Skip to main content
Log in

Unboxing fog security: a review of fog security and authentication mechanisms

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a strong need to bring connectivity to a very accessible level. To enable the execution of real-time applications at the device end or network edge for connected devices, fog computing was introduced. Due to the resource constraint nature and geographical distribution of fog devices, security and privacy concerns may arise. With an increased number of smart devices, authentication is turning to be more and more vital to enable secure communication for fog-based applications. Hence, it is mandatory to use a strong authentication mechanism for each device or application installed in the fog network system. Our survey paper focuses on a complete understanding of fog computing in terms of its architecture, features, and security. We have done a rigorous study on existing authentication mechanisms with their working principles, performance, and limitations. Also, we provided a taxonomy of security issues in fog computing for a better understanding of all security concerns that would help the researchers to work in the right direction in this domain. To design an effective authentication system for fog security, we provided future research directions and open challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Availability of data and materials

Not applicable

References

  1. Aazam M, Huh EN (2015) Fog computing micro datacenter based dynamic resource estimation and pricing model for IoT. In: 2015 IEEE 29th international conference on advanced information networking and applications (pp 687-694). IEEE

  2. Abbas N, Asim M, Tariq N, Baker T, Abbas S (2019) A mechanism for securing IoT-enabled applications at the fog layer. J Sens Actuator Netw 8(1):16

    Article  Google Scholar 

  3. Abraham WK, Saravanan S, Smith K (2019) Security and privacy challenges in fog computing. In: International conference on fog computing

  4. Adel A (2020) Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective. J Big Data 7(1):1–29

    Article  Google Scholar 

  5. Akello P, Beebe NL, Choo KKR (2022) A literature survey of security issues in cloud, fog, and edge IT infrastructure. Electron Comm Res 1-35

  6. Albakri A, Maddumala M, Harn L (2018) Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 1593-1597). IEEE

  7. Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, Ye Z (2017) Secure the internet of things with challenge response authentication in fog computing. In: 2017 IEEE 36th international performance computing and communications conference (IPCCC) (pp 1-2). IEEE

  8. Ali Z, Chaudhry SA, Mahmood K, Garg S, Lv Z, Zikria YB (2021) A clogging resistant secure authentication scheme for fog computing services. Comput Netw 185:107731

    Article  Google Scholar 

  9. Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th international conference on computer systems and applications (AICCSA) (pp 1-8). IEEE

  10. Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42

    Article  Google Scholar 

  11. Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42

    Article  Google Scholar 

  12. Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A (2021) Fog computing security and privacy for the Internet of Thing applications: state-of-the-art. Secur Priv 4(2):e145

    Article  Google Scholar 

  13. Amanlou S, Hasan MK, Bakar KAA (2021) Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model. Comput Netw 199:108465

    Article  Google Scholar 

  14. Arivazhagan C, Natarajan V (2020) A survey on fog computing paradigms, challenges and opportunities in IoT. In: 2020 international conference on communication and signal processing (ICCSP) (pp 0385-0389). IEEE

  15. Arun M, Balamurali S, Rawal BS, Duan Q, Kumar RL, Balamurugan B (2020) Mutual authentication and authorized data access between fog and user based on blockchain technology. In: IEEE INFOCOM 2020-IEEE conference on computer communications workshops (INFOCOM WKSHPS) (pp 37-42). IEEE

  16. Atlam HF, Walters RJ, Wills GB (2018) Fog computing and the internet of things: a review. Big Data Cognit Comput 2(2):10

    Article  Google Scholar 

  17. Baccarelli E, Naranjo PGV, Scarpiniti M, Shojafar M, Abawajy JH (2017) Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 5:9882–9910

    Article  Google Scholar 

  18. Bavishi J, Shaikh MS, Patel R (2020) Scalable and efficient mutual authentication strategy in fog computing. In: 2020 8th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud) (pp 77-83). IEEE

  19. Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the Internet of Things. Pervasive Mob Comput 52:71–99

