Fog Computing, Applications, Security and Challenges, Review

  • Authors

    • Gohar Rahman Information Security Interest Group(ISIG),Faculty of Computer science &Information Technology , Universiti Tun Hussien Onn Malaysia, Parit Raja,Johar 86400
    • Chuah Chai Wen Information Security Interest Group(ISIG),Faculty of Computer science &Information Technology , Universiti Tun Hussien Onn Malaysia, Parit Raja,Johar 86400
    2018-07-27
    https://doi.org/10.14419/ijet.v7i3.12612
  • Internet of Things, Cloud Computing, Fog Computing, Security
  • The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented.

  • References

    1. [1] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the internet of things: A survey,†IEEE communications surveys & tutorials, vol. 16, no. 1, pp. 414–454, 2014.

      [2] M. I. Naas, P. R. Parvedy, J. Boukhobza, and L. Lemarchand, “ifogstor: an iot data placement strategy for fog infrastructure,†in Fog and Edge Computing (ICFEC), 2017 IEEE 1st International Conference on IEEE, 2017, pp. 97–104.

      [3] C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, “Fog computing for sustainable smart cities: A survey,†ACM Computing Surveys (CSUR), vol. 50, no. 3, p. 32, 2017.

      [4] A. Yousefpour, G. Ishigaki, and J. P. Jue, “Fog computing: Towards minimizing delay in the internet of things,†in Edge Computing (EDGE), 2017 IEEE International Conference on. IEEE, 2017, pp. 17–24.

      [5] P. Hu, S. Dhelim, H. Ning, and T. Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues,†Journal of Network and Computer Applications, 2017.

      [6] R. Silva, J. S. Silva, and F. Boavida, “Opportunistic fog computing: Feasibility assessment and architectural proposal,†in Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium on. IEEE, 2017, pp. 510–516.

      [7] I. Stojmenovic and S. Wen, “The fog computing paradigm: Scenarios and security issues,†in Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on. IEEE, 2014, pp. 1–8.

      [8] S. Yi, Z. Qin, and Q. Li, “Security and privacy issues of fog computing: A survey,†in International Conference on Wireless Algorithms, Systems, and Applications. Springer, 2015, pp. 685–695.

      [9] F. Al-Doghman, Z. Chaczko, A. R. Ajayan, and R. Klempous, “A review on fog computing technology,†in Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on. IEEE, 2016, pp. 001 525–001 530.

      [10] R. Mahmud, R. Kotagiri, and R. Buyya, “Fog computing: A taxonomy, survey and future directions,†in Internet of Everything. Springer, 2018, pp. 103–130.

      [11] M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M. A. Ferrag, N. Choudhury, and V. Kumar, “Security and privacy in fog computing: Challenges,†IEEE Access, vol. 5, pp. 19 293–19 304, 2017.

      [12] T. Wang, J. Zhou, X. Chen, G. Wang, A. Liu, and Y. Liu, “A threelayer privacy preserving cloud storage scheme based on computational intelligence in fog computing,†IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 3–12, 2018.

      [13] P. Sareen and P. Kumar, “The fog computing paradigm,†Int J Emerging Technol Eng Res, vol. 4, pp. 55–60, 2016.

      [14] T. H. Luan, L. Gao, Z. Li, Y. Xiang, G. Wei, and L. Sun, “Fog computing: Focusing on mobile users at the edge,†arXiv preprint arXiv:1502.01815, 2015.

      [15] M. Taneja and A. Davy, “Resource aware placement of data analytics platform in fog computing,†Procedia Computer Science, vol. 97, pp. 153–156, 2016.

      [16] Y. Shi, G. Ding, H.Wang, H. E. Roman, and S. Lu, “The fog computing service for healthcare,†in Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), 2015 2nd International Symposium on. IEEE, 2015, pp. 15.

      [17] S. Sarkar, S. Chatterjee, and S. Misra, “Assessment of the suitability of fog computing in the context of internet of things,†IEEE Transactions on Cloud Computing, 2015.

      [18] L. M. Vaquero and L. Rodero-Merino, “Finding your way in the fog: Towards a comprehensive definition of fog computing,†ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, pp. 27–32, 2014.

      [19] J. Shropshire, “Extending the cloud with fog: Security challenges & opportunities,†2014.

      [20] T. S. Dybedokken, “Trust management in fog computing,†Master’s thesis, NTNU, 2017.

      [21] K. Saharan and A. Kumar, “Fog in comparison to cloud: A survey,†International Journal of Computer Applications, vol. 122, no. 3, 2015.

      [22] S. M. H. Ashjaei and M. Bengtsson, “Enhancing smart maintenance management using fog computing technology,†in 2017 International Conference on Industrial Engineering and Engineering Management IEEM, 10 Dec 2017, Singapore, Singapore, 2017.

