Fog Computing for the Internet of Things: Security and Privacy Issues

  title={Fog Computing for the Internet of Things: Security and Privacy Issues},
  author={Arwa Alrawais and Abdulrahman Alhothaily and Chunqiang Hu and Xiuzhen Cheng},
  journal={IEEE Internet Computing},
The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and computational power, require a new platform to efficiently process data. The concept of fog computing has been introduced as a technology to bridge the gap between remote data centers and IoT devices. Fog computing enables a wide range of benefits, including enhanced security, decreased bandwidth, and reduced latency. These benefits make the fog an appropriate paradigm for many IoT services in various… 

Figures from this paper

Review: Security and Privacy Issues of Fog Computing for the Internet of Things (IoT)

This study revealed a general agreement among researchers about the novelty of Fog computing, and its early stages of development, and identifies several challenges that need to be met, before its wider application and use reaches its full potential.

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture.

A fog computing-based framework for privacy preserving IoT environments

A security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users’ data and protecting their privacy.

Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art

This paper provides a comprehensive understanding of Fog privacy and security issue and reviews the literature on Fog computing to draw the state of the art of the security and privacy issues raised by Fog computing.


The findings of this paper show that a few studies that discussed empirical findings of using Fog computing and many questions related to security and privacy issues are ye to be answered in future research.

Privacy-preserving fog computing paradigm

This work explores two privacy issues posed by the fog computing architecture and defines privacy challenges according to them and proposes a privacy-preserving fog computing paradigm that solves these challenges and assess the security and efficiency of the solution.

Fog Computing and the Internet of Things: A Review

The state-of-the-art of fog computing and its integration with the IoT is presented by highlighting the benefits and implementation challenges and the architecture of the fog and emerging IoT applications that will be improved by using the fog model are focused on.



Policy-driven security management for fog computing: Preliminary framework and a case study

A policy-based management of resources in fog computing is proposed, expanding the current fog computing platform to support secure collaboration and interoperability between different user-requested resources in Fog computing.

Energy Management-as-a-Service Over Fog Computing Platform

The scalability, adaptability, and open source software/hardware featured in the proposed platform enable the user to implement the energy management with the customized control-as-services, while minimizing the implementation cost and time-to-market.

Security and Privacy Issues of Fog Computing: A Survey

Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks but with distinct characteristics that faces new security and privacy challenges besides those inherited from cloud computing.

Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks

A new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing that establishes a cyber trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud resources, and stop unauthorized access of shared datasets in offloading the cloud.

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

This hybrid rogue AP protection framework is capable of reliably revealing rogue devices and preempting potential attacks and provides a cost-effective solution to Wi-Fi network security enhancement by incorporating free but mature software tools.

Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement

A hierarchy of P2P reputation systems is suggested to protect clouds and datacenters at the site level and to safeguard the data objects at the file-access level to protect cloud service models, currently implemented by Amazon, IBM, and Google.

MobiShare: Flexible privacy-preserving location sharing in mobile online social networks

MobiShare is flexible to support a variety of location-based applications, in that it enables location sharing between both trusted social relations and untrusted strangers, and it supports range query and user-defined access control.

WAKE: Key management scheme for wide-area measurement systems in smart grid

This work proposes WAMS key management (WAKE), a comprehensive key management scheme targeting a concrete set of security objectives derived from NIST's security impact level ratings, and investigates two recent multicast authentication schemes designed for power grid communications.

SecureGuard: A Certificate Validation System in Public Key Infrastructure

This work presents SecureGuard, a certificate validation system that can effectively handle certificate validation during TLS handshakes and introduces a quantitative analysis method that can investigate the costs incurred by the system and other certificate validation approaches under the same evaluation scenarios.

On the Release of CRLs in Public Key Infrastructure

This study first collects real empirical data from VeriSign and derives the probability function for certificate revocation requests, and shows that different certificate authorities should take different strategies for releasing certificate revocation lists for different types of certificate services.