9,127 research outputs found
Security for Cyber-Physical Systems: Leveraging Cellular Networks and Fog Computing
The reach and scale of Cyber Physical Systems (CPS) are expanding to many
aspects of our everyday lives. Health, safety, transportation and education are
a few areas where CPS are increasingly prevalent. There is a pressing need to
secure CPS, both at the edge and at the network core. We present a hybrid
framework for securing CPS that leverages the computational resources and
coordination of Fog networks, and builds on cellular connectivity for low-power
and resource constrained CPS devices. The routine support for cellular
authentication, encryption, and integrity protection is enhanced with the
addition of a cellular cloud controller to take over the management of the
radio and core security contexts dedicated to CPS devices. Specialized cellular
cloudlets liaison with core network components to implement localized and
network-wide defense for denial-or-service, smart jamming, or unauthorized CPS
tracking attacks. A comparison between our framework and recent cellular/fog
solutions is provided, together with a feasibility analysis for operational
framework deployment. We conclude with future research directions that we
believe are pivotal to the proliferation of secure and scalable CPS.Comment: IEEE CNS 201
Application Management in Fog Computing Environments: A Taxonomy, Review and Future Directions
The Internet of Things (IoT) paradigm is being rapidly adopted for the
creation of smart environments in various domains. The IoT-enabled
Cyber-Physical Systems (CPSs) associated with smart city, healthcare, Industry
4.0 and Agtech handle a huge volume of data and require data processing
services from different types of applications in real-time. The Cloud-centric
execution of IoT applications barely meets such requirements as the Cloud
datacentres reside at a multi-hop distance from the IoT devices. \textit{Fog
computing}, an extension of Cloud at the edge network, can execute these
applications closer to data sources. Thus, Fog computing can improve
application service delivery time and resist network congestion. However, the
Fog nodes are highly distributed, heterogeneous and most of them are
constrained in resources and spatial sharing. Therefore, efficient management
of applications is necessary to fully exploit the capabilities of Fog nodes. In
this work, we investigate the existing application management strategies in Fog
computing and review them in terms of architecture, placement and maintenance.
Additionally, we propose a comprehensive taxonomy and highlight the research
gaps in Fog-based application management. We also discuss a perspective model
and provide future research directions for further improvement of application
management in Fog computing
Security and Privacy Issues in Cloud Computing
Cloud computing transforms the way information technology (IT) is consumed
and managed, promising improved cost efficiencies, accelerated innovation,
faster time-to-market, and the ability to scale applications on demand
(Leighton, 2009). According to Gartner, while the hype grew exponentially
during 2008 and continued since, it is clear that there is a major shift
towards the cloud computing model and that the benefits may be substantial
(Gartner Hype-Cycle, 2012). However, as the shape of the cloud computing is
emerging and developing rapidly both conceptually and in reality, the
legal/contractual, economic, service quality, interoperability, security and
privacy issues still pose significant challenges. In this chapter, we describe
various service and deployment models of cloud computing and identify major
challenges. In particular, we discuss three critical challenges: regulatory,
security and privacy issues in cloud computing. Some solutions to mitigate
these challenges are also proposed along with a brief presentation on the
future trends in cloud computing deployment.Comment: 42 pages, 2 Figures, and 5 Tables. The book chapter is accepted for
publication and is expected to be published in the second half of 201
Internet of Cloud: Security and Privacy issues
The synergy between the cloud and the IoT has emerged largely due to the
cloud having attributes which directly benefit the IoT and enable its continued
growth. IoT adopting Cloud services has brought new security challenges. In
this book chapter, we pursue two main goals: 1) to analyse the different
components of Cloud computing and the IoT and 2) to present security and
privacy problems that these systems face. We thoroughly investigate current
security and privacy preservation solutions that exist in this area, with an
eye on the Industrial Internet of Things, discuss open issues and propose
future directionsComment: 27 pages, 4 figure
Trends on Computer Security: Cryptography, User Authentication, Denial of Service and Intrusion Detection
The new generation of security threats has been promoted by digital
currencies and real-time applications, where all users develop new ways to
communicate on the Internet. Security has evolved in the need of privacy and
anonymity for all users and his portable devices. New technologies in every
field prove that users need security features integrated into their
communication applications, parallel systems for mobile devices, internet, and
identity management. This review presents the key concepts of the main areas in
computer security and how it has evolved in the last years. This work focuses
on cryptography, user authentication, denial of service attacks, intrusion
detection and firewalls
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes
This paper presents a comprehensive survey of existing authentication and
privacy-preserving schemes for 4G and 5G cellular networks. We start by
providing an overview of existing surveys that deal with 4G and 5G
communications, applications, standardization, and security. Then, we give a
classification of threat models in 4G and 5G cellular networks in four
categories, including, attacks against privacy, attacks against integrity,
attacks against availability, and attacks against authentication. We also
