SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
60
doi: 10.32622/ijrat.76S201913

Abstract—Fog computing isa new paradigm that’san
add-on to cloud computing in the network. It has similar
characteristics to cloud computing such as computation,
storage, control, network functions. Fog is closer to end-users
but different in that it is de-centralised architecture. This
platform is suitable for real time low latency applications like
Internet of Things (IOT) devices. This paper surveys the
effect of security issues and privacy issues with possible
solutions in fog systems.
Index Terms— Fog computing, cloud computing,
Security threats, Privacy, Internet of Things
I. INTRODUCTION
The idea of Fog computing was first presented by CISCO in
2012. This platform refers to expanding cloud computing to
the edge of an enterprise's network. Fog computing
architecture is a scalable decentralized computing
architecture different from cloud centralized architecture.
Fog platform doesn’t exist on its own, this acts an
intermediate between end users and cloud platform to process
the communication. The basic framework of fog platform is
similar to cloud platform but its architecture supports
sensitive low latency applications [1]. Fog platform uses
many edge devices such as router, switches and hub for
processing, analyzing, aggregating and transmitting data of
latency aware applications that’s why its named as fog
computing [2].
Fog node can be any device that has the capacity of
carrying out the computing, providing the storage, and does
network connectivity. Fog system when compared to cloud
system are relatively have small computing resources such as
memory and storage but these resources can be enhanced
on-demand.
With the fast growth of Internet..of Things (IoT)
requests, numerous challenges are faced by the cloud
computing architecture such as high .latency, low capacity,
network failure and long distance (multiple hops) between
cloud and end users. Fog computing has brought the cloud
nearer to end user devices such as IoT. Devices for addressing
these challenges. It has offered processing of IoT information
and storage close to IoT devices[3].
Manuscript revised May 13, 2019 and published on June 5, 2019
Rashmi R, Mtech Student, Dept of Information Science & Engineering, BMS
college of Engineering, Bangalore, India
Dr R Ashok Kumar, Associate Professor, Dept of Information Science &
Engineering, BMS college of Engineering, Bangalore, India
Different applications such as automation of home,
monitoring of environment, traffic light that uses IOT devices
are all connected physically. These applications generate huge
data that are gathered. Features such as low latency, location.
awareness and geographic distribution are important for
applications that are not supported by IOT. Fog computing
and IOT are integrated together in-order to support these
features[4].
Instead of sending information to cloud for analysis,
storage and processing. Fog computing does all of these, this
helps in improving the efficiency and decreases the amount
of information that sent to cloud. Many companies such as
CISCO, Dell, Microsoft. Corp. have dedicated to explore and
development of Fog. To enable scalability and
interoperability feature, OpenFog Consortium workgroup are
working to create an open architecture for Fog [5].
Fog platform has the following characteristics:
 Quick enough to respond to low latency
applications.
 Can process large amount of data locally due to
which performance increases.
 Services like storage, computation, memory are
virtualized and are located at the edge of source
premises.
 Supports Geographic distribution of Fog nodes.
 Software installation on Heterogeneous hardware.
 Support for Mobility and Location Awareness.
 Reduces Network Congestion.
Services provided by Fog are disrupted by malicious
attack. These attacks can happen either internally or from
external sources by consuming the resources. Thereby
reducing bandwidth and interrupt the services provided by
fog to genuine end users. In this paper we highlight security
and privacy issues with possible solutions [6].
The paper is organized. as follows: section II includes
the connection among cloud and user devices, section III