    Article  Google Scholar 

  20. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp 13-16)

  21. Brogi A, Forti S (2017) QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J 4(5):1185–1192

    Article  Google Scholar 

  22. Chakraborty A, Kumar M, Chaurasia N, Gill SS (2023) Journey from cloud of things to fog of things: survey, new trends, and research directions. Softw Pract Exp 53(2):496–551

    Article  Google Scholar 

  23. Chatterjee U, Ray S, Khan MK, Dasgupta M, Chen CM (2022) An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing. Computing 104(6):1359–1395

    Article  Google Scholar 

  24. Chaudhry SA, Albeshri A, Xiong N, Lee C, Shon T (2017) A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust Comput 20(2):1223–1236

    Article  Google Scholar 

  25. Chen CM, Huang Y, Wang KH, Kumari S, Wu ME (2020) A secure authenticated and key exchange scheme for fog computing. Enterprise Inf Syst 1-16

  26. Choo KKR, Gai K, Chiaraviglio L, Yang Q (2020) A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management

  27. Din IU, Ahmad B, Almogren A, Almajed H, Mohiuddin I, Rodrigues JJ (2020) Left-right-front caching strategy for vehicular networks in ICN-based Internet of Things. IEEE Access 9:595–605

    Article  Google Scholar 

  28. Dolui K, Datta SK (2017) Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 global Internet of Things summit (GIoTS) (pp 1-6). IEEE

  29. Dong MT, Xu H (2020) Group key management scheme for multicast communication fog computing networks. Processes 8(10):1300

    Article  Google Scholar 

  30. Ekanayake BN, Halgamuge MN, Syed A (2018) Security and privacy issues of fog computing for the internet of things (IoT). In: Cognitive computing for big data systems over IoT, 139-174

  31. Elkhodr M, Shahrestani S, Cheung H (2016) The internet of things: new interoperability, management and security challenges. arXiv preprint arXiv:1604.04824

  32. Forti S, Ibrahim A, Brogi A (2019) Mimicking FogDirector application management. SICS Softw Intens Cyber Phys Syst 34:151–161

    Article  Google Scholar 

  33. Forti S, Pagiaro A, Brogi A (2020) Simulating fogdirector application management. Simul Model Pract Theory 101:102021

    Article  Google Scholar 

  34. Garg T, Kagalwalla N, Churi P, Pawar A, Deshmukh S (2020) A survey on security and privacy issues in IoV. Int J Electr Comput Eng 10(5):2088–8708

    Google Scholar 

  35. Giang NK, Blackstock M, Lea R, Leung VC (2015) Developing IoT applications in the fog: a distributed dataflow approach. In: 2015 5th international conference on the Internet of Things (IOT) (pp 155-162). IEEE

  36. Gope P (2019) LAAP: lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Comput Secur 86:223–237

    Article  Google Scholar 

  37. Gowda NC, Manvi SS, Malakreddy B, Lorenz P (2023) BSKM-FC: blockchain-based secured key management in a fog computing environment. Future Gener Comput Syst

  38. Gowda NC, Manvi SS (2021) An efficient authentication scheme for fog computing environment using symmetric cryptographic methods. In: 2021 IEEE 9th region 10 humanitarian technology conference (R10-HTC), 2021, pp 01-06, https://doi.org/10.1109/R10-HTC53172.2021.9641591

  39. Group OCAW, et al. (2016) OpenFog architecture overview. White Paper, pp. 1-35

  40. Guan Y, Shao J, Wei G, Xie M (2018) Data security and privacy in fog computing. IEEE Network 32(5):106–111

    Article  Google Scholar 

  41. Guo Y, Guo Y (2021) FogHA: an efficient handover authentication for mobile devices in fog computing. Comput Secur 102358

