z-logo
Premium
A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
Author(s) -
Farhadi Mozhdeh,
Lanet JeanLouis,
Pierre Guillaume,
Miorandi Daniele
Publication year - 2020
Publication title -
software: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.437
H-Index - 70
eISSN - 1097-024X
pISSN - 0038-0644
DOI - 10.1002/spe.2804
Subject(s) - computer science , cloud computing , fog computing , computer security , context (archaeology) , cloud computing security , server , internet of things , application layer , utility computing , computer network , operating system , software , paleontology , biology
Summary Fog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed. As the Fog layer has direct access to data streams generated by IoT devices and responses/commands sent from the Cloud, it is in a critical position in terms of security of the entire IoT system. Currently, there is no specific tool or methodology for analysing the security of Fog computing systems in a comprehensive way. Generic security evaluation procedures applicable to most information technology products are time consuming, costly, and badly suited to the Fog context. In this article, we introduce a methodology for evaluating the security of Fog computing systems in a systematic way. We also apply our methodology to a generic Fog computing system, showcasing how it can be purposefully used by security analysts and system designers.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here