Sensors 21 08226
Sensors 21 08226
Article
An Overview of Fog Computing and Edge Computing Security
and Privacy Issues
Ahmed M. Alwakeel 1,2
1 Sensor Network and Cellular Systems Research Center, University of Tabuk, Tabuk 71491, Saudi Arabia;
[email protected]
2 Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia
Abstract: With the advancement of different technologies such as 5G networks and IoT the use of
different cloud computing technologies became essential. Cloud computing allowed intensive data
processing and warehousing solution. Two different new cloud technologies that inherit some of the
traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify
some of the complexity of cloud computing and leverage the computing capabilities within the local
network in order to preform computation tasks rather than carrying it to the cloud. This makes
this technology fits with the properties of IoT systems. However, using such technology introduces
several new security and privacy challenges that could be huge obstacle against implementing these
technologies. In this paper, we survey some of the main security and privacy challenges that faces fog
and edge computing illustrating how these security issues could affect the work and implementation
of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of
these security issues.
Keywords: cloud computing; fog computing; edge computing; cloud security; fog security; IoT;
privacy of IoT
countermeasures that could help mitigate or prevent these security concerns in order to
achieve higher level of security and stable performance for the system. Although many
attacks that affect fog and edge computing are inherited from cloud computing, many of
the current solutions for cloud computing will not be effective or may not work properly as
in normal cloud environment due to the unique properties of fog and edge computing. So
we will highlight the uniqueness of these attacks in the realm of fog and edge computing
in this paper as well.
Some authors in the literature have discussed the security concerns for edge com-
puting as well as for fog computing. To our knowledge no other survey discuss the two
technologies showing different attacks that could be related to both environment as well
as which attacks may have higher impact on one specific environment. In [5], the authors
did systematic analysis of some of the attacks that could affect fog computing showing
the percentile of each attack happening in the environment. In [6] the author list some
security concerns toward specific applications for fog computing. As for edge computing
In [7], the authors discussed the security concerns in IoT applications that rely on edge
computing. In [8], the authors survey security and privacy issues for edge computing and
they classified the attacks based on the layer that the attack aims to effect. More surveys
are listed regard edge and fog security in section four and five of this paper.
In order to have a better understanding of this topic and understand the differences
between cloud computing, edge computing and Fog computing we will first provide
an overview of cloud computing in general. Explaining different deployment methods
for cloud computing fallowed by an overview of Fog computing and Edge computing
showing how they differ from each other and traditional cloud. The following section
will go over some of the security and privacy issues for the two technologies fallowed by
countermeasure section where we will list some of the methods to mitigate these attacks
for both fog and edge computing. Finally in the last section we will provide a conclusion
and a future work.
the cost. Fog devices are slightly different from the cloud devices in terms of their position
and application for which they are installed.
Some of the differentiating factors include:
• If the deployment purpose of the device is customization of the end network services
or sensing some data then the device is categorized as a fog device, otherwise it is a
cloud device.
• If the device has limited computational capability and sensing ability, then it is classi-
fied as fog device.
Some of the features of fog computing include:
• Awareness regarding the location of edge.
• Very low latency.
• Mobility support.
• Real-time services.
• Good interactions.
• Heterogeneous nature.
• Inseparability.
Most users now demand running applications that require heavy computational
resources, which are beyond the processing capability of a mobile device, since it has
very low processing speed. Besides low computational power, energy also becomes
limited, since application processing are need to be offloaded to nearby cloud servers.
Task offloading solves the issue of computational processing, but it is not feasible for time
critical application. Hence, in such cases, the concept of fog computing is considered a
good solution. However, fog computing also has some limitations such as low resources as
compared to cloud, therefore, leading to high latency, energy consumption, load balancing,
data management, and security threats. Figure 2 shows the three paradigms and how
they interconnect.
(PACs) perform computing operations. The reason behind the evolution of edge comput-
ing concept is to overcome the high latency and energy consumption service issues of
Cloud computing, and allow low-latency computation offloading services for resource-
constrained devices and Internet-of-Things (IoT) applications. Moreover, it also provides
the advantages of content caching and storage services which help in managing high
network traffic.
The key feature of edge computing include:
• Very low latency.
• Reduced bandwidth limit.
• Flexibility in deployment.
• Automation.
