Advances, Systems and Applications
From: Fog computing security: a review of current applications and security solutions
Solution category | Resolves | Benefits |
---|---|---|
Data Encryption | Malicious insiders Data Breach Data Loss Insufficient Due Diligence Spyware/malicious processes | If data is breached either at rest, processing or motion, encryption will keep the original data hidden from unauthorized recipients |
Preventing cache attacks | Insecure API Service and application vulnerabilities Sensitive data Leakage Sniffing attacks | If a Fog platform is acting as cache server, the frequently accessed (relevant and sensitive) data by users or other systems via Fog will remain private |
Network monitoring | Advance Persistent Threats Access control issues Denial of Service attack Malicious Insiders Insufficient Due Diligence Abuse and Nefarious use of resources Data Breaches Attack detection | Can immediately notify about the ongoing attack, log malicious events for analysis, block suspicious ingress/egress network traffic and determine/indicate overall health and performance of system |
Malware protection | Account Hijacking Insecure API Service and application vulnerabilities Data corruption/damage risks Shared Technology Issues Performance degradation | Provides real-time scanning and removal of known malicious applications (static analysis), protects against zero-day exploits by intelligent event/behaviour monitoring (dynamic analysis) and ensures consistent performance of the Fog platform |
Wireless security | Advance Persistent Threats Access control issues Data breach Eavesdropping attacks Illegal bandwidth consumption | Fog nodes can increase their mobility in secure manner, enables more IoT devices to connect from anywhere and allows the Fog platform to become more cost effective |
Securing vehicular networks | Advance Persistent Threats Access control issues Account/Session Hijacking Denial of Service attacks User identity protection | Increases road safety by preserving data communication integrity while keeping the user identity and location data private |
Secured multi-tenancy | Access control issues Account Hijacking Insecure APIs Malicious Insiders Abuse and Nefarious use of resources Data Breaches Segregation Issues | Secure data collaboration among approved users, prevention of memory escaping/hopping attacks to protect each user’s space and increase in efficient use and allocation of Fog resources |
Backup and recovery | Data Loss Data unavailability issues Insufficient Due Diligence Malware infection Data integrity issues | In case of natural disaster, malware infection or DoS attack, the data will remain available to users and system along with its integrity |