首页> 外文期刊>Software, practice & experience >A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures
【24h】

A systematic approach toward security in Fog computing: Assets, vulnerabilities, possible countermeasures

机译:对雾化计算安全的系统方法:资产,漏洞,可能对策

获取原文
获取原文并翻译 | 示例
           

摘要

Fog computing is an emerging paradigm in the Internet of Things (IoT) space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage, and networking resources in close proximity to where data is being generated and/or consumed. As the Fog layer has direct access to data streams generated by IoT devices and responses/commands sent from the Cloud, it is in a critical position in terms of security of the entire IoT system. Currently, there is no specific tool or methodology for analysing the security of Fog computing systems in a comprehensive way. Generic security evaluation procedures applicable to most information technology products are time consuming, costly, and badly suited to the Fog context. In this article, we introduce a methodology for evaluating the security of Fog computing systems in a systematic way. We also apply our methodology to a generic Fog computing system, showcasing how it can be purposefully used by security analysts and system designers.
机译:雾计算是内容互联网(物联网)空间中的新兴范式,由中间计算层组成,坐在IOT设备和云服务器之间。雾计算提供额外的计算,存储和网络资源,靠近正在生成和/或消耗数据的位置。由于FOG层具有直接访问由IOT设备生成的数据流和从云发送的响应/命令,因此在整个物联网系统的安全性方面处于关键位置。目前,没有以全面的方式分析雾计算系统的安全性的特定工具或方法。适用于大多数信息技术产品的通用安全评估程序是耗时,昂贵,非常适合雾背景。在本文中,我们介绍一种以系统方式评估雾计算系统的安全性的方法。我们还将我们的方法应用于通用雾计算系统,展示了安全性分析师和系统设计人员可以故意使用的方式。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号