Edge computing is the main domain which covers a family of related technologies as
sub-domains such as cloudlet, mobile cloud computing, and multi-access edge computing.
All these sub-domains are based on the concept that computational resources should be
present at the edge where network encounters the real demand challenge, which leads to:
1. Gain of fast access to the computation resources by the end users.
2. Reducing the traffic load on network core significantly.
Recent estimation shows that in the coming few years, there will be a deployment
of tens of billions of Edge devices with exceptionally high processing speeds. This up-
coming paradigm is called mobile edge computing (MEC), also referred to as multi-access
edge computing (MEC) [13,15]. MEC is an emerging technology that provides storage
and mobile computing resources at the edge of the network, for easy accessibility to the
users and increase the efficiency of the edge computing [16]. It offers a low latency, high
bandwidth, and real-time service environment that users can enjoy without any computa-
tional complexity [17]. In MEC architecture, the cloudlets holding data, also referred to as
multitenant data centers, are placed near base stations (BSs) and access points (APs), so that
users can easily run real-time applications without any delay and complex computing, on
low-resource mobile devices with enhanced quality-of-service (QoS) [18]. Figure 3 shows
some of the applications for edge computing.
While on the one hand, edge computing allows better experience and delay-free
services, on the other hand, it also faces numerous challenges such as delay, bandwidth
cost, high energy consumption, computational offloading, security, and quality of service
(QoS). Edge computing can provide many solutions for different fields including factory
floors, telecommunication companies and industrial automation.
Now that we have a good understanding of the concept of cloud computing, edge
computing and fog computing and the difference between each of them in the next chapter
we will discuss the security of both fog computing and edge computing and how their
unique characteristic highlighted new privacy and security issues.
Sensors 2021, 21, 8226 7 of 20
is very common if the encryption technique applied over the confidential data is
not efficient.
(g) Denial of Service (DoS): This is a type of attack is a famous attack that could affect
many environments including but not limited to fog computing in which fake data is
sent towards the fog nodes by attackers and these nodes are flooded with innumerous
fake requests so that they remain unavailable for the legitimate users. Such attacks
use up resources of the network such as bandwidth, battery, time, etc. which leads to
the performance degradation of fog network as they have limited resources.
(h) Man in the Middle: Man-in-the-middle is an attack where the attacker stands in
between the communicating nodes to overhear and steal the useful communication of
the genuine users without them knowing as they think the data is being exchanged
with the legitimate receivers directly. A temporary scenario is created by the attacker
in this case where he comes in between the communicating parties.
(i) Collusion: This type of security attack consists of a two or more groups that collude
cooperatively to mislead and cheat the legitimate users. In order to increase the impact
of the attack, these group trick and attack a group of fog nodes or IoT nodes or fog
nodes with IoT nodes or IoT nodes with cloud nodes.
(j) Impersonation: In impersonation attack, as the name shows, the attacker acts like a
genuine server to trick the legitimate users by offering fake or malicious services to
them to make them believe that they are communicating with the real fog node or
server. This way, the attacker steals all the confidential data from the legitimate user’s
system without their consent.
(k) Virtual Machine Attack: Virtual machine attack is an attack where a hacker secretly
takes control over the hypervisor that forms a virtual environment within a virtual
machine. There are 4 different modes of attack on a virtual machine: guest to host,
virtual machine to virtual machine manager, virtual machine to virtual machine, and
virtual machine manager outside attacks.
(l) Side-channel Attack: This is an attack in which the cryptography of the device is
unlocked by gathering information about the applied cryptographic algorithm.
(m) Session Hijacking: In session hijacking, the attacker intercepts and hijacks the user
session in order to get access to the user confidential data and services.
Table 1 shows several security attacks toward Fog computing with some related contribu-
tion related to these attacks in the literature.
Based on the type of security threat any fog computing attack land in one of three
fields which are network services where the attacker aims to modify the way the network
is formed or causing failure in delivery of packets in the network, Data processing attacks
which affect distribution, protection and content of the data in the network and finally
device privacy attacks where the attacker aim to affect the privacy of the actual device
including location, usage and identity privacy. Figure 4 shows the main three areas of
attacks in fog computing.
ing when a user is accessing the channel for data transmission and when he is not
communicating. On the basis of this pattern, the intruder launches an attack on the
user’s confidential information or the channel to make it appear as ‘busy’ for the
legitimate user.
