Fog Computing for the Internet of Things: Security and Privacy Issues

被引:401
作者
Alrawais, Arwa [1 ]
Alhothaily, Abdulrahman [1 ]
Hu, Chunqiang [1 ,2 ]
Cheng, Xiuzhen [1 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC USA
[2] Catholic Univ Amer, Washington, DC USA
关键词
VERIFICATION;
D O I
10.1109/MIC.2017.37
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Fog computing has been introduced as a technology to bridge the gap between remote data centers and Internet of Things (IoT) devices. Enabling a wide range of benefits, including enhanced security, decreased bandwidth, and reduced latency, fog is an appropriate paradigm for many IoT services. Nevertheless, fog devices ( located at the edge of the Internet) obviously face many security and privacy threats. Here, the authors discuss the security and privacy issues in IoT environments and propose a mechanism that employs fog to improve the distribution of certificate revocation information among IoT devices for security enhancement.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 16 条
[1]   Energy Management-as-a-Service Over Fog Computing Platform [J].
Al Faruque, Mohammad Abdullah ;
Vatanparvar, Korosh .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02) :161-169
[2]   A novel verification method for payment card systems [J].
Alhothaily, Abdulrahman ;
Alrawais, Arwa ;
Cheng, Xiuzhen ;
Bie, Rongfang .
PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) :1145-1156
[3]  
Alhothaily A, 2014, LECT NOTES COMPUT SC, V8491, P356, DOI 10.1007/978-3-319-07782-6_33
[4]  
Alrawais A., SECUREGUARD IN PRESS
[5]   X.509 Check: A Tool to Check the Safety and Security of Digital Certificates [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Cheng, Xiuzhen .
2015 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION, AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2015, :130-133
[6]  
Dsouza C, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P16, DOI 10.1109/IRI.2014.7051866
[7]   Cloud Security with Virtualized Defense and Reputation-based Trust Management [J].
Hwang, Kai ;
Kulkarni, Sameer ;
Hu, Yue .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :717-+
[8]  
Law Y. W., 2014, IEEE COMMUNICATIONS, V51, P34
[9]  
Ma C., 2006, P 15 US SEC S, V15
[10]  
Ma L., 2008, IEEE INFOCOM 2008 TH, P1220, DOI [10.1109/INFOCOM.2008.178, DOI 10.1109/INFOCOM.2008.178]