Browse > Article
http://dx.doi.org/10.15207/JKCS.2018.9.5.027

Research on Security Model and Requirements for Fog Computing: Survey  

Hong, Sunghyuck (Div. of Information & Communication, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.9, no.5, 2018 , pp. 27-32 More about this Journal
Abstract
IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.
Keywords
Fog computing; Security; Authentication; Secure Communication; Sensor Networks;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 B. Negash, A. M. Rahmani, P. Liljeberg & A. Jantsch. (2017). Fog Computing Fundamentals in the Internet-of-Things. Fog Computing in the Internet of Things, 3-13. doi:10.1007/978-3-319-57639-8_1
2 S. Hong. (2014). Analysis of DDoS Attack and Countermeasure: Survey. The Journal of Digital Policy and Management, 12(1), 423-429. doi:10.14400/jdpm.2014.12.1.423
3 C. Gu, Y. Zheng, F. Kang & D. Xin. (2015). Keyword Search Over Encrypted Data in Cloud Computing from Lattices in the Standard Model. Cloud Computing and Big Data Lecture Notes in Computer Science, 335-343. doi:10.1007/978-3-319-28430-9_25
4 K. Tammemae, A. Jantsch, A. Kuusik, J. Preden & E. Ounapuu. (2017). Self-Aware Fog Computing in Private and Secure Spheres. Fog Computing in the Internet of Things, 71-99. doi:10.1007/978-3-319-57639-8_5
5 P. K. Rayani, B. Bhushan & V. R. Thakare. (2018). Multi-Layer Token Based Authentication Through Honey Password in Fog Computing. International Journal of Fog Computing, 1(1), 50-62. doi:10.4018/ijfc.2018010104   DOI
6 V. Mushunuri, A. Kattepur, H. K. Rath, & A. Simha. (2017). Resource optimization in fog enabled IoT deployments. 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). doi:10.1109/fmec.2017.7946400
7 Cloud and Fog Computing. (2017). Secure Connected Objects, 238-247. doi:10.1002/9781119426639.ch17
8 G. Ryu. (2015). Development of Educational Model for ICT-based Convergence Expert. Journal of the Korea Convergence Society, 6(6), 75-80. doi:10.15207/jkcs.2015.6.6.075.   DOI
9 S. Hong. (2017). Secure and light IoT protocol (SLIP) for anti-hacking. Journal of Computer Virology and Hacking Techniques, 13(4), 241-247. doi:10.1007/s11416-017-0295-5.   DOI
10 K. Choi & J. A. Yoo. (2015). A reviews on the social network analysis using R. Journal of the Korea Convergence Society, 6(1), 77-83. doi:10.15207/jkcs.2015.6.1.077   DOI
11 Y. Joh, Y. (2014). A Framework for IoT-Based Convergence Personalized Menu Recommendation System. Journal of the Korea Convergence Society ,5(4), 147-153. doi:10.15207/jkcs.2014.5.4.147.   DOI
12 Fog Computing and compare with Cloud Computing. (2017). International Journal of Recent Trends in Engineering and Research, 3(12), 129-131. doi:10.23883/ijrter.2017.3546.pszaf   DOI
13 Hong, S. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques, 12(3), 137-143. doi:10.1007/s11416-015-0254-y
14 R. Rios, R. Roman, J. A. Onieva & J. Lopez. (2017). From SMOG to Fog: A security perspective. 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC). doi:10.1109/fmec.2017.7946408.
15 S. Hong, S. Lim & J. Song. (2011). Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey. KSII Transactions on Internet and Information Systems, 805-821. doi:10.3837/tiis.2011.04.010   DOI
16 S. Hong. (2013). Disconnection of Wireless LAN Attack and Countermeasure. The Journal of Digital Policy and Management, 11(12), 453-458. doi:10.14400/jdpm.2013.11.12.453
17 S. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. doi:10.15207/jkcs.2017.8.2.021   DOI