      [23] F. A. Kraemer, A. E. Braten, N. Tamkittikhun, and D. Palma, “Fog computing in healthcare–a review and discussion,†IEEE Access, vol. 5, pp. 9206–9222, 2017.

      [24] T. V. N. Rao, A. Khan, M. Maschendra, and M. K. Kumar, “A paradigm shift from cloud to fog computing,†International Journal of Science Engineering and Computer Technology, vol. 5, no. 11, p. 385, 2015.

      [25] K. Kai, W. Cong, and L. Tao, “Fog computing for vehicular ad-hoc networks: paradigms, scenarios, and issues,†the journal of China Universities of Posts and Telecommunications, vol. 23, no. 2, pp. 56– 96, 2016.

      [26] M. Aazam and E.-N. Huh, “Fog computing: The cloud-iotn/ioe middleware paradigm,†IEEE Potentials, vol. 35, no. 3, pp. 40–44, 2016.

      [27] A. A. Dabhi, T. J. Raval, and K. Chaudhary, “Fog computing: A review and conceptual architecture, issues, applications and its challenges.â€

      [28] R. Roman, J. Lopez, and M. Mambo, “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges,†Future Generation Computer Systems, vol. 78, pp. 680–698, 2018.

      [29] A. Shawish and M. Salama, “Cloud computing: paradigms and technologies,†in Inter-cooperative collective intelligence: Techniques and applications. Springer, 2014, pp. 39–67.

      [30] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,†Future Generation computer systems, vol. 28, no. 3, pp. 583–592, 2012.

      [31] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: state-of-theart and research challenges,†Journal of internet services and applications, vol. 1, no. 1, pp. 7–18, 2010.

      [32] B. Varghese, N. Wang, S. Barbhuiya, P. Kilpatrick, and D. S. Nikolopoulos, “Challenges and opportunities in edge computing,†in Smart Cloud (SmartCloud), IEEE International Conference on. IEEE, 2016, pp. 20–26.

      [33] Y. Sahni, J. Cao, S. Zhang, and L. Yang, “Edge mesh: A new paradig to enable distributed intelligence in internet of things,†IEEE Access, vol. 5, pp. 16 441–16 458, 2017.

      [34] K. Dolui and S. K. Datta, “Comparison of edge computing implementations:Fog computing, cloudlet and mobile edge computing,†in Global Internet of Things Summit (GIoTS), 2017. IEEE, 2017, pp. 1–6.

      [35] N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile edge computing: A survey,†IEEE Internet of Things Journal, 2017. International Journal of Engineering & Technology 7

      [36] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,†Wireless communications and mobile computing, vol. 13, no. 18, pp. 1587–1611, 2013.

      [37] Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, “A survey on mobile edge computing: The communication perspective,†IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.

      [38] A. Munir, P. Kansakar, and S. U. Khan, “Ifciot: Integrated fog cloud iot: A novel architectural paradigm for the future internet of things.†IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 74–82, 2017.

      [39] Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, “Mobile edge computing—a key technology towards 5g,†ETSI white paper, vol. 11, no. 11, pp. 1–16, 2015.

      [40] F. Popentiu-Vladicescu and G. Albeanu, “Software reliability in the fog computing,†in Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017 International Conference on. IEEE, 2017, pp. 1–4.

      [41] N. Mohan and J. Kangasharju, “Edge-fog cloud: A distributed cloud for internet of things computations,†in Cloudification of the Internet of Things (CIoT). IEEE, 2016, pp. 1–6.

      [42] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,†IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.

      [43] M. Aazam and E.-N. Huh, “Fog computing and smart gateway based communication for cloud of things,†in Future Internet of Things and Cloud (FiCloud), 2014 International Conference on. IEEE, 2014, pp. 464–470.

      [44] F. Y. Okay and S. Ozdemir, “A fog computing based smart grid model,†in Networks, Computers and Communications (ISNCC), 2016 International Symposium on. IEEE, 2016, pp. 1–6.

      [45] R. K. Barik, S. K. Gudey, G. G. Reddy, M. Pant, H. Dubey, K. Mankodiya, and V. Kumar, “Foggrid: Leveraging fog computing for enhanced smart grid network,†arXiv preprint arXiv:1712.09645, 2017.

      [46] R. Brzoza-Woch, M. Konieczny, B. Kwolek, P. Nawrocki, T. Szydło, and K. Zieli´nski, “Holistic approach to urgent computing for flood decision support,†Procedia Computer Science, vol. 51, pp. 2387–2396, 2015.

      [47] X. Masip-Bruin, E. Mar´ın-Tordera, G. Tashakor, A. Jukan, and G.J. Ren, “Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems,†IEEE Wireless Communications, vol. 23, no. 5, pp. 120–128, 2016.

