition of fog computing." ACM SIGCOMM Computer Communication Review 44.5 (2014): 27-32.
Murthy, J. S. (2019). EdgeCloud: A Distributed Management System for Resource Continuity in Edge to Cloud Computing Environment. In the Rise of Fog Computing in the Digital Era (pp. 108-128). IGI Global.
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog computing and its role in the internet of things,” in workshop on Mobile cloud computing. ACM, 2012.
S. Sarkar, S. Chatterjee, and S. Misra, ‘‘Assessment of the suitability of fog computing in the context of Internet of things,’’ IEEE Trans. Cloud Comput., to be published.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, M. Ganzha, L. Maciaszek, M. Paprzycki (eds). ACSIS, Vol. 2, pages 1–8 (2014)
Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013, February). A Survey on Sensor-Cloud: Architecture, Applications, and Approaches. International Journal of Distributed Sensor Networks, 2013, 1–18.
M. Díaz, C.Martín,andB.Rubio, ‘‘State-of-the-art,challenges,andopen issues in the integration of Internet of Things and cloud computing,’’ J. Netw. Comput. Appl., vol. 67, 99–117, May 2016.
Atlam, H., Walters, R. and Wills, G., 2018. Fog Computing and the Internet of Things: A Review. Big Data and Cognitive Computing, 2(2), p.10.
F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, ‘‘Fog computing: A platform for Internet of Things and analytics, in Big Data and Internet of Things”: A Roadmap for Smart Environments (Studies in Computational Intelligence). New York, NY, USA: Springer, 2014, pp. 169–186.
R. Roman, J. Lopez, and M. Manbo, “Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security, Threats and Challenges,” Futur. Gener. Comp. Syst., vol. 78, pp. 680–698, 2018.
Buchegger, S. and Le Boudec, J.Y., 2003. A robust reputation system for mobile ad-hoc networks (No. REP_WORK).
Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L.L., 2009, September. On technical security issues in cloud computing. In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on (pp. 109-116). Ieee.
Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005.
Stojmenovic I, Wen S (2014) “The fog computing paradigm: Scenarios and security issues” In: Computer Science and Information Systems (FedCSIS), 2014 Federated Conference On. IEEE. pp 1–8
Stolfo, S.J., Salem, M.B. and Keromytis, A.D., 2012, May. Fog computing: Mitigating insider data theft attacks in the cloud. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on (pp. 125-128). IEEE.
Anawar, M.R., Wang, S., Azam Zia, M., Jadoon, A.K., Akram, U. and Raza, S., 2018. Fog computing: An overview of big IoT data analytics. Wireless Communications and Mobile Computing, 2018.
Sevak, B., 2013. Security against side channel attack in cloud computing. International journal of engineering and advanced technology (IJEAT), 2(2), p.183.
Alliance CS (2016) The Treacherous 12 Cloud Computing Top Threats in 2016.
Wang, C., Wang, Q., Ren, K. and Lou, W., 2010, March. Privacy-preserving public auditing for data storage security in cloud computing. In 2010 proceedings ieee infocom (pp. 1-9). Ieee.
Cao, R. and Yang, L., 2012. Decomposed LT codes for cooperative relay communications. IEEE Journal on selected areas in communications, 30(2), pp.407-414.
Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE transactions on parallel and distributed systems, 24(1), pp.131-143.
Zhang, Y., Krishnan, R., Patwa, F. and Sandhu, R., 2019. Access Control in Cloud IaaS. Security, Privacy, and Digital Forensics in the Cloud, p.81.
Ruj, S., Nayak, A. and Stojmenovic, I., 2011, May. Distributed fine-grained access control in wireless sensor networks. In Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International (pp. 352-362). IEEE
Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: Preliminary framework and a case study. In: IRI. IEEE (2014)
Lu R, Liang X, Li X, Lin X, Shen X. EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems 2012; 23(9):1621–1631.
T1 - Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions- Georgakopoulos, Dimitrios, - Jayaraman, Prem Prakash,AU - Gao, Longxiang, - Xiang, Yong, - Ranjan.
M. E. Elhamahmy, H. N. Elmahdy, and I. A. Saroit, “A New Approach for Evaluating Intrusion Detection System,” Int. J. Artif. Intell. Syst. Mach. Learn., vol. 2, no. 11, pp. 290–298, 2010.
Ashraf, N., Ahmad, W. and Ashraf, R., 2018. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System. Annals of Emerging Technologies in Computing (AETiC), 2(1).
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.