(e) Location Privacy: Nowadays, each mobile application asks for access to device current
or saved location along with access to user mobile’s internal data such as gallery. Due
to this, the user has to sacrifice their location privacy in order to enjoy the internet
services. However, little do they know that their location privacy is extremely critical
information which if once obtained by the attacker can enable them to know the
trajectory of the user. Hence, the location privacy of a user must be kept secure at
all costs.
(f) Network Privacy: Wireless connections are always at risk due to security and privacy
attacks which is a highly considerable issue. Moreover, the maintenance of fog nodes
is also costly and challenging since they are present at the edge of the Internet, where
network configurations are carried out manually. Hence, privacy breach is not difficult
to occur. To resolve this issue, an encryption technique such as Home-Area Network
can be quite useful.
In Table 2, below, we have shown some of the privacy issues of fog computing net-
work [25] and the discussed privacy aspects:
The next chapter will discuss security and privacy issues for edge computing in details.
these categories. In Table 3, we have shown a summary of the data security and privacy
challenges categorized with respect to the edge computing architecture [39].
There are different factors that lead to security and privacy issues in edge computing
networks that put the user’s personal data at risk, as discussed below:
(a) In edge computing, edge nodes exist nearer to users which result in reception of large
amount of sensitive data. If any of these data are stolen, it can result in an alarming
consequences.
(b) Edge computing possess limited network resources, as compared to cloud computing,
due to which they do not support complex encryption algorithms.
(c) Edge computing network consists of dynamic environment which is constantly chang-
ing. As a result of this, attackers can easily become part of the group. Moreover, it is
very difficult to create security rules for such dynamic network.
The attacks on edge computing are as follows:
• Eavesdropping: Similar to the fog computing, the eavesdropping attack in edge
computing consists of an eavesdropper who can hide itself and maliciously monitor
the activity on the channel to steal or overhear the confidential data.
• Denial of Service (DoS) Attacks: Denial of service attack, just like in fog computing,
allows the intruder or hacker to take control over the system or network and make its
access unavailable for the legitimate user by sending a large amount of requests that
jam the network.
• Distributed Denial of Service (DDoS) Attack: It is an attack in which the goal of the
attacker is to interrupt the normal services provided by different servers on the basis of
distributed resources like cluster of compromised edge devices. This attack happens
when an attacker constantly sends innumerous packets towards the victim’s device
from the compromised distributed devices as a result of which exhausts the hardware
resources of the victim to handle any other packet and, therefore, fails to fulfill any
genuine request in time.
• Data Tampering Attack: In data tampering attack, the attacker can alter the data
transmitted over the communication channel or saved in the storage.
• Service Manipulation: It is an attack in which the adversary takes control over the
edge data center, and as a result it can misrepresent or alter the services.
• False Data Injection: False data injection is an attack in which the attacker injects a
false code in the network which gathers all the stored data from the database and
brings it to the attacker [39].
• Physical Attack: This attack occurs when the physical protection of the edge infrastructure
is weak or careless. Physical attack will affect the services in particular geographical areas
as the deployment of edge servers is distributed [39].
• Rogue Gateway: Rogue gateway is an attack launched by attackers where they inject
high traffic into the entire edge computing network infrastructure and the conse-
quences are the same as the man-in-the-middle attack.
In edge computing, if the invaders have acquired sufficient control privilege over the
edge data center, they can act as a genuine administrator or misrepresent the services. This
Sensors 2021, 21, 8226 12 of 20
enables the invaders to launch several attacks on the network such as man-in-the-middle,
DoS, etc.
there are several privacy issues in edge computing include:
• Weak security techniques and algorithms for system protection which can increase
the vulnerability of the network that will pave way for the malicious users to invade
over the system or add external nodes to collect data in unauthorized manner.
• Unsafe communication sessions between devices.
• Difficult recovery and data backup when the system outage occurs.
• No specific pattern of update reception and implementation on the system.
• Lack of proper network visibility.
• Lack of user’s selective data collection.
Now that we have some good understanding and knowledge of the security and
privacy issues of both fog and edge computing the next chapter will illustrate some
countermeasures to handle such attacks and mitigate the risk caused by it.
Table 4. Cont.
query processing issue and second is that it optimizes the queries for delay-free
communication. It achieves better performance results in terms of computation time,
memory usage as compared to conventional query optimization schemes.
