439 281
Full Length Article
Volume 3 , Issue 1, PP: 21-28 , 2021

Title

Security Challenges for IoT Based Applications & Solutions Using Fog Computing: A Survey

Authors Names :   Sayali Karmode   1 *  

1  Affiliation :  Assistant Professor (CS & IT) at Satish Pradhan Dnyansadhana College, Thane

    Email :  sayalis.karmode@gmail.com



Doi   :  10.5281/zenodo.3786143


Abstract :

The internet of things has taken the world by storm. According to prediction, there will be around 30 billion connected devices in the year 2020. This means that some or all our home applications might have the capability to be controlled remotely. Recently, the use of IoT devices and sensors has been rapidly increased which also caused data generation (information and logs), bandwidth usage, and related phenomena to be increased. To our best knowledge, a standard definition for the integration of fog computing with IoT is emerging now. This integration will bring many opportunities for the researchers, especially while building cyber-security related solutions. In this study, we surveyed about the integration of fog computing with IoT and its implications. Our goal was to find out and emphasize problems, specifically security-related problems that arise with the employment of fog computing by IoT.  

Keywords :

IoT , IoT Security , Security Threats , Cloud , Fog Computing

References :

[1] Yousuf, Tasneem, et al. "Internet of Things (IoT) Security: Current status, challenges, and countermeasures." International Journal for Information Security Research (IJISR), vol. 5, no .4, 2015, pp. 608-616.

[2] W. Wang, P. Xu, and L. T. Yang, “Secure data collection, storage and access in cloud-assisted IoT," IEEE Cloud Computing, vol. 5, no. 4, pp. 77–88, 2018.

[3] Rose, Karen et al. "The Internet of Things: An Overview." The Internet Society (ISOC), vol. 1, 2015, pp. 1-50.

 [4] Albishi, Saad, Soh Ben, Ullah, Azmat, and Algarni, Fahad. “Challenges and Solutions for Applications and Technologies in the Internet of Things.” Procedia Computer Science 124 (2017) 608–614.

[5] C. Li and C. Chen, “A multi-stage control method application in the fight against phishing attacks,” Proceeding of the 26th computer security academic communication across the country, pp. 145, 2011.

[6] B. Zhang, N. Mor, J. Kolb, D. S. Chan, K. Lutz, E. Allman, J. Wawrzynek, E. A. Lee, and J. Kubiatowicz, “The cloud is not enough: Saving iot from the cloud.” in HotStorage, 2015.

[7] I. Butun, B. Kantarci, and M. Erol-Kantarci, “Anomaly detection and privacy preservation in cloud-centric internet of things,” in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp. 2610–2615.

 [8] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog computing: Focusing on mobile users at the edge,” CoRR, vol. abs/1502.01815, 2015. [Online]. Available: http://arxiv.org/abs/1502.01815

 [9] S. Forsstr¨om, I. Butun, M. Eldefrawy, U. Jennehag, and M. Gidlund, “Challenges of securing the industrial internet of things value chain,” in 2018 Workshop on Metrology for Industry 4.0 and IoT. IEEE, 2018, pp. 218–223. 

[10] “Fog computing and the internet of things: Extend the cloud to where the things are,” Cisco White Paper, 2015.

 [11] Z. Shae and J. J. Tsai, “On the design of a blockchain platform for clinical trial and precision medicine,” in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp. 1972–1980.

 [12] D. Koo, Y. Shin, J. Yun, and J. Hur, “An online data-oriented authentication based on merkle tree with improved reliability and fog computing,” in 2017 IEEE International Conference on Web Services (ICWS). IEEE, 2017, pp. 840–843.