includes the literature survey, section IV includes the
different types of attacks in fog platform, section V includes
the security and privacy issues and finally section VI
included the conclusion..
II. FOG ARCHITECTURE
Figure 1 depicts how communication happens between
Cloud, Fog and End user devices. Fog platform lies nearer to
end user devices rather than cloud. This is how fog nodes are
linked to each other. Fog to Fog, Fog to cloud and Fog to End
user devices are all communicating in bi-directional.
Possible Solutions on Security and Privacy Issues in Fog
Computing
Rashmi R, Dr R Ashok Kumar
International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
61
doi: 10.32622/ijrat.76S201913
 End user Devices / IOT devices – This consists of
physical devices such as Mobiles, Sensors,
actuators, tablets and others. These devices are
provided with global. positioning system [7].
 Fog Platform: This layer includes fog nodes and
does computing via Gateways, Switches, Router and
Access Points. Between fog nodes Storage and
Computing facilities are shared [7].
 Cloud Platform: This platform includes Servers and
Data Centers that has sufficient Storage and
Computing resource[7]
Figure 1: Fog Archiecture
This architecture is applicable to many applications such as
smart cities, healthcare, transportation (smart cars and traffic
control) , agriculture, hospital and financial services
III. RELATED SURVEY
A brief overview of different types of attacks are presented
in [1]. Saad Khan, Simon Parkinson and Yongrui Qin author’s
have provided the security issues and possible solutions and
recommendations for fog [2].Integration of IOT with Fog is
explained in[3]. VM’s can be attacked so a Conceptual. smart
pre-copy. live migration method is proposed for VM’s in [6]
to choose when to advance with stop and copy stage. Open
challenges and ongoing research in security and privacy
issues are highlighted by author’s in[5][7]. In order to support
location privacy a secure positioning protocol was proposed
in [8]. The authors in paper[9] have highlighted why data
protection. techniques of cloud cannot be directly. applied to
Fog.
IV. SECURITY THREATS IN FOG
 . Access control issues: Unauthorized user gets the
permission to acquire the data, change configuration and
install software.
 Account Hijacking: In order to carry out malicious activity
hijacking the user account. Phishing attack is used to
steal user data.
 Denial of service (DOS): Prevents the genuine users from
accessing the services or data.
 Eavesdropping: attackers tries to steal information from
systems when transmitted over network.
 Forgery: Attackers imitate user’s identity.
 Side channel attack: kind of hidden channel already exists
in hardware through which attacker can access.
 VM based attack: a kind of malicious attack through
servers, users could experience system failure.
 Impersonation attack: an attacker acts identical to reliable
server. They provide services that are offensive to users
by making the users to believe they are connecting to
genuine fog nodes[3].
 Man-in-the-middle attack: an attacker establishes an
momentary situation between the interactive nodes. Data
is altered without revealing to the users while they are
communicating the data with fog nodes[1].
 Data Tampering: Data is modified or deleted by
unauthorized channels.
 Stealth attack: Attackers hide malware command over the
network and control the fog services.
 Tampering Attack: Attacker can modify or drop or can
delay the data that is being transmitted thereby degrading
performance and efficiency [7].
 Spoofing: Attackers gains the access to system indicating
that messages are sent from trusted host.
 Resonance attack: Improper data is transmitted to fog node
by compulsory making the sensors to operate at diverse
frequencies.
 Sniffing attack: Stealing of end users devices data when
transmitted over the network.
V. SECURITY AND PRIVACY ISSUES
The following gives an understanding about the attacks,
possible solution and impact on the features of Fog.
Authentication and Authorization
This is first step in establishing relation between End
user devices/ IOT Devices and Fog nodes. Authorization
identifies as ―officially having accessing right‖ were as