  42. Guo Y, Zhang Z, Guo Y (2020) Fog-centric authenticated key agreement scheme without trusted parties. IEEE Syst J

  43. Gupta H, Vahid Dastjerdi A, Ghosh SK, Buyya R (2017) iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw Pract Exp 47(9):1275–1296

    Article  Google Scholar 

  44. Hafeez M, Sumra IA (2019) Fog computing security and privacy issues: a survey. Eng Sci Technol Int Res J 3(4):80–86

    Google Scholar 

  45. Han M, Liu S, Ma S, Wan A (2020) Anonymous-authentication scheme based on fog computing for VANET. PLoS ONE 15(2):e0228319

    Article  Google Scholar 

  46. Hassen HB, Ayari N, Hamdi B (2020) A home hospitalization system based on the Internet of things, fog computing and cloud computing. Inf Med Unlock 20:100368

    Article  Google Scholar 

  47. Hassen HB, Ayari N, Hamdi B (2020) A home hospitalization system based on the Internet of things, fog computing and cloud computing. Inf Med Unlock 20:100368

    Article  Google Scholar 

  48. Heydari M, Mylonas A, Katos V, Balaguer-Ballester E, Tafreshi VHF, Benkhelifa E (2019) Uncertainty-aware authentication model for fog computing in IoT. In: 2019 fourth international conference on fog and mobile edge computing (FMEC) (pp 52-59). IEEE

  49. Hosseinpour F, Plosila J, Tenhunen H (2016) An approach for smart management of big data in the fog computing context. In: 2016 IEEE international conference on cloud computing technology and science (CloudCom) (pp 468-471). IEEE

  50. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42

    Article  Google Scholar 

  51. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42

    Article  Google Scholar 

  52. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42

    Article  Google Scholar 

  53. Huang B, Cheng X, Cao Y, Zhang L (2018) Lightweight hardware based secure authentication scheme for fog computing. In: 2018 IEEE/ACM symposium on edge computing (SEC) (pp 433-439). IEEE

  54. Ibrahim MH (2016) Octopus: an edge-fog mutual authentication scheme. Int J Netw Secur 18(6):1089–1101

    MathSciNet  Google Scholar 

  55. Ijaz M, Li G, Lin L, Cheikhrouhou O, Hamam H, Noor A (2021) Integration and applications of fog computing and cloud computing based on the Internet of Things for provision of healthcare services at home. Electronics 10(9):1077

    Article  Google Scholar 

  56. Imine Y, Kouicem DE, Bouabdallah A, Ahmed L (2018) MASFOG: an efficient mutual authentication scheme for fog computing architecture. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE) (pp 608-613). IEEE

  57. Intharawijitr K, Iida K, Koga H (2016) Analysis of fog model considering computing and communication latency in 5G cellular networks. In: 2016 IEEE international conference on pervasive computing and communication workshops (PerCom workshops) (pp 1-4). IEEE

  58. Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw 25(8):4737–4750

    Article  Google Scholar 

  59. Kalaria R, Kayes ASM, Rahayu W, Pardede E (2021) A secure mutual authentication approach to fog computing environment. Comput Secur 111:102483

    Article  Google Scholar 

  60. Katal A, Sethi V (2023) Communication protocols in fog computing: a survey and challenges. In: Fog computing (pp 153-170). Chapman and Hall/CRC

  61. Kaur J, Agrawal A, Khan RA (2020) Security issues in fog environment: a systematic literature review. Int J Wirel Inf Netw 27:467–483

    Article  Google Scholar 

  62. Kaur K, Garg S, Kaddoum G, Gagnon F, Ahmed SH (2019) Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: 2019 IEEE international conference on communications workshops (ICC workshops) (pp 1-6). IEEE

  63. Khalid T, Abbasi MAK, Zuraiz M, Khan AN, Ali M, Ahmad RW, Aslam M (2021) A survey on privacy and access control schemes in fog computing. Int J Commun Syst 34(2):e4181

    Article  Google Scholar 

  64. Khalid M, Mujahid U, Muhammad NUI (2019) Ultralightweight RFID authentication protocols for low-cost passive RFID tags. Secur Commun Netw

