Security and privacy for IoT and fog computing paradigm

In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras etc.) and manufacturing of new type of sensors resulted in a new regime of applications based on smart objects called IoT. Majority of such applications or services are to ease human life and/or to setup effic...

Full description

Bibliographic Details
Main Authors: Rauf, Abdul, Shaikh, Riaz Ahmed, Shah, Asadullah
Format: Conference or Workshop Item
Language:English
English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2018
Subjects:
Online Access:http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/1/65260_Security%20and%20privacy%20for%20IoT.pdf
http://irep.iium.edu.my/65260/2/65260_Security%20and%20privacy%20for%20IoT_SCOPUS.pdf
http://irep.iium.edu.my/65260/3/65260_Security%20and%20privacy%20for%20IoT_WOS.pdf
id iium-65260
recordtype eprints
spelling iium-652602018-07-30T03:48:16Z http://irep.iium.edu.my/65260/ Security and privacy for IoT and fog computing paradigm Rauf, Abdul Shaikh, Riaz Ahmed Shah, Asadullah T10.5 Communication of technical information In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras etc.) and manufacturing of new type of sensors resulted in a new regime of applications based on smart objects called IoT. Majority of such applications or services are to ease human life and/or to setup efficient processes in automated environments. However, this convenience is coming up with new challenges related to data security and human privacy. The objects in IoT are resource constrained devices and cannot implement a fool-proof security framework. These end devices work like eyes and ears to interact with the physical world and collect data for analytics to make expedient decisions. The storage and analysis of the collected data is done remotely using cloud computing. The transfer of data from IoT to the computing clouds can introduce privacy issues and network delays. Some applications need a real-time decision and cannot tolerate the delays and jitters in the network. Here, edge computing or fog computing plays its role to settle down the mentioned issues by providing cloud-like facilities near the end devices. In this paper, we discuss IoT, fog computing, the relationship between IoT and fog computing, their security issues and solutions by different researchers. We summarize attack surface related to each layer of this paradigm which will help to propose new security solutions to escalate it acceptability among end users. We also propose a risk-based trust management model for smart healthcare environment to cope with security and privacy-related issues in this highly un-predictable heterogeneous ecosystem. Institute of Electrical and Electronics Engineers Inc. 2018 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/65260/1/65260_Security%20and%20privacy%20for%20IoT.pdf application/pdf en http://irep.iium.edu.my/65260/2/65260_Security%20and%20privacy%20for%20IoT_SCOPUS.pdf application/pdf en http://irep.iium.edu.my/65260/3/65260_Security%20and%20privacy%20for%20IoT_WOS.pdf Rauf, Abdul and Shaikh, Riaz Ahmed and Shah, Asadullah (2018) Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018, 25th-28th Feb. 2018, Jeddah, Saudi Arabia. https://ieeexplore.ieee.org/document/8368491/ 10.1109/LT.2018.8368491
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
English
topic T10.5 Communication of technical information
spellingShingle T10.5 Communication of technical information
Rauf, Abdul
Shaikh, Riaz Ahmed
Shah, Asadullah
Security and privacy for IoT and fog computing paradigm
description In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras etc.) and manufacturing of new type of sensors resulted in a new regime of applications based on smart objects called IoT. Majority of such applications or services are to ease human life and/or to setup efficient processes in automated environments. However, this convenience is coming up with new challenges related to data security and human privacy. The objects in IoT are resource constrained devices and cannot implement a fool-proof security framework. These end devices work like eyes and ears to interact with the physical world and collect data for analytics to make expedient decisions. The storage and analysis of the collected data is done remotely using cloud computing. The transfer of data from IoT to the computing clouds can introduce privacy issues and network delays. Some applications need a real-time decision and cannot tolerate the delays and jitters in the network. Here, edge computing or fog computing plays its role to settle down the mentioned issues by providing cloud-like facilities near the end devices. In this paper, we discuss IoT, fog computing, the relationship between IoT and fog computing, their security issues and solutions by different researchers. We summarize attack surface related to each layer of this paradigm which will help to propose new security solutions to escalate it acceptability among end users. We also propose a risk-based trust management model for smart healthcare environment to cope with security and privacy-related issues in this highly un-predictable heterogeneous ecosystem.
format Conference or Workshop Item
author Rauf, Abdul
Shaikh, Riaz Ahmed
Shah, Asadullah
author_facet Rauf, Abdul
Shaikh, Riaz Ahmed
Shah, Asadullah
author_sort Rauf, Abdul
title Security and privacy for IoT and fog computing paradigm
title_short Security and privacy for IoT and fog computing paradigm
title_full Security and privacy for IoT and fog computing paradigm
title_fullStr Security and privacy for IoT and fog computing paradigm
title_full_unstemmed Security and privacy for IoT and fog computing paradigm
title_sort security and privacy for iot and fog computing paradigm
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2018
url http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/
http://irep.iium.edu.my/65260/1/65260_Security%20and%20privacy%20for%20IoT.pdf
http://irep.iium.edu.my/65260/2/65260_Security%20and%20privacy%20for%20IoT_SCOPUS.pdf
http://irep.iium.edu.my/65260/3/65260_Security%20and%20privacy%20for%20IoT_WOS.pdf
first_indexed 2023-09-18T21:32:36Z
last_indexed 2023-09-18T21:32:36Z
_version_ 1777412610791047168