      [48] Y. Cao, S. Chen, P. Hou, and D. Brown, “Fast: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation, in Networking, Architecture and Storage (NAS), 2015 IEEE International Conference on. IEEE, 2015, pp. 2–11.

      [49] M. Chen, C. Ling, and W. Zhang, “Analysis of augmented reality application based on cloud computing,†in Image and Signal Processing (CISP), 2011 4th International Congress on, vol. 2. IEEE, 2011, pp. 569–572.

      [50] Y. Ai, M. Peng, and K. Zhang, “Edge cloud computing technologies for internet of things: A primer,†Digital Communications and Networks, 2017.

      [51] A. V. Dastjerdi and R. Buyya, “Fog computing: Helping the internet of things realize its potential,†Computer, vol. 49, no. 8, pp. 112–116, 2016.

      [52] S. Yi, C. Li, and Q. Li, “A survey of fog computing: concepts, applications and issues,†in Proceedings of the 2015 Workshop on Mobile Big Data. ACM, 2015, pp. 37–42.

      [53] P. V. Patil, “Fog computing,†College of Engg & Tech, 2015.

      [54] P. More, “Review of implementing fog computing,†Int. J. Res. Eng. Technol, vol. 4, no. 6, p. 2319, 2015.

      [55] E. Saurez, H. Gupta, U. Ramachandran, and R. Mayer, “Fog computing for improving user application interaction and context awareness: Demo abstract,†in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, 2017, pp. 281–282.

      [56] N. Chen, Y. Chen, Y. You, H. Ling, P. Liang, and R. Zimmermann, “Dynamic urban surveillance video stream processing using fog computing,†in Multimedia Big Data (BigMM), 2016 IEEE Second International Conference on. IEEE, 2016, pp. 105–112.

      [57] C. T. Do, N. H. Tran, C. Pham, M. G. R. Alam, J. H. Son, and C. S. Hong, “A proximal algorithm for joint resource allocation and minimizing carbon footprint in geo-distributed fog computing,†in Information Networking (ICOIN), 2015 International Conference on. IEEE, 2015, pp. 324–329.

      [58] A. Alrawais, A. Alhothaily, C. Hu, X. Xing, and X. Cheng, “An attribute-based encryption scheme to secure fog communications,†IEEE Access, vol. 5, pp. 9131–9138, 2017.

      [59] R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, “A lightweight privacy-preserving data aggregation scheme for fog computingenhanced iot,†IEEE Access, vol. 5, pp. 3302–3312, 2017.

      [60] M. H. Ibrahim, “Octopus: An edge-fog mutual authentication scheme.†IJ Network Security, vol. 18, no. 6, pp. 1089–1101, 2016.

      [61] M. T. Dong and X. Zhou, “Fog computing: Comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology,†Open Access Library J, vol. 3, no. 09, p. 1, 2016.

      [62] R. Sandhu, A. S. Sohal, and S. K. Sood, “Identification of malicious edge devices in fog computing environments,†Information Security Journal: A Global Perspective, vol. 26, no. 5, pp. 213–228, 2017.

      [63] R. Rios, R. Roman, J. A. Onieva, and J. Lopez, “From smog to fog: A security perspective,†in Fog and Mobile Edge Computing (FMEC), 2017 Second International Conference on. IEEE, 2017, pp. 56–61.

      [64] K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, “On security and privacy issues of fog computing supported internet of things environment,†in Network of the Future (NOF), 2015 6th International Conference on the. IEEE, 2015, pp. 1–3.

      [65] A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, “Fog computing for the internet of things: Security and privacy issues,†IEEE Internet Computing, vol. 21, no. 2, pp. 34–42, 2017.

      [66] S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating insider data theft attacks in the cloud,†in Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012, pp. 125–128.

      [67] B. Z. Abbasi and M. A. Shah, “Fog computing: Security issues, solutions and robust practices,†in Automation and Computing (ICAC), 2017 23rd International Conference on. IEEE, 2017, pp. 1–6.

      [68] H. Kim and E. A. Lee, “Authentication and authorization for the internet of things,†IT Professional, vol. 19, no. 5, pp. 27–33, 2017.

      [69] F. Hosseinpour, P. Vahdani Amoli, J. Plosila, T. H¨am¨al¨ainen,, and H. Tenhunen, “An intrusion detection system for fog computing and iot based logistic systems using a smart data approach,†International Journal of Digital Content Technology and its Applications, vol. 10, 2016.

      [70] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in cloud,†Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013.

      [71] K. A. Fakeeh, “Privacy and security problems in fog computing,†Commun. Appl. Electron.(CAE), vol. 4, no. 6, 2016

  • Downloads

  • How to Cite

    Rahman, G., & Wen, C. C. (2018). Fog Computing, Applications, Security and Challenges, Review. International Journal of Engineering & Technology, 7(3), 1615-1621. https://doi.org/10.14419/ijet.v7i3.12612