provide a classification of countermeasures into three types of categories,
including, cryptography methods, humans factors, and intrusion detection
methods. The countermeasures and informal and formal security analysis
techniques used by the authentication and privacy preserving schemes are
summarized in form of tables. Based on the categorization of the authentication
and privacy models, we classify these schemes in seven types, including,
handover authentication with privacy, mutual authentication with privacy, RFID
authentication with privacy, deniable authentication with privacy,
authentication with mutual anonymity, authentication and key agreement with
privacy, and three-factor authentication with privacy. In addition, we provide
a taxonomy and comparison of authentication and privacy-preserving schemes for
4G and 5G cellular networks in form of tables. Based on the current survey,
several recommendations for further research are discussed at the end of this
paper.Comment: 24 pages, 14 figure
A study of research trends and issues in wireless ad hoc networks
Ad hoc network enables network creation on the fly without support of any
predefined infrastructure. The spontaneous erection of networks in anytime and
anywhere fashion enables development of various novel applications based on ad
hoc networks. However, at the same ad hoc network presents several new
challenges. Different research proposals have came forward to resolve these
challenges. This chapter provides a survey of current issues, solutions and
research trends in wireless ad hoc network. Even though various surveys are
already available on the topic, rapid developments in recent years call for an
updated account on this topic. The chapter has been organized as follows. In
the first part of the chapter, various ad hoc network's issues arising at
different layers of TCP/IP protocol stack are presented. An overview of
research proposals to address each of these issues is also provided. The second
part of the chapter investigates various emerging models of ad hoc networks,
discusses their distinctive properties and highlights various research issues
arising due to these properties. We specifically provide discussion on ad hoc
grids, ad hoc clouds, wireless mesh networks and cognitive radio ad hoc
networks. The chapter ends with presenting summary of the current research on
ad hoc network, ignored research areas and directions for further research
CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices
The microservices architectural approach has important benefits regarding the
agile applications' development and the delivery of complex solutions. However,
to convey the information and share the data amongst services in a verifiable
and stateless way, there is a need to enable appropriate access control methods
and authorisations. In this paper, we study the use of policy-driven
authorisations with independent fine-grained microservices in the case of a
real-world machine-to-machine (M2M) scenario using a hybrid cloud-based
infrastructure and Internet of Things (IoT) services. We also model the
authentication flows which facilitate the message exchanges between the
involved entities, and we propose a containerised authorisation and
policy-driven architecture (CAPODAZ) using the microservices paradigm. The
proposed architecture implements a policy-based management framework and
integrates in an on-going work regarding a Cloud-IoT intelligent transportation
service. For the in-depth quantitative evaluation, we treat multiple
distributions of users' populations and assess the proposed architecture
against other similar microservices. The numerical results based on the
experimental data show that there exists significant performance preponderance
in terms of latency, throughput and successful requests
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey
With the Internet of Things (IoT) becoming part of our daily life and our
environment, we expect rapid growth in the number of connected devices. IoT is
expected to connect billions of devices and humans to bring promising
advantages for us. With this growth, fog computing, along with its related edge
computing paradigms, such as multi-access edge computing (MEC) and cloudlet,
are seen as promising solutions for handling the large volume of
security-critical and time-sensitive data that is being produced by the IoT. In
this paper, we first provide a tutorial on fog computing and its related
computing paradigms, including their similarities and differences. Next, we
provide a taxonomy of research topics in fog computing, and through a
comprehensive survey, we summarize and categorize the efforts on fog computing
and its related computing paradigms. Finally, we provide challenges and future
directions for research in fog computing.Comment: 48 pages, 7 tables, 11 figures, 450 references. The data (categories
and features/objectives of the papers) of this survey are now available
publicly. Accepted by Elsevier Journal of Systems Architectur
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges
For various reasons, the cloud computing paradigm is unable to meet certain
requirements (e.g. low latency and jitter, context awareness, mobility support)
that are crucial for several applications (e.g. vehicular networks, augmented
reality). To fulfil these requirements, various paradigms, such as fog
computing, mobile edge computing, and mobile cloud computing, have emerged in
recent years. While these edge paradigms share several features, most of the
existing research is compartmentalised; no synergies have been explored. This
is especially true in the field of security, where most analyses focus only on
one edge paradigm, while ignoring the others. The main goal of this study is to
holistically analyse the security threats, challenges, and mechanisms inherent
in all edge paradigms, while highlighting potential synergies and venues of
collaboration. In our results, we will show that all edge paradigms should
consider the advances in other paradigms.Comment: In press, accepted manuscript: Future Generation Computer System
- …