In survey [55], the author gives a comprehensive overview of the most basic attacks
in edge computing including DoS, DDoS, side channel attack, malware injection attacks,
etc. along with the defense mechanisms that can be applied in edge computing network.
The author of [56] formulated a detection scheme for side-channel attacks that can detect
the abnormal cache activity on edge servers. Numerous other defense mechanisms are
proposed for edge networks but, unfortunately, the existing security and privacy-preserving
mechanisms are unable to be employed in edge computing network due to its mobility,
large number of edge nodes, and dynamic environment.
These mechanism run well for cloud computing but provide inefficient results in case
of edge computing. Privacy for edge nodes needs adaptive frameworks that can dynami-
cally choose the most suitable privacy scheme based on the communication environment
and edge nodes involved [57]. Hence, this area of communication still needs a large amount
of research and consideration. Table 5 shows main security attacks and some possible
privacy-preserving countermeasures in edge computing.
7. Future of Fog and Edge Computing and How That Will Affect IoT and Smart Cities
Fog and edge computing technologies are going to revolutionize the current picture
of the wireless communication networks, with their efficiency, effectiveness, delay-free
services, real-time applications and performance enhancement capabilities. Not only this,
but these technologies are also expected to increase the performance efficiency and service
delivery of other technologies such as IoT.
IoT technology has received immense attention not only from the academic side but
from the industrial side as well. It is basically the upcoming new era of ‘connectivity
everywhere’. According to the author of [58], it is estimated that more than 20 billion
devices would be connected by the end of 2020 that will be present in various business
organization, industrial departments and consumer side. As per the article [59], there will
be more than 21 billion devices connected by the year 2025. As the technology is advancing,
the IoT is flourishing at a great pace with increased number of sensors that are assigned to
Sensors 2021, 21, 8226 16 of 20
various devices to efficiently handle the large amount of data being generated and store it
on regular basis.
The applications of IoT require cloud technology for processing. However, as the
number of IoT devices is increasing, so is the data being generated by them due to which
the IoT devices can no longer depend on any central entity such as cloud computing to
perform processing of such large amount of data, rather it requires a technology that can
not only handle its large amount of data and service applications but also manage and
control numerous sensors, actuators, device users, operations and connectivity by bringing
processing facilities nearer to users. The traditional cloud computing is unable to solve
the issues related to time sensitivity and connectivity. Whereas in IoT, there are large
number of areas where even a delay of a microsecond can cause huge consequences like in
the field of telemedicine, healthcare centers, vehicle-to-vehicle communication, security
departments and many more. Hence, fog computing is being considered to be a better
choice for employing with IoT technology.
The devices present on the edge generate data from their allotted areas and transmit to
nearest fog nodes for analysis and decisions. The advantage of using fog computing is that
it can manage IoT devices along with solving the processing limitations of time-sensitive
applications in cloud computing. Fog nodes exist at the edge of the network to serve
edge users with high quality services and zero delay. This allows real-time processing,
storage and networking facilities to be provided to the users at edge level. IoT offers
a number of suitable solutions for application such as waste management, smart traffic
signal system, logistic control system, emergency services and industrial area. The two
most attractive fields of IoT are smart healthcare devices and wearable sensors. Due to
the ability of edge processing of fog computing technology, it has various functionalities
in smart application such as smart healthcare system, smart transportation system, smart
city, smart homes, smart vehicle, augmented and virtual reality and many other smart
real-time applications. Fog computing technology is highly being employed in healthcare
departments because the data generated by healthcare applications is time-sensitive which
requires quick processing. The author of [60] proposed a smart healthcare system based on
fog to control the occurrence of Chikungunya virus. In this system, the wearable IoT sensor
collected health data and medical data of the patient. According to [61], many challenges
of IoT can be resolved with fog computing technology, as shown in Table 6.