  65. Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6(1):1–22

    Article  Google Scholar 

  66. Kumar P, Zaidi N, Choudhury T (2016, November) Fog computing: common security issues and proposed countermeasures. In: 2016 international conference system modeling & advancement in research trends (SMART) (pp 311-315). IEEE

  67. Lee TF, Chen WY (2021) Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things. J Inf Secur Appl 59:102817

    Google Scholar 

  68. Lee K, Kim D, Ha D, Rajput U, Oh H (2015) On security and privacy issues of fog computing supported Internet of Things environment. In: 2015 6th international conference on the network of the future (NOF) (pp 1-3). IEEE

  69. Lera I, Guerrero C, Juiz C (2019) YAFS: a simulator for IoT scenarios in fog computing. IEEE Access 7:91745–91758

    Article  Google Scholar 

  70. Li Z, Liu Y, Liu D, Li C, Cui W, Hu G (2018) A key management scheme based on hypergraph for fog computing. China Commun 15(11):158–170

    Article  Google Scholar 

  71. Linthicum DS (2017) Connecting fog and cloud computing. IEEE Cloud Comput 4(2):18–20

    Article  Google Scholar 

  72. Liu X, Fan L, Xu J, Li X, Gong L, Grundy J, Yang Y (2019) FogWorkflowSim: an automated simulation toolkit for workflow performance evaluation in fog computing. In: 2019 34th IEEE/ACM international conference on automated software engineering (ASE) (pp 1114-1117). IEEE

  73. Lopes MM, Higashino WA, Capretz MA, Bittencourt LF (2017) Myifogsim: a simulator for virtual machine migration in fog computing. In: Companion proceedings of the 10th international conference on utility and cloud computing (pp 47-52)

  74. Machado JDS, Moreno ED, Ribeiro ADRL (2020) A survey on fog computing and its research challenges. Int J Grid Util Comput 11(4):486–495

    Article  Google Scholar 

  75. Manzoor A, Shah MA, Khattak HA, Din IU, Khan MK (2019) Multi-tier authentication schemes for fog computing: architecture, security perspective, and challenges. Int J Commun Syst e4033

  76. Margariti SV, Dimakopoulos VV, Tsoumanis G (2020) Modeling and simulation tools for fog computing-a comprehensive survey from a cost perspective. Future Internet 12(5):89

    Article  Google Scholar 

  77. Mohan N, Kangasharju J (2016) Edge-Fog cloud: a distributed cloud for Internet of Things computations. In: 2016 cloudification of the Internet of Things (CIoT) (pp 1-6). IEEE

  78. Mookherji S, Odelu V, Prasath R, Das AK, Park Y (2023) Fog-based single sign-on authentication protocol for electronic healthcare applications. IEEE Internet Things J

  79. Mostafavi S, Shafik W (2019) Fog computing architectures, privacy and security solutions. J Commun Technol Electron Comput Sci 24:1–14

    Google Scholar 

  80. Mounnan O, El Mouatasim A, Manad O, Hidar T, Abou El Kalam A, Idboufker N (2020) Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 fifth international conference on fog and mobile edge computing (FMEC) (pp 347-352). IEEE

  81. Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2017) A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun Surv Tutor 20(1):416–464

    Article  Google Scholar 

  82. Moura J, Hutchison D (2020) Fog computing systems: state of the art, research issues and future trends, with a focus on resilience. J Netw Comput Appl 102784

  83. Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304

    Article  Google Scholar 

  84. Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: fundamental, network applications, and research challenges. IEEE Commun Surv Tutor 20(3):1826–1857

    Article  Google Scholar 

  85. Munir A, Kansakar P, Khan SU (2017) IFCIoT: integrated fog cloud IoT: a novel architectural paradigm for the future Internet of Things. IEEE Consum Electron Mag 6(3):74–82