Authentication is ―Action of proving‖. During the
establishment phase access right and identity of the node
which wants to connect is verified. For accessing storage and
processing services, end users should get authentic to the Fog
node. Traditional Public Key Infrastructure (PKI) along with
certificates is not appropriate due to resource limitations of
IOT devices [7].
Possible Threats:
 Man-.in-the.-middle attack
 Forgery attack
 Data Tampering
 Spoofing attack
 Stealth attack
 Access control issues
Impact:
Trusted end user data might get hacked by the attacker during
communication and these devices might not get the required
services.
Possible Solution:
International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
62
doi: 10.32622/ijrat.76S201913
 Multicast authentication using Public-Key Infrastructure
(PKI) [7]
 Diffie. Hellman key exchange
 Intrusion. Detection techniques
 Biometric-authentication-techniques:
 Face-authentication, Finger-print authentication,
Touch-based authentication.
 Certifying Authority (CA) [7]
 Fully homomorphism can be used to secure data
Virtualization
Virtualization can be hardware virtualization or
software virtualization. Hardware virtualization refers to a
virtual fog that allows Virtual Machines (VMs) to co-occur
in. a physical. server (host) so that multiple entities to share
the same physicalsystem. Software virtualization refers to
multiple operating system images run at a same time on a
piece of hardware. We can have virtual version of storage,
network, data, memory and software virtualization, with the
help of this delay and jitter can be decreased. Malicious VM’s
can take control over hardware and operating system and
modify the services in fog without security.
Possible Threats:
 Denial of service (DOS) attacks,
 VM based attack
 Side channel attack
 Impersonation attack
Impact:
Failure of hosted server’s result in absence of services
provided by them and resources [4].
Possible Solutions:
 Multi-Factor Authentication [2]
 Intrusion. Detection. system [2]
 Role-based access. control model
 Attribute based encryption [2]
 User-based permission model [2]
Data Security
Data security is an important aspect in fog system.
Data should be secured in fog system from unauthorized
access. While data is getting processed in fog, it will undergo
changes in its size, structure. and validity of data. Fog nodes
managed by different providers and individuals needs to be
checked for trustworthiness.
Possible Threats:
 Denial of service (DOS) attack
 Data ownership issue
 Illegal data access
 Data altering and erasing attack
 Data replication and sharing [2]
Impact:
Corruption, deletion of data present in database system of fog
nodes. Downtime caused to the trusted fog nodes.
Possible Solution:
 Encryption of sensitive data at end user devices then
transfers it to fog nodes.
 Secure. key management
 Data. Masking
 Network Monitoring
 Policy enforcement
Wireless Network Security
Network acts as a bridge between fog nodes and end
user devices and correspondingly between the fog nodes.
Network should be secure from malicious attack, if that
happens then it can spread malicious threats to connected
parties and also damages the working of that network itself.
Properly isolating the network can prevent the network from
spreading if infected.
Possible Threats:
 Packet sniffing
 Denial-of-Service (DoS) attack,
 Man in the middle attack
 Resonance attack
 Gateway attacks were recognized as likely attacks on
network infrastructure
Impact:
Wireless. access. points that are susceptible can compromise
features such as. privacy, accuracy, consistency, availability
and reliability of data. Performance of the fog nodes are
decreased by consuming the network resources such as
bandwidth.
Possible Solution:
 Antivirus [2]
 Encryption and authentication [2]
 Deployment of intrusion detection system (IDS) [6]
 Cloud watcher – for network monitoring [2]
 Virtual Private Network (VPN) – Isolating the network
from external attack [2]
Secure Communication
Secure Communication can be of three kinds
between end user devices, Fog nodes and cloud.
 Communication between end user devices and Fog
nodes.
 Communication within Fog nodes.
 Communication between fog nodes and cloud[10].
