Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments
##plugins.themes.academic_pro.article.main##
Abstract
Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- J. Guo and Y. Du, "Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges," in IEEE Access, vol. 8, pp. 11104-11115, 2020, doi: 10.1109/ACCESS.2020.2964804. DOI: https://doi.org/10.1109/ACCESS.2020.2964804
- K. Tange, M. De Donno, X. Fafoutis and N. Dragoni, "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities," in IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2489-2520, Fourthquarter 2020, doi: 10.1109/COMST.2020.3011208. DOI: https://doi.org/10.1109/COMST.2020.3011208
- S. Tu et al., "Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack," in IEEE Access, vol. 6, pp. 74993-75001, 2018, doi: 10.1109/ACCESS.2018.2884672. DOI: https://doi.org/10.1109/ACCESS.2018.2884672
- M. Ma, D. He, H. Wang, N. Kumar and K. -K. R. Choo, "An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8065-8075, Oct. 2019, doi: 10.1109/JIOT.2019.2902840. DOI: https://doi.org/10.1109/JIOT.2019.2902840
- J. Wu, M. Dong, K. Ota, J. Li and Z. Guan, "FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 4, pp. 553-564, 1 Oct.-Dec. 2019, doi: 10.1109/TETC.2017.2747158. DOI: https://doi.org/10.1109/TETC.2017.2747158
- Gupta, A. and Prabhat, P., 2022. Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications. Complex & Intelligent Systems, pp.1-16. DOI: https://doi.org/10.1007/s40747-022-00783-w
- A. Mourad, H. Tout, O. A. Wahab, H. Otrok and T. Dbouk, "Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection," in IEEE Internet of Things Journal, vol. 8, no. 2, pp. 829-843, 15 Jan.15, 2021, doi: 10.1109/JIOT.2020.3008488. DOI: https://doi.org/10.1109/JIOT.2020.3008488
- M. S. Pardeshi and S. -M. Yuan, "SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge," in IEEE Access, vol. 7, pp. 101327-101335, 2019, doi: 10.1109/ACCESS.2019.2930814.
- J. Ni, K. Zhang, X. Lin and X. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, Firstquarter 2018, doi: 10.1109/COMST.2017.2762345.
- A. K. Junejo, N. Komninos and J. A. McCann, "A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems," in IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6840-6852, 15 April15, 2021, doi: 10.1109/JIOT.2020.3035474. DOI: https://doi.org/10.1109/JIOT.2020.3035474
- T. Wang, Y. Liang, Y. Tian, M. Z. A. Bhuiyan, A. Liu and A. T. Asyhari, "Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing," in IEEE Transactions on Sustainable Computing, vol. 6, no. 1, pp. 43-53, 1 Jan.-March 2021, doi: 10.1109/TSUSC.2019.2904651. DOI: https://doi.org/10.1109/TSUSC.2019.2904651
- M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues and Y. Park, "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8804-8817, Oct. 2019, doi: 10.1109/JIOT.2019.2923611. DOI: https://doi.org/10.1109/JIOT.2019.2923611
- X. Liu, W. Chen, Y. Xia and C. Yang, "SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing," in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3389-3399, Sept. 2021, doi: 10.1109/TNSM.2021.3080138. DOI: https://doi.org/10.1109/TNSM.2021.3080138
- J. Zhao, P. Zeng and K. -K. R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health," in IEEE Access, vol. 9, pp. 13789-13799, 2021, doi: 10.1109/ACCESS.2021.3052247.
- M. A. Saleem, K. Mahmood and S. Kumari, "Comments on “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment”," in IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4671-4675, May 2020, doi: 10.1109/JIOT.2020.2975207. DOI: https://doi.org/10.1109/JIOT.2020.2975207
- M. Du, K. Wang, X. Liu, S. Guo and Y. Zhang, "A Differential Privacy-Based Query Model for Sustainable Fog Data Centers," in IEEE Transactions on Sustainable Computing, vol. 4, no. 2, pp. 145-155, 1 April-June 2019, doi: 10.1109/TSUSC.2017.2715038. DOI: https://doi.org/10.1109/TSUSC.2017.2715038
- L. Lyu, K. Nandakumar, B. Rubinstein, J. Jin, J. Bedo and M. Palaniswami, "PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3733-3744, Aug. 2018, doi: 10.1109/TII.2018.2803782. DOI: https://doi.org/10.1109/TII.2018.2803782
- J. Zhang, Q. Zhang and S. Ji, "A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8331-8342, Sept. 2020, doi: 10.1109/JIOT.2020.2989578. DOI: https://doi.org/10.1109/JIOT.2020.2989578
- J. Kang, R. Yu, X. Huang and Y. Zhang, "Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 8, pp. 2627-2637, Aug. 2018, doi: 10.1109/TITS.2017.2764095. DOI: https://doi.org/10.1109/TITS.2017.2764095
- S. Chen, X. Zhu, H. Zhang, C. Zhao, G. Yang and K. Wang, "Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT," in IEEE Transactions on Sustainable Computing, vol. 5, no. 4, pp. 526-540, 1 Oct.-Dec. 2020, doi: 10.1109/TSUSC.2020.2968589. DOI: https://doi.org/10.1109/TSUSC.2020.2968589