    Article  Google Scholar 

  86. Mutlag AA, Khanapi Abd Ghani M, Mohammed MA, Maashi MS, Mohd O, Mostafa SA, de la Torre Díez I (2020) MAFC: multi-agent fog computing model for healthcare critical tasks management. Sensors 20(7):1853

    Article  Google Scholar 

  87. Naha RK, Garg S, Chan A (2018) Fog computing architecture: survey and challenges. arXiv preprint arXiv:1811.09047

  88. Nath SB, Gupta H, Chakraborty S, Ghosh SK (2018) A survey of fog computing and communication: current researches and future directions. arXiv preprint arXiv:1804.04365

  89. Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun Surv Tutor 20(1):601–628

    Article  Google Scholar 

  90. Pallavi KN, Kumar VR (2021) Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment. Wirel Pers Commun 116(4):3039–3060

    Article  Google Scholar 

  91. Patwary AAN, Fu A, Naha RK, Battula SK, Garg S, Patwary MAK, Aghasian E (2020) Authentication, access control, privacy, threats and trust management towards securing fog computing environments: a review. arXiv preprint arXiv:2003.00395

  92. Patwary AAN, Fu A, Battula SK, Naha RK, Garg S, Mahanti A (2020) FogAuthChain: a secure location-based authentication scheme in fog computing environments using Blockchain. Comput Commun 162:212–224

    Article  Google Scholar 

  93. Patwary AAN, Naha RK, Garg S, Battula SK, Patwary MAK, Aghasian E, Gong M (2021) Towards secure fog computing: a survey on trust management, privacy, authentication, threats and access control. Electronics 10(10):1171

    Article  Google Scholar 

  94. Petac E, Petac AO (2016) About security solutions in fog computing. Ovidius Univ Ann Econ Sci Ser 16(1):380–385

    Google Scholar 

  95. Pokorni SJ (2019) Reliability and availability of the Internet of Things. Vojnotehnički glasnik 67(3):588–600

    Article  Google Scholar 

  96. Puliafito C, Mingozzi E, Longo F, Puliafito A, Rana O (2019) Fog computing for the internet of things: a survey. ACM Trans Internet Technol (TOIT) 19(2):1–41

    Article  Google Scholar 

  97. Puliafito C, Gonçalves DM, Lopes MM, Martins LL, Madeira E, Mingozzi E, Bittencourt LF (2020) MobFogSim: simulation of mobility and migration for fog computing. Simul Model Pract Theory 101:102062

    Article  Google Scholar 

  98. Puthal D, Mohanty SP, Bhavake SA, Morgan G, Ranjan R (2019) Fog computing security challenges and future directions bibenergy and security. IEEE Consum Electron Mag 8(3):92–96

    Article  Google Scholar 

  99. Qayyum T, Malik AW, Khattak MAK, Khalid O, Khan SU (2018) FogNetSim++: a toolkit for modeling and simulation of distributed fog environment. IEEE Access 6:63570–63583

    Article  Google Scholar 

  100. Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621

    Article  Google Scholar 

  101. Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621

    Article  Google Scholar 

  102. Rahman G, Wen CC (2018) Fog computing, applications, security and challenges, review. Int J Eng Technol 7(3):1615–1621

    Article  Google Scholar 

  103. Rahmani AM, Mohammadi M, Rashidi S, Lansky J, Mildeova S, Safkhani M, Hosseinzadeh M (2021) Questioning the security of three recent authentication and key agreement protocols. IEEE Access 9:98204–98217

    Article  Google Scholar 

  104. Rana M, Mahmood K, Saleem MA, Al-Turjman F, Kolhar MS, Altrjman C (2023) Towards a provably secure authentication protocol for fog-driven IoT-based systems. Appl Sci 13(3):1424

    Article  Google Scholar 

  105. Rayani PK, Bhushan B, Thakare VR (2018) Multi-layer token based authentication through honey password in fog computing. Int J Fog Comput (IJFC) 1(1):50–62

