Fog Computing: Issues and Challenges in Security and Forensics

被引:89
作者
Wang, Yifan [1 ]
Uehara, Tetsutaro [1 ]
Sasaki, Ryoichi [2 ]
机构
[1] Ritsumeikan Univ, Coll Informat Sci & Engn, Kusatsu, Shiga, Japan
[2] Tokyo Denki Univ, Sch Sci & Technol Future Life, Adachi Ku, Tokyo, Japan
来源
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3 | 2015年
关键词
Fog Computing; Fog Forensics; Fog Security; Cloud Computing; Cloud Security; Cloud Forensics;
D O I
10.1109/COMPSAC.2015.173
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Although Fog Computing is defined as the extension of the Cloud Computing paradigm, its distinctive characteristics in the location sensitivity, wireless connectivity, and geographical accessibility create new security and forensics issues and challenges which have not been well studied in Cloud security and Cloud forensics. In this paper, through an extensive review of the motivation and advantages of the Fog Computing and its unique features as well as the comparison on various scenarios between the Fog Computing and Cloud Computing, the new issues and challenges in Fog security and Fog forensics are presented and discussed. The result of this study will encourage and promote more extensive research in this fascinating field, Fog security and Fog forensics.
引用
收藏
页码:53 / 59
页数:7
相关论文
共 23 条
[1]  
[Anonymous], 2013, Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, MCC '13, DOI [10.1145/2491266.2491270, DOI 10.1145/2491266.2491270]
[2]  
[Anonymous], 2013, CLOUD FORENSICS META
[3]  
[Anonymous], P 10 ANN POSTGR S CO
[4]  
[Anonymous], 2011, P 8 ACM INT WORKSH V
[5]  
BETaaS, 2012, TECH REP
[6]  
Biggs S., 2009, nternet Technology and Secured Transactions, P1
[7]  
BIRK D., 2011, SYSTEMATIC APPROACHE
[8]  
Delport M. K. Waldo, 2011, P INF COMP SEC ARCH
[9]   GTES: An Optimized Game-Theoretic Demand-Side Management Scheme for Smart Grid [J].
Fadlullah, Zubair Md. ;
Duong Minh Quan ;
Kato, Nei ;
Stojmenovic, Ivan .
IEEE SYSTEMS JOURNAL, 2014, 8 (02) :588-597
[10]  
Hay Brian, 2008, Operating Systems Review, V42, P74, DOI 10.1145/1368506.1368517