- J. Ni, K. Zhang, X. Lin and X. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, Firstquarter 2018, doi: 10.1109/COMST.2017.2762345. DOI: https://doi.org/10.1109/COMST.2017.2762345
- R. Lu, "A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2497-2505, April 2019, doi: 10.1109/JIOT.2018.2871204. DOI: https://doi.org/10.1109/JIOT.2018.2871204
- T. Wang, J. Zhou, X. Chen, G. Wang, A. Liu and Y. Liu, "A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 3-12, Feb. 2018, doi: 10.1109/TETCI.2017.2764109. DOI: https://doi.org/10.1109/TETCI.2017.2764109
- X. Yan et al., "Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing," in IEEE Internet of Things Journal, vol. 8, no. 18, pp. 14127-14140, 15 Sept.15, 2021, doi: 10.1109/JIOT.2021.3068490. DOI: https://doi.org/10.1109/JIOT.2021.3068490
- K. Gu, L. Tang, J. Jiang and W. Jia, "Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism," in IEEE Transactions on Computational Social Systems, vol. 7, no. 5, pp. 1246-1263, Oct. 2020, doi: 10.1109/TCSS.2020.3005761. DOI: https://doi.org/10.1109/TCSS.2020.3005761
- M. S. Pardeshi and S. -M. Yuan, "SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge," in IEEE Access, vol. 7, pp. 101327-101335, 2019, doi: 10.1109/ACCESS.2019.2930814. DOI: https://doi.org/10.1109/ACCESS.2019.2930814
- J. Zhao, P. Zeng and K. -K. R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health," in IEEE Access, vol. 9, pp. 13789-13799, 2021, doi: 10.1109/ACCESS.2021.3052247. DOI: https://doi.org/10.1109/ACCESS.2021.3052247
- Q. Li, Y. Tian, Q. Wu, Q. Cao, H. Shen and H. Long, "A Cloud-Fog-Edge Closed-Loop Feedback Security Risk Prediction Method," in IEEE Access, vol. 8, pp. 29004-29020, 2020, doi: 10.1109/ACCESS.2020.2972032. DOI: https://doi.org/10.1109/ACCESS.2020.2972032
- J. Wei, X. Wang, N. Li, G. Yang and Y. Mu, "A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks," in IEEE Access, vol. 6, pp. 43776-43784, 2018, doi: 10.1109/ACCESS.2018.2861430.
- G. Li, J. Wu, J. Li, Z. Guan and L. Guo, "Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE," in IEEE Access, vol. 6, pp. 11278-11288, 2018, doi: 10.1109/ACCESS.2018.2799543. DOI: https://doi.org/10.1109/ACCESS.2018.2799543
- S. Rathore, P. K. Sharma, A. K. Sangaiah and J. J. Park, "A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing," in IEEE Access, vol. 6, pp. 688-701, 2018, doi: 10.1109/ACCESS.2017.2774837. DOI: https://doi.org/10.1109/ACCESS.2017.2774837
- T. Sultana and K. A. Wahid, "IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management," in IEEE Access, vol. 7, pp. 134881-134894, 2019, doi: 10.1109/ACCESS.2019.2941978. DOI: https://doi.org/10.1109/ACCESS.2019.2941978
- U. U. Rehman, S. -B. Park and S. Lee, "Secure Health Fog: A Novel Framework for Personalized Recommendations Based on Adaptive Model Tuning," in IEEE Access, vol. 9, pp. 108373-108391, 2021, doi: 10.1109/ACCESS.2021.3101308. DOI: https://doi.org/10.1109/ACCESS.2021.3101308
- M. Whaiduzzaman, M. J. N. Mahi, A. Barros, M. I. Khalil, C. Fidge and R. Buyya, "BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture," in IEEE Access, vol. 9, pp. 106655-106674, 2021, doi: 10.1109/ACCESS.2021.3100072. DOI: https://doi.org/10.1109/ACCESS.2021.3100072
- M. Wen, S. Chen, R. Lu, B. Li and S. Chen, "Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System," in IEEE Access, vol. 7, pp. 137968-137981, 2019, doi: 10.1109/ACCESS.2019.2942414. DOI: https://doi.org/10.1109/ACCESS.2019.2942414
- P. K. Sharma, M. -Y. Chen and J. H. Park, "A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT," in IEEE Access, vol. 6, pp. 115-124, 2018, doi: 10.1109/ACCESS.2017.2757955. DOI: https://doi.org/10.1109/ACCESS.2017.2757955
- X. An, X. Lü, L. Yang, X. Zhou and F. Lin, "Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection," in IEEE Access, vol. 7, pp. 21879-21888, 2019, doi: 10.1109/ACCESS.2019.2899017. DOI: https://doi.org/10.1109/ACCESS.2019.2899017
- J. Wei, X. Wang, N. Li, G. Yang and Y. Mu, "A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks," in IEEE Access, vol. 6, pp. 43776-43784, 2018, doi: 10.1109/ACCESS.2018.2861430. DOI: https://doi.org/10.1109/ACCESS.2018.2861430
- M. Whaiduzzaman et al., "A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission," in IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 12, pp. 3564-3575, Dec. 2020, doi: 10.1109/JBHI.2020.3026060. DOI: https://doi.org/10.1109/JBHI.2020.3026060
- X. Wang, L. Wang, Y. Li and K. Gai, "Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog Computing," in IEEE Access, vol. 6, pp. 47657-47665, 2018, doi: 10.1109/ACCESS.2018.2856896. DOI: https://doi.org/10.1109/ACCESS.2018.2856896
- R. Saha, G. Kumar, M. K. Rai, R. Thomas and S. -J. Lim, "Privacy Ensured e{e} -Healthcare for Fog-Enhanced IoT Based Applications," in IEEE Access, vol. 7, pp. 44536-44543, 2019, doi: 10.1109/ACCESS.2019.2908664. DOI: https://doi.org/10.1109/ACCESS.2019.2908664