8. Conclusions
In this paper, we discussed and surveyed the security and privacy aspects of two new
paradigms of cloud computing which are fog computing and edge computing. Unlike
cloud computing, fog and edge computing have special characteristic that lead to having
some new security and privacy concerns. We showed different type of attacks that are
shared between the two technologies such as shared resources and DDoS attacks as well
as some of the unique attacks for each environment. We also provided in this paper
Sensors 2021, 21, 8226 17 of 20
some possible countermeasures that could mitigate some of the listed attacks. Through
researching the vulnerability of these technologies we found that the security aspect of
the two technologies are far from satisfied yet and there is a lot of potential research areas
to be covered. In Table 7, we conclude a list of the main threats for the two technologies
in addition to referring some work in the literature that discussed these threats and the
attacks related to these threats. In [62], the authors suggested a pattern for fog computing
that in our opinion could be enhanced and add security patterns to it to create a security
reference architecture for fog computing.
Table 7. Main threats of fog and edge computing and related researches.
Funding: This research was funded by Sensor Networks and Cellular Systems Research Center in
University of Tabuk grant number 002/1442 H.
Acknowledgments: The authors gratefully acknowledge the support of SNCS Research Center at
the University of Tabuk, Saudi Arabia.
Conflicts of Interest: The authors declare no conflict of interest.
Sensors 2021, 21, 8226 18 of 20
References
1. Henze, M.; Matzutt, R.; Hiller, J.; Erik, M.; Ziegeldorf, J.H.; van der Giet, J.; Wehrle, K. Complying with Data Handling
Requirements in Cloud Storage Systems. IEEE Trans. Cloud Comput. 2020, 1. [CrossRef]
2. González-Martínez, J.A.; Bote-Lorenzo, M.L.; Gómez-Sánchez, E.; Cano-Parra, R. Cloud computing and education: A state-of-the-
art survey. Comput. Educ. 2015, 80, 132–151. [CrossRef]
3. Huttunen, J.; Jauhiainen, J.; Lehti, L.; Nylund, A.; Martikainen, M.; Lehner, O. Big data, cloud computing and data science
applications in finance and accounting. ACRN Oxf. J. Financ. Risk Perspect. 2019, 8, 16–30.
4. Heck, M.; Edinger, J.; Schaefer, D.; Becker, C. IoT Applications in Fog and Edge Computing: Where Are We and Where Are
We Going? In Proceedings of the 2018 27th International Conference on Computer Communication and Networks (ICCCN),
Hangzhou, China, 30 July–2 August 2018; pp. 1–6. [CrossRef]
5. Kaur, J.; Agrawal, A.; Khan, R.A. Security Issues in Fog Environment: A Systematic Literature Review. Int. J. Wirel. Inf. Netw.
2020, 27, 467–483. [CrossRef]
6. Khan, S.; Parkinson, S.; Qin, Y. Fog computing security: A review of current applications and security solutions. J. Cloud Comput.
2017, 6, 1–22. [CrossRef]
7. Sha, K.; Yang, T.A.; Wei, W.; Davari, S. A survey of edge computing-based designs for IoT security. Digit. Commun. Netw. 2020,
6, 195–202. [CrossRef]
8. Alwarafy, A.; Al-Thelaya, K.A.; Abdallah, M.; Schneider, J.; Hamdi, M. A Survey on Security and Privacy Issues in Edge-
Computing-Assisted Internet of Things. IEEE Internet Things J. 2020, 8, 4004–4022. [CrossRef]
9. Badidi, E.; Ragmani, A. An Architecture for QoS-Aware Fog Service Provisioning. Procedia Comput. Sci. 2020, 170, 411–418.
[CrossRef]
10. Mebrek, A.; Merghem-Boulahia, L.; Esseghir, M. Efficient green solution for a balanced energy consumption and delay in
the IoT-Fog-Cloud computing. In Proceedings of the 2017 IEEE 16th International Symposium on Network Computing and
Applications (NCA), Cambridge, MA, USA, 30 October–1 November 2017; pp. 1–4.
11. Marbukh, V. Towards Fog Network Utility Maximization (FoNUM) for Managing Fog Computing Resources. In Proceedings of
the 2019 IEEE International Conference on Fog Computing (ICFC), Prague, Czech Republic, 24–26 June 2019; pp. 195–200.
12. Naha, R.K.; Garg, S.; Georgakopoulos, D.; Jayaraman, P.P.; Gao, L.; Xiang, Y.; Ranjan, R. Fog computing: Survey of trends,
architectures, requirements, and research directions. IEEE Access 2018, 6, 47980–48009. [CrossRef]
13. Delfin, S.; Sivasanker, N.; Raj, N.; Anand, A. Fog computing: A new era of cloud computing. In Proceedings of the 2019
3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27–29 March 2019;
pp. 1106–1111.
