Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alrawais, A., Alhothail, A., Hu, C., Cheng, X.: Fog Computing for the Internet of Things: Security and Privacy Issues. IEEE Computer Society (2017)
Chen, S., Zhang, T., Shi, W.: Fog Computing. IEEE Computer Society (2017)
Yi, S., Li, C., Li, Q.: A survey of fog computing: concepts, applications and issues. In: MobiHoc Mobile and Ad Hoc Networking and Computing. ACM, New York (2015)
Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: IEEE Symposium on Security and Privacy Workshops (2012)
Lee, K., Kim, D., Ha, D., Rajpu, U., Oh, H.: On Security and Privacy Issues of Fog Computing supported Internet of Things Environment. IEEE Computer Society (2015)
Stojmenovic, I., Wen, S.: The Fog Computing Paradigm: Scenarios and Security Issues. Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1–8 (2014)
Hu, P., Ning, H., Qiu, T., Song, H., Wang, Y., Yao, X.: Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Thing. IEEE Computer Society (2017)
Yi, S., Hao, Z., Qin, Z., Li, Q.: Fog computing: platform and applications. In: Third IEEE Workshop on Hot Topics in Web Systems and Technologies (2015)
Chiang, M., Zhang, T.: Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3(6) (2016)
Elkhatib, Y., Porter, B., Ribeiro, H.B., Faten Zhani, M., Qadir, J., Rivière, E.: On Using Micro-Clouds to Deliver the Fog. IEEE Computer Society (2017)
Hao, Z., Novak, E., Yi, S., Li, Q.: Challenges and Software Architecture for Fog Computing. IEEE Computer Society (2017)
Wen, C., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog Orchestration for Internet of Things Services. IEEE Computer Society (2017)
Xiao, Y., Zhu, C.: Vehicular fog computing: vision and challenges. In: IEEE International Conference on Pervasive Computing and Communications (2017)
Pham, X.-Q., Huh, E.-N.: Towards task scheduling in a cloud-fog computing system. In: 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–4, Oct (2016)
Huang, C.Y., Xu, K.: Reliable realtime streaming in vehicular cloud fog computing networks. In: IEEE/CIC International Conference on Communications, (ICCC), China, pp. 1–6, July 2016
Lin, Y., Shen, H.: Cloud fog: towards high quality of experience in cloud gaming. In: The 44th International Conference on Parallel Processing (ICPP), pp. 500–509, Sept 2015
Mtibaa, A., Harras, K., Alnuweiri, H.: Friend or foe? Detecting and isolating malicious nodes in mobile edge computing platforms. In: IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 42–49, Nov 2015
Law, Y.W., Palaniswami, M., Kounga, G., Lo, A.: Wake: Key management scheme for wide-area measurement systems in smart grid. IEEE Commun. Mag. 51(1), 34–41 (2013)
Fadlullah, Z.M., Fouda, M.M., Kato, N., Takeuchi, A., Iwasaki, N., Nozaki, Y.: Toward intelligent machine-to-machine communications in smart grid. IEEE Commun. Mag. 49(4), 60–65 (2011)
Niranjanamurthy, M., Kavitha, P.B., Priyanka, K., Vishnu, S.N.: Research study on Fog computing for secure data security. Int. J. Sci. Technol. Manage. 5 (2016)
Fakeeh, K.A.: Privacy and security problems in fog computing. Commun. Appl. Electron. (CAE) 4(6) (2016). ISSN: 2394-4714
Dsouza, C., Joon, G., Taguinod, M.: Policy-Driven Security Management for Fog Computing: Preliminary Framework and A Case Study. IEEE Computer Society (2014)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. IEEE INFOCOM (2010)
Kumar, P., Zaidi, N., Choudhur, T.: Fog computing: common security issues and proposed countermeasures. In: IEEE Conference, 5th International Conference on System Modeling and Advancement in Research Trends, 25–27 Nov 2016
Petac, E., Petac, A.O.: About Security Solutions in Fog Computing. Ovidius University Press (2016)
Wang, Y., Uehara, T., Sasaki, R.: Fog Computing: Issues and Challenges in Security and Forensics. IEEE Computer Society (2015)
Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Proceedings of 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp. 109–118 (2015)
Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of Fog computing and its security issues. Concurr. Comput.: Pract. Exp. 28(10), 2991–3005 (2016)
Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: Xu, K., Zhu, H. (eds.) Wireless Algorithms, Systems, and Applications. WASA. Lecture Notes in Computer Science, vol. 9204. Springer (2015)
Chiang, M., Doty, A.L.: Fog Networking: An Overview on Research Opportunities. Electrical Engineering Princeton University (2015)
Xu, F., Tan, C.C., Li, Q., Yan, G., Wu, J.: Designing a practical access point association protocol. In: INFOCOM. IEEE (2010)
Bonomi, F.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)
Bonomi, F.: Vehicles, the internet of things, and fog computing. In: The Eighth ACM International Workshop on Vehicular InterNetworking (VANET), Las Vegas, USA (2011)
Baccarelli, E., Naranjo, P.G.V., Scarpiniti, M.S., Shojafar, M., Abawajy, J.H.: Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study. IEEE Computer Society (2016)
Hong, K., Lillethun, D., Ramachandran, U., Ottenwalder, B., Koldehofe, B.: Mobile fog: a programming model for large-scale applications on the internet of things. In: ACM SIGCOMM Workshop on Mobile Cloud Computing (2013)
Vargas, V., Syed, A., Mohammad, A., Halgamuge, M.N.: Pentaho and Jaspersoft: a comparative study of business intelligence open source tools processing big data to evaluate performances. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(10), 20–29 (2016)
Kalid, S., Syed, A., Mohammad, A., Halgamuge, M.N.: Big-data NoSQL databases: comparison and analysis of “Big-Table”, “DynamoDB”, and “Cassandra”. In: IEEE 2nd International Conference on Big Data Analysis (ICBDA’17), pp. 89–93, Beijing, China, 10–12 Mar 2017
Kaur, K., Syed, A., Mohammad, A., Halgamuge, M.N.: Review: an evaluation of major threats in cloud computing associated with big data. In: IEEE 2nd International Conference on Big Data Analysis (ICBDA’17), pp. 368–372, Beijing, China, 10–12 Mar 2017
Pham, D.V., Syed, A., Mohammad, A., Halgamuge, M.N.: Threat analysis of portable hack tools from USB storage devices and protection solutions. In: International Conference on Information and Emerging Technologies (ICIET’10), pp. 1–5, Karachi, Pakistan, 14–16 June 2010
Gupta, A., Mohammad, A., Syed, A., Halgamuge, M.N.: A comparative study of classification algorithms using data mining: crime and accidents in Denver City the USA. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 7(7), 374–381 (2016)
Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. https://doi.org/10.1016/j.jnca.2017.07.001 (2017)
Hu, P., Ning, H., Qiu, T., Xu, Y., Luo, X., Sangaiah, A.K.: A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.03.030 (2017)
Xiao, X., Chen, C., Sangaiah, A.K., Hu, G., Ye, R., Jiang, Y.: CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener. Comput. Syst. https://doi.org/10.1016/j.future.2017.01.035 (2017)
Author information
Authors and Affiliations
Contributions
Binara N. B. Ekanayake and Malka N. Halgamuge conceived the study idea and developed the analysis plan. Binara N. B. Ekanayake analyzed the data and wrote the initial paper. Malka N. Halgamuge helped to prepare the figures and tables, and finalizing the manuscript. All authors read the manuscript.
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Ekanayake, B.N.B., Halgamuge, M.N., Syed, A. (2018). Review: Security and Privacy Issues of Fog Computing for the Internet of Things (IoT). In: Sangaiah, A., Thangavelu, A., Meenakshi Sundaram, V. (eds) Cognitive Computing for Big Data Systems Over IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 14 . Springer, Cham. https://doi.org/10.1007/978-3-319-70688-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-70688-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70687-0
Online ISBN: 978-3-319-70688-7
eBook Packages: EngineeringEngineering (R0)