Possible Threats:
 Tampering attack
 Spamming attack
Impact:
Many bogus messages or wrong information can float around
the network [2].
Possible Solution:
International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
63
doi: 10.32622/ijrat.76S201913
 Homomorphic encryption techniques – Maintain data
secrecy and protect identities of devices once uploading
info from. devices to cloud.
 Lightweight encryption or masking algorithms can also
be used to protect the data secrecy.
Trust
All Devices in fog network should have certain level of
trust on one node to one more node. Trust play mutual role in
fog network for end user devices.
 End user devices should trust Fog nodes that they connect
are genuine.
 End user devices that send data to fog nodes are indeed
secure[5].
Possible Threats:
 Malicious attacks.
Impact:
Attacks causes sensors to be untrustworthy to avoid this trust
evaluation method to provide reliable connection among
sensors to fight against malicious attack
Possible Solution:
 Regionbased trust model – It’s a trust communication
amongst fog nodes at different region[5].
 Dynamic nature of end user devices and fog nodes uses
opinion-based model[4].
Privacy
Preservation of privacy data is extra challenging as
fog nodes are nearer with end users for collecting the
sensitive information. Sensitive data are not retrieved or
revealed to an illegal person is ensured by privacy [6].Fog
systems must let users to specify the privacy attributes of the
data that they own on the system [8]. Privacy can be
distinguished in terms of End user privacy, Location privacy
and Usage privacy.
Possible Threats:
 Eavesdropping or Sniffing attack
 Man-in-the-middle attack
Impact:
Sensitive data or personal information of end user can be
hacked. In case of location privacy attackers may provide
fake locations, so locations specified by one entity might not
reliable.
Possible Solution:
 Public key infrastructure for encrypting the data block at
end-user devices and decrypting that at fog nodes.
 Location verification protocols are used to support location
property
 Host Firewall with Network Location Awareness[11]
Position based cryptography[8]
VI. CONCLUSION
Fog is a computing paradigm present at the edge of
network to support end users. Cloud computing security
features cannot be functional to fog computing because of its
distinctive characteristics. This paper summarizes attacks,
possible solutions on security and privacy issues in Fog
computing. The major concerns in context to fog computing
are considered in this paper.
.
REFERENCES
[1]A. Aljumah and T. A. Ahanger, ―Fog computing and security issues: A
review,‖ 2018 7th Int. Conf. Comput. Commun. Control. ICCCC 2018
- Proc., no. Icccc, pp. 237–239, 2018.
[2]S. Khan, S. Parkinson, and Y. Qin, ―Fog computing security: a review of
current applications and security solutions,‖ J. Cloud Comput., vol. 6,
no. 1, 2017.
[3] H. F. Atlam, ―Fog Computing and the Internet of Things : A Review,‖
pp. 1–18, 2018.
[4]―Fog-IOT.‖ [Online]. Available:
https://internetofthingsagenda.techtarget.com/ definition
/fog-computing-fogging . [Accessed: 06-Mar-2019].
[5]P. Y. Zhang, M. C. Zhou, and G. Fortino, ―Security and trust issues in Fog
computing: A survey,‖ Futur. Gener. Comput. Syst., vol. 88, pp.
16–27, 2018.
[6]O. Osanaiye, S. Chen, Z. Yan, R. Lu, K. K. R. Choo, and M. Dlodlo,
―From Cloud to Fog Computing: A Review and a Conceptual Live VM
Migration Framework,‖ IEEE Access, vol. 5, no. c, pp. 8284–8300,
2017.
[7]M. Mukherjee et al., ―Security and Privacy in Fog Computing:
Challenges,‖ IEEE Access, vol. 5, pp. 19293–19304, 2017.
[8]R. Yang, Q. Xu, M. H. Au, Z. Yu, H. Wang, and L. Zhou, ―Position based
cryptography with location privacy: A step for Fog Computing,‖ Futur.
Gener. Comput. Syst., vol. 78, pp. 799–806, 2018.
[9] Y. Guan, J. Shao, G. Wei, and M. Xie, ―Data Security and Privacy in
Fog Computing,‖ IEEE Netw., vol. 32, no. 5, pp. 106–111, 2018.
[10] ―Open Fog Consortium.‖ [Online]. Available:
https://www.openfogconsortium.org/wp-content/uploads/OpenFog_R
eference_Architecture_2_09_17-FINAL.pdf. [Accessed:
20-Mar-2019].
[11]―ScienceDirect.‖[Online].Available:https://www.sciencedirect.com/to
pics/computer-science/location-awareness. [Accessed: 10-Mar-2019].
.

