IIUM Repository

Security and privacy for IoT and fog computing paradigm

Rauf, Abdul and Shaikh, Riaz Ahmed and Shah, Asadullah (2018) Security and privacy for IoT and fog computing paradigm. In: 15th Learning and Technology Conference (L&T) 2018, 25th-28th Feb. 2018, Jeddah, Saudi Arabia.

[img] PDF - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
[img]
Preview
PDF (SCOPUS) - Supplemental Material
Download (57kB) | Preview
[img]
Preview
PDF (WOS) - Supplemental Material
Download (180kB) | Preview

Abstract

In the past decade, the revolution in miniaturization (microprocessors, batteries, cameras etc.) and manufacturing of new type of sensors resulted in a new regime of applications based on smart objects called IoT. Majority of such applications or services are to ease human life and/or to setup efficient processes in automated environments. However, this convenience is coming up with new challenges related to data security and human privacy. The objects in IoT are resource constrained devices and cannot implement a fool-proof security framework. These end devices work like eyes and ears to interact with the physical world and collect data for analytics to make expedient decisions. The storage and analysis of the collected data is done remotely using cloud computing. The transfer of data from IoT to the computing clouds can introduce privacy issues and network delays. Some applications need a real-time decision and cannot tolerate the delays and jitters in the network. Here, edge computing or fog computing plays its role to settle down the mentioned issues by providing cloud-like facilities near the end devices. In this paper, we discuss IoT, fog computing, the relationship between IoT and fog computing, their security issues and solutions by different researchers. We summarize attack surface related to each layer of this paradigm which will help to propose new security solutions to escalate it acceptability among end users. We also propose a risk-based trust management model for smart healthcare environment to cope with security and privacy-related issues in this highly un-predictable heterogeneous ecosystem.

Item Type: Conference or Workshop Item (Plenary Papers)
Additional Information: 6566/65260
Uncontrolled Keywords: IoT; fog computing; security challenges; privacy issues; trust management
Subjects: T Technology > T Technology (General) > T10.5 Communication of technical information
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology

Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Prof Asadullah Shah
Date Deposited: 30 Jul 2018 11:46
Last Modified: 30 Jul 2018 11:48
URI: http://irep.iium.edu.my/id/eprint/65260

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year