    Article  Google Scholar 

  106. Rezapour R, Asghari P, Javadi HHS, Ghanbari S (2021) Security in fog computing: a systematic review on issues, challenges and solutions. Comput Sci Rev 41:100421

    Article  MATH  Google Scholar 

  107. Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698

    Article  Google Scholar 

  108. Saad M (2018) Fog computing and its role in the internet of things: concept, security and privacy issues. Int J Comput Appl 180(32):7–9

    Google Scholar 

  109. Saad ZM, Mhmood MR (2023) Fog computing system for internet of things: survey. Texas J Eng Technol 16:1–10

    Google Scholar 

  110. Sabireen H, Neelanarayanan VJIE (2021) A review on fog computing: architecture, fog with IoT, algorithms and research challenges. Ict Express 7(2):162–176

    Article  Google Scholar 

  111. Saharan KP, Kumar A (2015) Fog in comparison to cloud: a survey. Int J Comput Appl 122(3)

  112. Saleem MA, Mahmood K, Kumari S (2020) Comments on AKM-IoV: authenticated key management protocol in fog computing-based Internet of Vehicles deployment’. IEEE Internet Things J 7(5):4671–4675

    Article  Google Scholar 

  113. Sarhan QI (2018) Internet of things: a survey of challenges and issues. Int J Internet Things Cyber-Assur 1(1):40–75

    Article  Google Scholar 

  114. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  115. Sicari S, Rizzardi A, Coen-Porisini A (2022) Insights into security and privacy towards fog computing evolution. Comput Secur 102822

  116. Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24(3):1643–1657

    Article  Google Scholar 

  117. Singh J, Singh P, Gill SS (2021) Fog computing: a taxonomy, systematic review, current trends and research challenges. J Parallel Distribut Comput 157:56–85

    Article  Google Scholar 

  118. Son S, Lee J, Kim M, Yu S, Das AK, Park Y (2020) Design of secure authentication protocol for cloud-assisted telecare medical information system using blockchain. IEEE Access 8:192177–192191

    Article  Google Scholar 

  119. Stojmenovic I (2014, November) Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian telecommunication networks and applications conference (ATNAC) (pp 117-122). IEEE

  120. Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: Mitigating insider data theft attacks in the cloud. In: 2012 IEEE symposium on security and privacy workshops (pp 125-128). IEEE

  121. Sun Y, Zhang N (2017) A resource-sharing model based on a repeated game in fog computing. Saudi J Biol Sci 24(3):687–694

    Article  Google Scholar 

  122. Tange K, De Donno M, Fafoutis X, Dragoni N (2020) A systematic survey of industrial Internet of Things security: requirements and fog computing opportunities. IEEE Commun Surv Tutor 22(4):2489–2520

    Article  Google Scholar 

  123. Tawalbeh LA, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security: challenges and solutions. Appl Sci 10(12):4102

    Article  Google Scholar 

  124. Tuli S, Mahmud R, Tuli S, Buyya R (2019) Fogbus: a blockchain-based lightweight framework for edge and fog computing. J Syst Softw 154:22–36

    Article  Google Scholar 

  125. Vasudev H, Das D, Vasilakos AV (2020) Secure message propagation protocols for IoVs communication components. Comput Electr Eng 82:106555

    Article  Google Scholar 

  126. Veerraju T, Kumar KK (2018) A survey on fog computing: research challenges in security and privacy issues. Int J Eng Technol 7(2.7):335–340

    Article  Google Scholar 

  127. Verma U, Bhardwaj D (2020) Design of lightweight authentication protocol for fog enabled Internet of Things-a centralized authentication framework. Int J Commun Netw Inf Secur 12(2):162–167

    Google Scholar 

  128. Vigano L (2006) Automated security protocol analysis with the AVISPA tool. Electronic Notes in Theoretical Computer Science 155:61–86

