A Report on Security and Privacy Issues in Cloud and Fog Domains

Verified

Added on  2023/06/12

|5
|823
|66
Report
AI Summary
This report provides an overview of security and privacy issues within cloud and fog computing domains, highlighting the vulnerabilities and challenges associated with each. It begins by introducing the Internet of Things (IoT) and its reliance on RFID and sensor technologies, leading into an explanation of cloud and fog computing as methods for data transfer and distribution. The report then delves into specific security concerns, such as data breaches, account hijacking, insider threats, malware injections, and denial-of-service attacks in cloud computing. For fog computing, it emphasizes issues like the absence of data segregation, lack of encryption during data transfer, and insufficient data authentication measures. The report concludes by stressing the importance of mitigating these security and privacy issues to ensure the safe and effective use of cloud and fog technologies.
Document Page
Running head: SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
Security and Privacy Issues in Cloud and Fog Domain
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
1. Introduction
The Internet of Things or IoT is the core concept in technology that helps to
understand the major areas and advancements of the technological world. RFID as well as
sensor technology are utilized in this sector (Wortmann & Flüchter, 2015). The main
objectives of this Internet of Things is to make the successful connection with both living and
inanimate things, utilize sensors for the purpose of collecting data, changing the type of items
that are communicated over the network and many more. Cloud computing is the easiest
method of transferring all types of data through the connection of Internet, without any
complexity. Fog computing is the computing infrastructure for distributing the applications
and data efficiently and effectively.
1.1. Cloud and Fog Domain
1.1.1. Background
Cloud computing is the part of information technology through which the great access
of shared pools of all types of configurable resources are being frequently provisioned
(Osanaiye et al., 2017). This could only be used when the cloud is connected to the Internet.
It is responsible for minimizing the infrastructure costs. Fogging or fog computing allows the
users to properly distribute the data source as well as the cloud over a decentralized
infrastructure logically. This infrastructure is utilized for the computation, storing or
manipulation of the data or information (Vaquero & Rodero-Merino, 2014). Fog computing
is the extension of cloud computing in the network edges. Thus, it comprises of all the
advantages of cloud computing. The fog domain is utilized by various users.
Document Page
2
SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
1.1.2. Security and Privacy Issues or Challenges in Cloud and Fog Domain
Both the cloud as well as the fog domains is vulnerable to various types of security
and privacy issues or challenges. These security issues make the domains difficult to use and
thus they are vulnerable for the users (Yang, 2014). The most significant security and privacy
issues in cloud computing mainly include data breaching, hijacking of the accounts, any type
of insider threats, malware injections, insecure APIs, DoS attacks or Denial of Service
attacks, inadequate diligence and many others. These security issues eventually make the
entire ideology of cloud computing dangerous for the users and thus they often give a second
thought while using this technology (Osanaiye et al., 2017).
Fog computing is also vulnerable to various security or privacy issues. When the
technical applications of fog domain are being analyzed, it is noted that the domains does not
comprise of any security measures (Vaquero & Rodero-Merino, 2014). Thus, it is extremely
vulnerable to the security and privacy issues. The absence of data segregation is one of the
most important issues in fog computing. The lack of encryption is the second major problem
regarding security. When the data is transferred, encryption helps to secure the data.
However, since the data is not encrypted, there is always a high chance that the data would be
lost. Lack of data authentication is the third security issue in fog computing. All these issues
or challenges should be mitigated, so that there exists no problem amongst the security.
Structure of the Report
1. Introduction
1.1. Cloud and Fog Domain
1.1.1. Background
1.1.2. Security and Privacy Issues or Challenges in Cloud and Fog Domain
Document Page
3
SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
SECURITY AND PRIVACY ISSUES IN CLOUD AND FOG DOMAIN
References
Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K. K. R., & Dlodlo, M. (2017). From cloud to
fog computing: A review and a conceptual live VM migration framework. IEEE
Access, 5, 8284-8300.
Vaquero, L. M., & Rodero-Merino, L. (2014). Finding your way in the fog: Towards a
comprehensive definition of fog computing. ACM SIGCOMM Computer
Communication Review, 44(5), 27-32.
Wortmann, F., & Flüchter, K. (2015). Internet of things. Business & Information Systems
Engineering, 57(3), 221-224.
Yang, S. H. (2014). Internet of things. In Wireless Sensor Networks (pp. 247-261). Springer,
London.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]