Open Access   Article Go Back

Security and Privacy Issues in Fog driven IoT Environment

Richa Verma1 , Shalini Chandra2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 367-370, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.367370

Online published on May 31, 2019

Copyright © Richa Verma, Shalini Chandra . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Richa Verma, Shalini Chandra, “Security and Privacy Issues in Fog driven IoT Environment,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.367-370, 2019.

MLA Style Citation: Richa Verma, Shalini Chandra "Security and Privacy Issues in Fog driven IoT Environment." International Journal of Computer Sciences and Engineering 7.5 (2019): 367-370.

APA Style Citation: Richa Verma, Shalini Chandra, (2019). Security and Privacy Issues in Fog driven IoT Environment. International Journal of Computer Sciences and Engineering, 7(5), 367-370.

BibTex Style Citation:
@article{Verma_2019,
author = {Richa Verma, Shalini Chandra},
title = {Security and Privacy Issues in Fog driven IoT Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {367-370},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4250},
doi = {https://doi.org/10.26438/ijcse/v7i5.367370}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.367370}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4250
TI - Security and Privacy Issues in Fog driven IoT Environment
T2 - International Journal of Computer Sciences and Engineering
AU - Richa Verma, Shalini Chandra
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 367-370
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
419 249 downloads 111 downloads
  
  
           

Abstract

Recently, the idea of Internet of Things is seeking much attention because of its vast potential in the area of wireless transmission. IoT interlinks plentiful of heterogeneous, geographically diversified devices which usually have scarcity of resources, and therefore rely on cloud for the same. Unfortunately, the Cloud enabled IoT suffer from various limitations say, high network latency with the increase in volume of data processed. Due to the above limitation, majority of latency sensitive applications tend to provide poor performance. To alleviate this problem, the concept of Fog Computing came into the picture, in which Fog level is introduced as an intermediary level between Cloud and IoT devices. IoT unlocks handful opportunities for various sophisticated applications such as home applications, wearable devices etc. and also allow sharing of data over internet. This data being shared contains large amount of sensitive information that should not be shared amongst the connected users. In this paper, firstly brief overview about fog computing is provided and subsequently various security issues pertaining to both Fog and IoT environment are defined.

Key-Words / Index Term

Internet of Things (IoT), Fog Computing, Security, Privacy

References

[1] S. Haller, S. Karnouskos, and C. Schroth, "The Internet of Things in an Enterprise Context," in Future Internet – FIS 2008 Lecture Notes in Computer Science Vol. 5468, 2009, pp 14-28.
[2] A. Alshehri and R. Sandhu, "Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda," 2016.
[3] C. Puliafito, E. Mingozzi, and G. Anastasi, "Fog computing for the internet of mobile things: issues and challenges," in Smart Computing (SMARTCOMP), 2017 IEEE International Conference on, 2017, pp. 1-6: IEEE.
[4] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proceedings of the first edition of the MCC workshop on Mobile cloud computing, 2012, pp. 13-16: ACM.
[5] J. Ni, K. Zhang, X. Lin, and X. Shen, "Securing fog computing for internet of things applications: Challenges and solutions," IEEE Communications Surveys & Tutorials, 2017.
[6] Geng Yang, Jian Xu, etc.: Security Characteristic and Technology in the Internet of Things. J. Journal of Nanjing University of Posts and Telecommunications (Natural Science). 30(4) (2010)
[7] Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensive definition of fog computing. ACM SIGCOMM Computer Communication Review, 44(5), 27-32.
[8] Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and applications (pp. 685-695). Springer, Cham.
[9] Stojmenovic and W. Sheng, “The Fog Computing Paradigm: Scenarios and Security Issues,” Federated Conference on Computer Science and Information Systems (FedCSIS), pp.1-8, Sept. 2014.
[10] Yu, S., Wang, C., Ren, K., & Lou, W. (2010, March). Achieving secure, scalable, and fine-grained data access control in cloud computing. In 2010 Proceedings IEEE (pp. 1-9). IEEE.
[11] Han, H., Sheng, B., Tan, C. C., Li, Q., & Lu, S. (2009, April). A measurement based rogue ap detection scheme. In IEEE INFOCOM 2009 (pp. 1593-1601). IEEE.
[12] Wei, W., Xu, F., & Li, Q. (2012, March). Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. In 2012 Proceedings IEEE (pp. 2616-2620). IEEE.
[13] Shi, Y., Abhilash, S., Hwang, K.: Cloudlet mesh for securing mobile clouds from intrusions and network attacks. In: Mobile Cloud 2015)
[14] Li, S., & Zhang, K. (2008). Principles and applications of wireless sensor networks.
[15] Xueguang Yang, Fengjiao Li, Xiangyong Mu, etc.: Design of security and defense system for home based on Internet of things. J. computer application. 30(12):300-318 (2010)
[16] Antonio J. Jara, Miguel A. Zamora, Antonio F. G. Skarmeta.: HWSN6 Hospital Wireless Sensor Networks Based on 6LoWPANTechnology: Mobility and Fault Tolerance Manageme nt. C. In: International Conference on Computational Science and Engineering, 879-884 (2009)