The Fog Computing Paradigm: Scenarios and Security Issues

The Fog Computing Paradigm: Scenarios and Security Issues

2014 | Ivan Stojmenovic, Sheng Wen
The article "The Fog Computing Paradigm: Scenarios and Security Issues" by Ivan Stojmenovic and Sheng Wen explores the Fog computing paradigm, which extends Cloud computing to the network edge. Fog computing provides data, computation, storage, and application services to end-users, particularly in scenarios where low latency and mobility support are crucial. The authors discuss the motivation and advantages of Fog computing, highlighting its applications in Smart Grids, smart traffic lights, wireless sensor networks, IoT, and software-defined networks (SDNs). They also review the state-of-the-art in Fog computing and similar work, emphasizing the importance of security and privacy issues. In the context of security, the article discusses the challenges posed by man-in-the-middle attacks, which can be stealthy due to minimal resource consumption on Fog devices. The authors conduct a stealth test to demonstrate how such attacks can be executed and their impact on memory and CPU usage. They conclude that traditional anomaly detection methods may not effectively detect these attacks. The article also addresses privacy issues in smart grids, where data aggregation and encryption techniques are used to protect user information while maintaining accurate charging summaries. Finally, the authors outline future research directions, including the development of models for Fog devices in Smart Grids and the exploration of Fog-based SDN in vehicular networks, focusing on optimal scheduling and mobility between Fog nodes and the Cloud.The article "The Fog Computing Paradigm: Scenarios and Security Issues" by Ivan Stojmenovic and Sheng Wen explores the Fog computing paradigm, which extends Cloud computing to the network edge. Fog computing provides data, computation, storage, and application services to end-users, particularly in scenarios where low latency and mobility support are crucial. The authors discuss the motivation and advantages of Fog computing, highlighting its applications in Smart Grids, smart traffic lights, wireless sensor networks, IoT, and software-defined networks (SDNs). They also review the state-of-the-art in Fog computing and similar work, emphasizing the importance of security and privacy issues. In the context of security, the article discusses the challenges posed by man-in-the-middle attacks, which can be stealthy due to minimal resource consumption on Fog devices. The authors conduct a stealth test to demonstrate how such attacks can be executed and their impact on memory and CPU usage. They conclude that traditional anomaly detection methods may not effectively detect these attacks. The article also addresses privacy issues in smart grids, where data aggregation and encryption techniques are used to protect user information while maintaining accurate charging summaries. Finally, the authors outline future research directions, including the development of models for Fog devices in Smart Grids and the exploration of Fog-based SDN in vehicular networks, focusing on optimal scheduling and mobility between Fog nodes and the Cloud.
Reach us at info@study.space
[slides] The Fog computing paradigm%3A Scenarios and security issues | StudySpace