Weitere ähnliche Inhalte

Was ist angesagt?

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedtanvir616
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 

Was ist angesagt? (18)

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Trust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-convertedTrust management techniques_for_the_internet_of_things_a_survey-converted
Trust management techniques_for_the_internet_of_things_a_survey-converted
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
489 493
489 493489 493
489 493
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 

Ähnlich wie 76 s201913

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...BRNSSPublicationHubI
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Salam Shah
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxPrasannaKumarpanda2
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsVishwesh Nagamalla
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 

Ähnlich wie 76 s201913 (20)

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Fog computing
Fog computingFog computing
Fog computing
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...Security and Privacy in Fog Computing for the Internet of Things using Dynami...
Security and Privacy in Fog Computing for the Internet of Things using Dynami...
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
Appraisal of the Most Prominent Attacks due to Vulnerabilities in Cloud Compu...
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
A survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systemsA survey on secure communication protocols for io t systems
A survey on secure communication protocols for io t systems
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
 

Mehr von IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

Mehr von IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Kürzlich hochgeladen

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 

Kürzlich hochgeladen (20)

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

76 s201913

  • 1. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 60 doi: 10.32622/ijrat.76S201913  Abstract—Fog computing isa new paradigm that’san add-on to cloud computing in the network. It has similar characteristics to cloud computing such as computation, storage, control, network functions. Fog is closer to end-users but different in that it is de-centralised architecture. This platform is suitable for real time low latency applications like Internet of Things (IOT) devices. This paper surveys the effect of security issues and privacy issues with possible solutions in fog systems. Index Terms— Fog computing, cloud computing, Security threats, Privacy, Internet of Things I. INTRODUCTION The idea of Fog computing was first presented by CISCO in 2012. This platform refers to expanding cloud computing to the edge of an enterprise's network. Fog computing architecture is a scalable decentralized computing architecture different from cloud centralized architecture. Fog platform doesn’t exist on its own, this acts an intermediate between end users and cloud platform to process the communication. The basic framework of fog platform is similar to cloud platform but its architecture supports sensitive low latency applications [1]. Fog platform uses many edge devices such as router, switches and hub for processing, analyzing, aggregating and transmitting data of latency aware applications that’s why its named as fog computing [2]. Fog node can be any device that has the capacity of carrying out the computing, providing the storage, and does network connectivity. Fog system when compared to cloud system are relatively have small computing resources such as memory and storage but these resources can be enhanced on-demand. With the fast growth of Internet..of Things (IoT) requests, numerous challenges are faced by the cloud computing architecture such as high .latency, low capacity, network failure and long distance (multiple hops) between cloud and end users. Fog computing has brought the cloud nearer to end user devices such as IoT. Devices for addressing these challenges. It has offered processing of IoT information and storage close to IoT devices[3]. Manuscript revised May 13, 2019 and published on June 5, 2019 Rashmi R, Mtech Student, Dept of Information Science & Engineering, BMS college of Engineering, Bangalore, India Dr R Ashok Kumar, Associate Professor, Dept of Information Science & Engineering, BMS college of Engineering, Bangalore, India Different applications such as automation of home, monitoring of environment, traffic light that uses IOT devices are all connected physically. These applications generate huge data that are gathered. Features such as low latency, location. awareness