14. Ema, R.R.; Islam, T.; Ahmed, M.H. Suitability of Using Fog Computing Alongside Cloud Computing. In Proceedings of the 2019
10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India, 6–8 July
2019; pp. 1–4.
15. Chiang, M.; Zhang, T. Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 2016, 3, 854–864. [CrossRef]
16. Gandotra, P.; Lall, B. Evolving Air Pollution Monitoring Systems for Green 5G: From Cloud to Edge. In Proceedings of the 2020
8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO),
Noida, India, 4–5 June 2020; pp. 1231–1235.
17. Li, H.; Shou, G.; Hu, Y.; Guo, Z. Mobile edge computing: Progress and challenges. In Proceedings of the 2016 4th IEEE
International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK, 29 March–1 April
2016; pp. 83–84.
18. Mao, Y.; You, C.; Zhang, J.; Huang, K.; Letaief, K.B. A survey on mobile edge computing: The communication perspective. IEEE
Commun. Surv. Tutor. 2017, 19, 2322–2358. [CrossRef]
19. Yi, S.; Qin, Z.; Li, Q. Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms,
Systems, and Applications; Springer: Berlin/Heidelberg, Germany, 2015; pp. 685–695.
20. Zhang, P.; Zhou, M.; Fortino, G. Security and trust issues in Fog computing: A survey. Future Gener. Comput. Syst. 2018, 88, 16–27.
[CrossRef]
21. Alrawais, A.; Alhothaily, A.; Hu, C.; Cheng, X. Fog computing for the internet of things: Security and privacy issues. IEEE
Internet Comput. 2017, 21, 34–42. [CrossRef]
22. Stojmenovic, I.; Wen, S. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated
Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8.
23. Din, I.U.; Guizani, M.; Kim, B.S.; Hassan, S.; Khan, M.K. Trust management techniques for the Internet of Things: A survey. IEEE
Access 2018, 7, 29763–29787. [CrossRef]
24. Aljumah, A.; Ahanger, T.A. Fog computing and security issues: A review. In Proceedings of the 2018 7th International Conference
on Computers Communications and Control (ICCCC), Oradea, Romania, 8–12 May 2018; pp. 237–239.
25. Parikh, S.; Dave, D.; Patel, R.; Doshi, N. Security and privacy issues in cloud, fog and edge computing. Procedia Comput. Sci. 2019,
160, 734–739. [CrossRef]
26. Hong, J.; Xue, K.; Gai, N.; Wei, D.S.; Hong, P. Service outsourcing in F2C architecture with attribute-based anonymous access
control and bounded service number. IEEE Trans. Dependable Secur. Comput. 2018, 17, 1051–1062. [CrossRef]
Sensors 2021, 21, 8226 19 of 20
27. Liang, J.; Zhang, M.; Leung, V.C. A reliable trust computing mechanism based on multisource feedback and fog computing in
social sensor cloud. IEEE Internet Things J. 2020, 7, 5481–5490. [CrossRef]
28. Anwar, A.; Halabi, T.; Zulkernine, M. Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. In Proceedings of the
2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 23–25 October 2019; pp. 114–121.
29. Tu, S.; Waqas, M.; Rehman, S.U.; Aamir, M.; Rehman, O.U.; Jianbiao, Z.; Chang, C.C. Security in fog computing: A novel
technique to tackle an impersonation attack. IEEE Access 2018, 6, 74993–75001. [CrossRef]
30. Aliyu, F.; Sheltami, T.; Shakshuki, E.M. A detection and prevention technique for man in the middle attack in fog computing.
Procedia Comput. Sci. 2018, 141, 24–31. [CrossRef]
31. Paharia, B.; Bhushan, K. A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment.
Handb. Comput. Netw. Cyber Secur. 2020, 493–524._20. [CrossRef]
32. Samy, A.; Yu, H.; Zhang, H. Fog-based attack detection framework for internet of things using deep learning. IEEE Access 2020,
8, 74571–74585. [CrossRef]
33. Priyadarshini, R.; Kumar Barik, R.; Dubey, H. Fog-SDN: A light mitigation scheme for DDoS attack in fog computing framework.
