A systematic approach towards security in Fog computing: assets, vulnerabilities, possible countermeasures

Mozhdeh Farhadi 1, 2 Jean-Louis Lanet 3 Guillaume Pierre 1 Daniele Miorandi 2
1 MYRIADS - Design and Implementation of Autonomous Distributed Systems
Inria Rennes – Bretagne Atlantique , IRISA-D1 - SYSTÈMES LARGE ÉCHELLE
3 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
CentraleSupélec, Inria Rennes – Bretagne Atlantique , IRISA-D1 - SYSTÈMES LARGE ÉCHELLE
Abstract : Fog computing is an emerging paradigm in the IoT space, consisting of a middle computation layer, sitting between IoT devices and Cloud servers. Fog computing provides additional computing, storage and networking resources in close proximity to where data is being generated and/or consumed. As the Fog layer has direct access to data streams generated by IoT devices and responses/commands sent from the Cloud, it is in a critical position in terms of security of the entire IoT system. Currently, there is no specific tool or methodology for analysing the security of Fog computing systems in a comprehensive way. Generic security evaluation procedures applicable to most information technology products are time consuming, costly and badly suited to the Fog context. In this article, we introduce a methodology for evaluating the security of Fog computing systems in a systematic way. We also apply our methodology to a generic Fog computing system, showcasing how it can be purposefully used by security analysts and system designers.
Complete list of metadatas

Cited literature [63 references]  Display  Hide  Download

https://hal.inria.fr/hal-02441639
Contributor : Guillaume Pierre <>
Submitted on : Thursday, January 16, 2020 - 7:41:17 AM
Last modification on : Friday, January 24, 2020 - 1:30:00 AM

File

main.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-02441639, version 1

Citation

Mozhdeh Farhadi, Jean-Louis Lanet, Guillaume Pierre, Daniele Miorandi. A systematic approach towards security in Fog computing: assets, vulnerabilities, possible countermeasures. Software: Practice and Experience, Wiley, In press. ⟨hal-02441639⟩

Share

Metrics

Record views

85

Files downloads

246