and geographic distribution are important for applications that are not supported by IOT. Fog computing and IOT are integrated together in-order to support these features[4]. Instead of sending information to cloud for analysis, storage and processing. Fog computing does all of these, this helps in improving the efficiency and decreases the amount of information that sent to cloud. Many companies such as CISCO, Dell, Microsoft. Corp. have dedicated to explore and development of Fog. To enable scalability and interoperability feature, OpenFog Consortium workgroup are working to create an open architecture for Fog [5]. Fog platform has the following characteristics:  Quick enough to respond to low latency applications.  Can process large amount of data locally due to which performance increases.  Services like storage, computation, memory are virtualized and are located at the edge of source premises.  Supports Geographic distribution of Fog nodes.  Software installation on Heterogeneous hardware.  Support for Mobility and Location Awareness.  Reduces Network Congestion. Services provided by Fog are disrupted by malicious attack. These attacks can happen either internally or from external sources by consuming the resources. Thereby reducing bandwidth and interrupt the services provided by fog to genuine end users. In this paper we highlight security and privacy issues with possible solutions [6]. The paper is organized. as follows: section II includes the connection among cloud and user devices, section III includes the literature survey, section IV includes the different types of attacks in fog platform, section V includes the security and privacy issues and finally section VI included the conclusion.. II. FOG ARCHITECTURE Figure 1 depicts how communication happens between Cloud, Fog and End user devices. Fog platform lies nearer to end user devices rather than cloud. This is how fog nodes are linked to each other. Fog to Fog, Fog to cloud and Fog to End user devices are all communicating in bi-directional. Possible Solutions on Security and Privacy Issues in Fog Computing Rashmi R, Dr R Ashok Kumar
  • 2. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 61 doi: 10.32622/ijrat.76S201913  End user Devices / IOT devices – This consists of physical devices such as Mobiles, Sensors, actuators, tablets and others. These devices are provided with global. positioning system [7].  Fog Platform: This layer includes fog nodes and does computing via Gateways, Switches, Router and Access Points. Between fog nodes Storage and Computing facilities are shared [7].  Cloud Platform: This platform includes Servers and Data Centers that has sufficient Storage and Computing resource[7] Figure 1: Fog Archiecture This architecture is applicable to many applications such as smart cities, healthcare, transportation (smart cars and traffic control) , agriculture, hospital and financial services III. RELATED SURVEY A brief overview of different types of attacks are presented in [1]. Saad Khan, Simon Parkinson and Yongrui Qin author’s have provided the security issues and possible solutions and recommendations for fog [2].Integration of IOT with Fog is explained in[3]. VM’s can be attacked so a Conceptual. smart pre-copy. live migration method is proposed for VM’s in [6] to choose when to advance with stop and copy stage. Open challenges and ongoing research in security and privacy issues are highlighted by author’s in[5][7]. In order to support location privacy a secure positioning protocol was proposed in [8]. The authors in paper[9] have highlighted why data protection. techniques of cloud cannot be directly. applied to Fog. IV. SECURITY THREATS IN FOG  . Access control issues: Unauthorized user gets the permission to acquire the data, change configuration and install software.  Account Hijacking: In order to carry out malicious activity hijacking the user account. Phishing attack is used to steal user data.  Denial of service (DOS): Prevents the genuine users from accessing the services or data.  Eavesdropping: attackers tries to steal information from systems when transmitted over network.  Forgery: Attackers imitate user’s identity.  Side channel attack: kind of hidden channel already exists in hardware through which attacker can access.  VM based attack: a kind of malicious attack through servers, users could experience system failure.  Impersonation attack: an attacker acts identical to reliable server. They provide services that are offensive to users by making the users to believe they are connecting to genuine fog nodes[3].  Man-in-the-middle attack: an attacker establishes an momentary situation between the interactive nodes. Data is altered without revealing to the users while they are communicating the data with fog nodes[1].  