Int. J. Commun. Syst. 2020, 33, e4389. [CrossRef]
34. Wang, X.; Gu, B.; Qu, Y.; Ren, Y.; Xiang, Y.; Gao, L. Reliable customized privacy-preserving in fog computing. In Proceedings of
the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6.
35. Lu, Y.; Qi, Y.; Qi, S.; Zhang, F.; Wei, W.; Yang, X.; Zhang, J.; Dong, X. Secure deduplication-based storage systems with resistance
to side-channel attacks via fog computing. IEEE Sens. J. 2021, 1. [CrossRef]
36. Abbas, N.; Asim, M.; Tariq, N.; Baker, T.; Abbas, S. A mechanism for securing IoT-enabled applications at the fog layer. J. Sens.
Actuator Netw. 2019, 8, 16. [CrossRef]
37. Patwary, A.A.N.; Naha, R.K.; Garg, S.; Battula, S.K.; Patwary, M.A.K.; Aghasian, E.; Amin, M.B.; Mahanti, A.; Gong, M. Towards
Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. Electronics 2021,
10, 1171. [CrossRef]
38. Kozik, R.; Choraś, M.; Ficco, M.; Palmieri, F. A scalable distributed machine learning approach for attack detection in edge
computing environments. J. Parallel Distrib. Comput. 2018, 119, 18–26. [CrossRef]
39. Zhang, J.; Chen, B.; Zhao, Y.; Cheng, X.; Hu, F. Data security and privacy-preserving in edge computing paradigm: Survey and
open issues. IEEE Access 2018, 6, 18209–18237. [CrossRef]
40. Zeyu, H.; Geming, X.; Zhaohang, W.; Sen, Y. Survey on edge computing security. In Proceedings of the 2020 International
Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), Fuzhou, China, 12–14 June 2020;
pp. 96–105.
41. Suma, V.; Bouhmala, N.; Wang, H. Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020; Springer:
Berlin/Heidelberg, Germany, 2021.
42. Modi, C.; Patel, D.; Borisaniya, B.; Patel, H.; Patel, A.; Rajarajan, M. A survey of intrusion detection techniques in cloud. J. Netw.
Comput. Appl. 2013, 36, 42–57. [CrossRef]
43. Cruz, T.; Rosa, L.; Proença, J.; Maglaras, L.; Aubigny, M.; Lev, L.; Jiang, J.; Simoes, P. A cybersecurity detection framework for
supervisory control and data acquisition systems. IEEE Trans. Ind. Inform. 2016, 12, 2236–2246. [CrossRef]
44. Aliyu, F.; Sheltami, T.; Mahmoud, A.; Al-Awami, L.; Yasar, A. Detecting Man-in-the-Middle Attack in Fog Computing for Social
Media. CMC-Comput. Mater. Contin. 2021, 69, 1159–1181. [CrossRef]
45. Ibrahim, M.H. Octopus: An edge-fog mutual authentication scheme. Int. J. Netw. Secur. 2016, 18, 1089–1101.
46. Manzoor, A.; Wahid, A.; Ali Shah, M.; Akhunzada, A.; Fayyaz Qureshi, F. Secure login using multi-tier authentication schemes in
fog computing. EAI Endorsed Trans. Internet Things 2018, 3. [CrossRef]
47. Momot, A. How Blockchain Can Be Used to Dramatically Improve Cybersecurity, 2018. Available online: https:
//cybersecurityventures.com/how-blockchain-can-be-used-to-improve-cybersecurity/ (accessed on 10 November 2021).
48. Parker, M. FourWays to Improve the Security of Blockchain, 2017. Available online: https://securitycurrent.com/four-
waysimprove-security-blockchain/ (accessed on 10 November 2021).
49. Vishwanath, A.; Peruri, R.; He, J.S. Security in Fog Computing through Encryption; DigitalCommons@ Kennesaw State University:
Kennesaw, GA, USA, 2016.
50. Madavi, K.B.; Vijayakarthick, P. Decoy technique for preserving the privacy in fog computing. In Evolutionary Computing and
Mobile Sustainable Networks; Springer: Berlin/Heidelberg, Germany, 2021; pp. 89–94.