    Article  Google Scholar 

  129. Wang L, An H, Chang Z (2020) Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture. IEEE Access 8:97267–97278

    Article  Google Scholar 

  130. Wang F, Wang J, Yang W (2021) Efficient incremental authentication for the updated data in fog computing. Futur Gener Comput Syst 114:130–137

    Article  Google Scholar 

  131. Wazid M, Bagga P, Das AK, Shetty S, Rodrigues JJ, Park Y (2019) AKM-IoV: authenticated key management protocol in fog computing-based Internet of vehicles deployment. IEEE Internet Things J 6(5):8804–8817

    Article  Google Scholar 

  132. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492

    Article  Google Scholar 

  133. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492

    Article  Google Scholar 

  134. Wazid M, Das AK, Shetty S, Gope P, Rodrigues JJ (2020) Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap. IEEE Access 9:4466–4489

    Article  Google Scholar 

  135. Wheelus C, Zhu X (2020) Iot network security: threats, risks, and a data-driven defense framework. IoT 1(2):259–285

    Article  Google Scholar 

  136. Wu TY, Guo X, Chen YC, Kumari S, Chen CM (2022) Sgxap: Sgx-based authentication protocol in iov-enabled fog computing. Symmetry 14(7):1393

    Article  Google Scholar 

  137. Xia Z, Fang Z, Gu K, Wang J, Tan J, Wang G (2021) Effective charging identity authentication scheme based on fog computing in V2G networks. J Inf Secur Appl 58:102649

    Google Scholar 

  138. Xiong H, Mei Q, Zhao Y (2019) Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments. IEEE Syst J 14(1):310–320

    Article  Google Scholar 

  139. Xiong H, Wu Y, Jin C, Kumari S (2020) Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT. IEEE Internet Things J 7(12):11713–11724

    Article  Google Scholar 

  140. Yakubu J, Christopher HA, Chiroma H, Abdullahi M (2019) Security challenges in fog-computing environment: a systematic appraisal of current developments. J Reliab Intell Environ 5(4):209–233

    Article  Google Scholar 

  141. Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)

  142. Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 workshop on mobile big data (pp 37-42)

  143. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham

  144. Yi S, Qin Z, Li Q (2015) Security and privacy issues of fog computing: a survey. In: International conference on wireless algorithms, systems, and applications (pp 685-695). Springer, Cham

  145. Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Jue JP (2018) All one needs to know about fog computing and related edge computing paradigms. J Syst Archit

  146. Yu S, Lee J, Park K, Das AK, Park Y (2020) IoV-SMAP: secure and efficient message authentication protocol for IoV in smart city environment. IEEE Access 8:167875–167886

    Article  Google Scholar 

  147. Zamfiroiu A, Iancu B, Boja C, Georgescu TM, Cartas C, Popa M, Toma CV (2020) IoT communication security issues for companies: challenges, protocols and the web of data. In: Proceedings of the international conference on business excellence (Vol 14, No 1, pp 1109-1120). Sciendo

  148. Zhang L (2019) Key management scheme for secure channel establishment in fog computing. IEEE Trans Cloud Comput

  149. Zhang P, Liu JK, Yu FR, Sookhak M, Au MH, Luo X (2018) A survey on access control in fog computing. IEEE Commun Mag 56(2):144–149

    Article  Google Scholar 

  150. Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In 2010 sixth international conference on semantics, knowledge and grids (pp 105-112). IEEE

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

NK did a survey of fog computing and compiled all available literature related to fog computing. DP helped in searching, scruting good papers, and guided to do a good survey step by step in an appropriate manner. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Neha Kaliya.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Ethics approval

Not applicable

Consent to participate

Not applicable

Consent for publication

Not applicable

Code availability

Not applicable

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaliya, N., Pawar, D. Unboxing fog security: a review of fog security and authentication mechanisms. Computing 105, 2793–2819 (2023). https://doi.org/10.1007/s00607-023-01208-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-023-01208-3

Keywords

Navigation