Data Tampering: Data is modified or deleted by unauthorized channels.  Stealth attack: Attackers hide malware command over the network and control the fog services.  Tampering Attack: Attacker can modify or drop or can delay the data that is being transmitted thereby degrading performance and efficiency [7].  Spoofing: Attackers gains the access to system indicating that messages are sent from trusted host.  Resonance attack: Improper data is transmitted to fog node by compulsory making the sensors to operate at diverse frequencies.  Sniffing attack: Stealing of end users devices data when transmitted over the network. V. SECURITY AND PRIVACY ISSUES The following gives an understanding about the attacks, possible solution and impact on the features of Fog. Authentication and Authorization This is first step in establishing relation between End user devices/ IOT Devices and Fog nodes. Authorization identifies as ―officially having accessing right‖ were as Authentication is ―Action of proving‖. During the establishment phase access right and identity of the node which wants to connect is verified. For accessing storage and processing services, end users should get authentic to the Fog node. Traditional Public Key Infrastructure (PKI) along with certificates is not appropriate due to resource limitations of IOT devices [7]. Possible Threats:  Man-.in-the.-middle attack  Forgery attack  Data Tampering  Spoofing attack  Stealth attack  Access control issues Impact: Trusted end user data might get hacked by the attacker during communication and these devices might not get the required services. Possible Solution:
  • 3. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 62 doi: 10.32622/ijrat.76S201913  Multicast authentication using Public-Key Infrastructure (PKI) [7]  Diffie. Hellman key exchange  Intrusion. Detection techniques  Biometric-authentication-techniques:  Face-authentication, Finger-print authentication, Touch-based authentication.  Certifying Authority (CA) [7]  Fully homomorphism can be used to secure data Virtualization Virtualization can be hardware virtualization or software virtualization. Hardware virtualization refers to a virtual fog that allows Virtual Machines (VMs) to co-occur in. a physical. server (host) so that multiple entities to share the same physicalsystem. Software virtualization refers to multiple operating system images run at a same time on a piece of hardware. We can have virtual version of storage, network, data, memory and software virtualization, with the help of this delay and jitter can be decreased. Malicious VM’s can take control over hardware and operating system and modify the services in fog without security. Possible Threats:  Denial of service (DOS) attacks,  VM based attack  Side channel attack  Impersonation attack Impact: Failure of hosted server’s result in absence of services provided by them and resources [4]. Possible Solutions:  Multi-Factor Authentication [2]  Intrusion. Detection. system [2]  Role-based access. control model  Attribute based encryption [2]  User-based permission model [2] Data Security Data security is an important aspect in fog system. Data should be secured in fog system from unauthorized access. While data is getting processed in fog, it will undergo changes in its size, structure. and validity of data. Fog nodes managed by different providers and individuals needs to be checked for trustworthiness. Possible Threats:  Denial of service (DOS) attack  Data ownership issue  Illegal data access  Data altering and erasing attack  Data replication and sharing [2] Impact: Corruption, deletion of data present in database system of fog nodes. Downtime caused to the trusted fog nodes. Possible Solution:  Encryption of sensitive data at end user devices then transfers it to fog nodes.  Secure. key management  Data. Masking  Network Monitoring  Policy enforcement Wireless Network Security Network acts as a bridge between fog nodes and end user devices and correspondingly between the fog nodes. Network should be secure from malicious attack, if that happens then it can spread malicious threats to connected parties and also damages the working of that network itself. Properly isolating the network can prevent the network from spreading if infected. Possible Threats:  Packet sniffing  Denial-of-Service (DoS) attack,  Man in the middle attack  Resonance attack  Gateway attacks were recognized as likely attacks on network infrastructure Impact: Wireless. access. points that are susceptible can compromise features such as. privacy, accuracy, consistency, availability and reliability of data. Performance of the fog nodes are decreased by consuming the network resources such as bandwidth. Possible Solution:  Antivirus [2]  Encryption and authentication [2]  Deployment of intrusion detection system (IDS) [6]  Cloud watcher – for network monitoring [2]  Virtual Private Network (VPN) – Isolating the network from external attack [2] Secure Communication Secure Communication can be of three kinds between end user devices, Fog nodes and cloud.  Communication between end user devices and Fog nodes.  Communication within Fog nodes.  Communication between fog nodes and cloud[10]. Possible Threats:  Tampering attack  Spamming attack Impact: Many bogus messages or wrong information can float around the network [2]. Possible Solution:
  • 4. International Journal of Research in Advent Technology, Vol.7, No.6S, June 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 63 doi: 10.32622/ijrat.76S201913  Homomorphic encryption techniques – Maintain data secrecy and protect identities of devices once uploading info from. devices to cloud.  Lightweight encryption or masking algorithms can also be used to protect the data secrecy. Trust All Devices in fog network should have certain level of trust on one node to one more node. Trust play mutual role in fog network for end user devices.  End user devices should trust Fog nodes that they connect are genuine.  End user devices that send data to fog nodes are indeed secure[5]. Possible Threats:  Malicious attacks. Impact: Attacks causes sensors to be untrustworthy to avoid this trust evaluation method to provide reliable connection among sensors to fight against malicious attack Possible Solution:  Regionbased trust model – It’s a trust communication amongst fog nodes at different region[5].  Dynamic nature of end user devices and fog nodes uses opinion-based model[4]. Privacy Preservation of privacy data is extra challenging as fog nodes are nearer with end users for collecting the sensitive information. Sensitive data are not retrieved or revealed to an illegal person is ensured by privacy [6].Fog systems must let users to specify the privacy attributes of the data that they own on the system [8]. Privacy can be distinguished in terms of End user privacy, Location privacy and Usage privacy. Possible Threats:  Eavesdropping or Sniffing attack  Man-in-the-middle attack Impact: Sensitive data or personal information of end user can be hacked. In case of location privacy attackers may provide fake locations, so locations specified by one entity might not reliable. Possible Solution:  Public key infrastructure for encrypting the data block at end-user devices and decrypting that at fog nodes.  Location verification protocols are used to support location property  Host Firewall with Network Location Awareness[11] Position based cryptography[8] VI. CONCLUSION Fog is a computing paradigm present at the edge of network to support end users. Cloud computing security features cannot be functional to fog computing because of its distinctive characteristics. This paper summarizes attacks, possible solutions on security and privacy issues in Fog computing. The major concerns in context to fog computing are considered in this paper. . REFERENCES [1]A. Aljumah and T. A. Ahanger, ―Fog computing and security issues: A review,‖ 2018 7th Int. Conf. Comput. Commun. Control. ICCCC 2018 - Proc., no. Icccc, pp. 237–239, 2018. [2]S. Khan, S. Parkinson, and Y. Qin, ―Fog computing security: a review of current applications and security solutions,‖ J. Cloud Comput., vol. 6, no. 1, 2017. [3] H. F. Atlam, ―Fog Computing and the Internet of Things : A Review,‖ pp. 1–18, 2018. [4]―Fog-IOT.‖ [Online]. Available: https://internetofthingsagenda.techtarget.com/ definition /fog-computing-fogging . [Accessed: 06-Mar-2019]. [5]P. Y. Zhang, M. C. Zhou, and G. Fortino, ―Security and trust issues in Fog computing: A survey,‖ Futur. Gener. Comput. Syst., vol. 88, pp. 16–27, 2018. [6]O. Osanaiye, S. Chen, Z. Yan, R. Lu, K. K. R. Choo, and M. Dlodlo, ―From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework,‖ IEEE Access, vol. 5, no. c, pp. 8284–8300, 2017. [7]M. Mukherjee et al., ―Security and Privacy in Fog Computing: Challenges,‖ IEEE Access, vol. 5, pp. 19293–19304, 2017. [8]R. Yang, Q. Xu, M. H. Au, Z. Yu, H. Wang, and L. Zhou, ―Position based cryptography with location privacy: A step for Fog Computing,‖ Futur. Gener. Comput. Syst., vol. 78, pp. 799–806, 2018. [9] Y. Guan, J. Shao, G. Wei, and M. Xie, ―Data Security and Privacy in Fog Computing,‖ IEEE Netw., vol. 32, no. 5, pp. 106–111, 2018. [10] ―Open Fog Consortium.‖ [Online]. Available: https://www.openfogconsortium.org/wp-content/uploads/OpenFog_R eference_Architecture_2_09_17-FINAL.pdf. [Accessed: 20-Mar-2019]. [11]―ScienceDirect.‖[Online].Available:https://www.sciencedirect.com/to pics/computer-science/location-awareness. [Accessed: 10-Mar-2019]. .