51. Sudqi Khater, B.; Abdul Wahab, A.W.B.; Idris, M.Y.I.B.; Abdulla Hussain, M.; Ahmed Ibrahim, A. A lightweight perceptron-based
intrusion detection system for fog computing. Appl. Sci. 2019, 9, 178. [CrossRef]
52. Cui, J.; Wei, L.; Zhang, J.; Xu, Y.; Zhong, H. An efficient message-authentication scheme based on edge computing for vehicular
ad hoc networks. IEEE Trans. Intell. Transp. Syst. 2018, 20, 1621–1632. [CrossRef]
53. Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated blockchain and edge computing systems: A survey, some research issues
and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 1508–1532. [CrossRef]
54. Xu, R.; Palanisamy, B.; Joshi, J. QueryGuard: Privacy-preserving latency-aware query optimization for edge computing. In
Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communica-
tions/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA,
1–3 August 2018; pp. 1097–1106.
Sensors 2021, 21, 8226 20 of 20
55. Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proc. IEEE 2019,
107, 1608–1631. [CrossRef]
56. Zhang, T.; Zhang, Y.; Lee, R.B. Cloudradar: A real-time side-channel attack detection system in clouds. In International Symposium
on Research in Attacks, Intrusions, and Defenses; Springer: Berlin/Heidelberg, Germany, 2016; pp. 118–140.
57. Rao, F.Y.; Bertino, E. Privacy techniques for edge computing systems. Proc. IEEE 2019, 107, 1632–1654. [CrossRef]
58. Meulen, R.V.D. Gartner Says 8.4 Billion Connected “Things” Will Be in Use in 2017, Up 31 Percent from 2016. 2017. Available
online: https://www.gartner.com/en/newsroom/press-releases/2017-02-07-gartner-says-8-billion-connected-things-will-be-
in-use-in-2017-up-31-percent-from-2016 (accessed on 10 November 2021).
59. Symanovich, S. The future of IoT: 10 predictions about the internet of things. Cyber Secur. Blog Nort. Symantec Accessed 2019, 10,
2–17.
60. Sood, S.K.; Mahajan, I. Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus. Comput.
Ind. 2017, 91, 33–44. [CrossRef]
61. Wadhwa, H.; Aron, R. Fog computing with the integration of internet of things: Architecture, applications and future directions.
In Proceedings of the 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing &
Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications
(ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, VIC, Australia, 11–13 December 2018; pp. 987–994.
62. Syed, M.H.; Fernandez, E.B.; Ilyas, M. A pattern for fog computing. In Proceedings of the 10th Travelling Conference on Pattern
Languages of Programs, Leerdam, The Netherlands, 7–10 April 2016; pp. 1–10.
63. Huang, Q.; Yang, Y.; Wang, L. Secure data access control with ciphertext update and computation outsourcing in fog computing
for Internet of Things. IEEE Access 2017, 5, 12941–12950. [CrossRef]
64. Ren, Y.; Zhu, F.; Qi, J.; Wang, J.; Sangaiah, A.K. Identity management and access control based on blockchain under edge
computing for the industrial internet of things. Appl. Sci. 2019, 9, 2058. [CrossRef]
65. Dsouza, C.; Ahn, G.J.; Taguinod, M. Policy-driven security management for fog computing: Preliminary framework and a case
study. In Proceedings of the 2014 IEEE 15th international conference on information reuse and integration (IEEE IRI 2014),
Redwood City, CA, USA, 13–15 August 2014; pp. 16–23.
66. Bose, A.; Aujla, G.S.; Singh, M.; Kumar, N.; Cao, H. Blockchain as a service for software defined networks: A denial of service
attack perspective. In Proceedings of the 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on
Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology
Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 5–8 August 2019; pp. 901–906.
67. Tao, Z.; Xia, Q.; Hao, Z.; Li, C.; Ma, L.; Yi, S.; Li, Q. A survey of virtual machine management in edge computing. Proc. IEEE 2019,
107, 1482–1499. [CrossRef]
68. Bittencourt, L.F.; Lopes, M.M.; Petri, I.; Rana, O.F. Towards virtual machine migration in fog computing. In Proceedings of
the 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Krakow, Poland, 4–6
November 2015; pp. 1–8.
69. Pék, G.; Buttyán, L.; Bencsáth, B. A survey of security issues in hardware virtualization. ACM Comput. Surv. 2013, 45, 1–34.
[CrossRef]
70. Yuan, J.; Li, X. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback
information fusion. IEEE Access 2018, 6, 23626–23638. [CrossRef]