Security and Privacy Issues in Cloud and Fog Domain
Verified
Added on 2023/06/12
|5
|823
|66
AI Summary
This article discusses the security and privacy issues in cloud and fog domain. It explains the background of cloud and fog computing and the challenges faced by them. The article also highlights the vulnerabilities of both domains and the need to mitigate them.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN Security and Privacy Issues in Cloud and Fog Domain Name of the Student Name of the University Author’s Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN 1. Introduction The Internet of Things or IoT is the core concept in technology that helps to understand the major areas and advancements of the technological world. RFID as well as sensor technology are utilized in this sector (Wortmann & Flüchter, 2015). The main objectives of this Internet of Things is to make the successful connection with both living and inanimate things, utilize sensors for the purpose of collecting data, changing the type of items that are communicated over the network and many more. Cloud computing is the easiest method of transferring all types of data through the connection of Internet, without any complexity. Fog computing is the computing infrastructure for distributing the applications and data efficiently and effectively. 1.1. Cloud and Fog Domain 1.1.1. Background Cloud computing is the part of information technology through which the great access of shared pools of all types of configurable resources are being frequently provisioned (Osanaiye et al., 2017). This could only be used when the cloud is connected to the Internet. It is responsible for minimizing the infrastructure costs. Fogging or fog computing allows the users to properly distribute the data source as well as the cloud over a decentralized infrastructurelogically.Thisinfrastructureisutilizedforthecomputation,storingor manipulation of the data or information (Vaquero & Rodero-Merino, 2014). Fog computing is the extension of cloud computing in the network edges. Thus, it comprises of all the advantages of cloud computing. The fog domain is utilized by various users.
2 SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN 1.1.2. Security and Privacy Issues or Challenges in Cloud and Fog Domain Both the cloud as well as the fog domains is vulnerable to various types of security and privacy issues or challenges. These security issues make the domains difficult to use and thus they are vulnerable for the users (Yang, 2014). The most significant security and privacy issues in cloud computing mainly include data breaching, hijacking of the accounts, any type of insider threats, malware injections, insecure APIs, DoS attacks or Denial of Service attacks, inadequate diligence and many others. These security issues eventually make the entire ideology of cloud computing dangerous for the users and thus they often give a second thought while using this technology (Osanaiye et al., 2017). Fog computing is also vulnerable to various security or privacy issues. When the technical applications of fog domain are being analyzed, it is noted that the domains does not comprise of any security measures (Vaquero & Rodero-Merino, 2014). Thus, it is extremely vulnerable to the security and privacy issues. The absence of data segregation is one of the most important issues in fog computing. The lack of encryption is the second major problem regarding security. When the data is transferred, encryption helps to secure the data. However, since the data is not encrypted, there is always a high chance that the data would be lost. Lack of data authentication is the third security issue in fog computing. All these issues or challenges should be mitigated, so that there exists no problem amongst the security. Structure of the Report 1. Introduction 1.1. Cloud and Fog Domain 1.1.1. Background 1.1.2. Security and Privacy Issues or Challenges in Cloud and Fog Domain
3 SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN References Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., & Dlodlo, M. (2017). From cloud to fog computing: A review and a conceptual live VM migration framework.IEEE Access,5, 8284-8300. Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a comprehensivedefinitionoffogcomputing.ACMSIGCOMMComputer Communication Review,44(5), 27-32. Wortmann, F., & Flüchter, K. (2015). Internet of things.Business & Information Systems Engineering,57(3), 221-224. Yang, S. H. (2014). Internet of things. InWireless Sensor Networks(pp. 247-261). Springer, London.