...
首页> 外文期刊>Computer science review >Security in fog computing: A systematic review on issues, challenges and solutions
【24h】

Security in fog computing: A systematic review on issues, challenges and solutions

机译:雾化计算中的安全性:关于问题,挑战和解决方案的系统审查

获取原文
获取原文并翻译 | 示例
           

摘要

Fog computing refers to cloud computing development to the edge of a corporate network. Fog computing, as a promising computing paradigm, facilitates computing, storing and network services between terminal devices and cloud computing data centers. It also brings many advantages to cloud computing and large-scale deployment of IoT applications such as low latency, data locality, location-awareness, mobility, less computational cost and geographical distribution. This extensive range of functionality raises various security concerns related to data, virtualization, segregation, network communication and monitoring. Security is a significant issue for fog computing since fog-based services are offered to massive-scale end-users by front fog nodes/servers. Also, fog computing focuses on ensuring the availability and reliability of services without worrying about the information stored or processed by the fog. Despite significant efforts that have been made in this field, many issues are still open. This paper prepares a comprehensive study of security challenges and different approaches in fog computing to address those challenges using the Systematic Literature Review (SLR) approach. Moreover, a technical taxonomy is offered for the fog security challenges and their strategies in terms of six aspects, including reliability, access control, attacks, secure connection, privacy and some special cases. The core objective of this study is to analytically and statistically classify the existing research techniques related to security aspects and available solutions in fog computing published between 2014 and 2021. Then some technical questions in this domain are provided, and also the strengths and weaknesses of each indicated fog security approach are discussed based on the questions, as well as suggesting some ideas to address security deficiencies in fog computing. Finally, some future motivational directions and open issues in this field are provided to design, implement, and maintain fog systems.
机译:雾计算是指云计算开发到公司网络的边缘。雾计算作为有前途的计算范例,便于终端设备和云计算数据中心之间的计算,存储和网络服务。它还为云计算和大规模部署的IOT应用程序提供了许多优点,例如低延迟,数据局部,地点意识,移动性,较少的计算成本和地理分布。这种广泛的功能范围提高了与数据,虚拟化,隔离,网络通信和监控相关的各种安全问题。安全性是FOG计算的重要问题,因为基于FOG的服务通过前雾节点/服务器提供了大规模的最终用户。此外,FOG计算侧重于确保服务的可用性和可靠性,而无需担心存储或处理的信息。尽管这一领域取得了重大努力,但许多问题仍然是开放的。本文准备了对雾计算中的安全挑战和不同方法的综合研究,以解决这些挑战,以解决这些挑战,使用系统文献综述(SLR)方法。此外,为雾安全挑战提供了技术分类,以及六个方面的策略,包括可靠性,访问控制,攻击,安全连接,隐私和一些特殊情况。本研究的核心目标是在2014年和2021年间发布的雾计算中发布的安全方面和可用解决方案的现有研究技术进行了分析和统计分类。然后提供了该领域的一些技术问题,以及每个技术问题基于问题讨论了指示的雾安全方法,并建议一些想法来解决雾计算中的安全缺陷。最后,提供了一些未来的动机方向和该领域的开放问题,用于设计,实施和维护雾系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号