M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security (TISSEC), vol.13, p.1, 2009.

M. Abomhara and G. M. Køien, Security and privacy in the internet of things: Current status and open issues, 2014 international conference on privacy and security in mobile systems (PRISMS), pp.1-8, 2014.

A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Computing, vol.21, 2017.

M. Ammar, G. Russello, and B. Crispo, Internet of Things: A survey on the security of IoT frameworks, Journal of Information Security and Applications, vol.38, pp.8-27, 2018.

S. Bistarelli, F. Fioravanti, and P. Peretti, Defense trees for economic evaluation of security investments, First International Conference on Availability, Reliability and Security (ARES'06, p.8, 2006.

M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, The role of trust management in distributed systems security, Secure Internet Programming, pp.185-210, 1999.

F. Bonomi, Connected vehicles, the internet of things, and fog computing, The eighth ACM international workshop on vehicular inter-networking (VANET), pp.13-15, 2011.

F. Bonomi, R. Milito, J. Zhu, A. , and S. , Fog computing and its role in the internet of things, Proc. MCC workshop on Mobile cloud computing, 2012.

G. Bouffard and J. Lanet, Reversing the operating system of a java based smart card, Journal of Computer Virology and Hacking Techniques, vol.10, pp.239-253, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01024393

M. Bouissou and J. Bon, A new formalism that combines advantages of fault-trees and markov models: Boolean logic driven markov processes, Reliability Engineering & System Safety, vol.82, pp.149-163, 2003.

D. Chen and H. Zhao, Data security and privacy protection issues in cloud computing, 2012 International Conference on Computer Science and Electronics Engineering, vol.1, pp.647-651, 2012.

C. Skouloudi and G. F. , Towards secure convergence of cloud and IoT, 2018.

, The treacherous 12 -top threats to cloud computing + industry insights, 2017.

M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen et al., Losing control: On the effectiveness of control-flow integrity under stack attacks, Proc. ACM SIGSAC Conference on Computer and Communications Security, 2015.

, uri=OJ: L:2016:119:FULL&from=EL, vol.269, 2014.

C. Criteria, Common criteria for information technology security evaluation, part 1: Introduction and general model (2009) version 3.1, revision, vol.3, 2009.

T. H. Dang, P. Maniatis, and D. Wagner, The performance cost of shadow stacks and stack canaries, Proc. ACM Symposium on Information, 2015.

C. Esposito, A. Castiglione, F. Pop, and K. R. Choo, Challenges of connecting edge and cloud computing: A security and forensic perspective, IEEE Cloud computing, vol.4, 2017.

M. Farhadi, D. Miorandi, P. , and G. , Blockchain enabled fog structure to provide data security in iot applications, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02003055

. Flexera, RightScale state of the cloud report, 2019.

M. Frustaci, P. Pace, G. Aloi, and G. Fortino, Evaluating critical security issues of the iot world: Present and future challenges, IEEE Internet of Things Journal, vol.5, pp.2483-2495, 2017.

S. Ganguli and T. Friedman, IoT technology disruptions: A Gartner trend insight report, 2017.

Q. Gou, L. Yan, Y. Liu, L. , and Y. , Construction and strategies in iot security system, 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE cyber, physical and social computing, pp.1129-1132, 2013.

D. Gruss, C. Maurice, S. Mangard, and . Rowhammer, js: A remote software-induced fault attack in javascript, Proc. Intl. Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2016.

W. G. Halfond, J. Viegas, and A. Orso, A classification of SQL-injection attacks and countermeasures, Proc. IEEE International Symposium on Secure Software Engineering, 2006.

, IEEE 1934-2018 -IEEE standard for adoption of OpenFog reference architecture for fog computing, IEEE Standards Association, 2018.

Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, Security of the internet of things: perspectives and challenges, Wireless Networks, vol.20, pp.2481-2501, 2014.

M. A. Khan and K. Salah, Iot security: Review, blockchain solutions, and open challenges, Future Generation Computer Systems, vol.82, pp.395-411, 2018.

S. Khan, S. Parkinson, and Y. Qin, Fog computing security: a review of current applications and security solutions, Journal of Cloud Computing, vol.6, issue.1, 2017.

J. Kindervag, Build security into your network's dna: The zero trust network architecture, 2010.

L. Lamport, R. Shostak, and M. Pease, The byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.4, pp.382-401, 1982.

H. Li and M. Singhal, Trust management in distributed systems, Computer, vol.40, pp.45-53, 2007.

C. Liu, C. Yang, X. Zhang, C. , and J. , External integrity verification for outsourced big data in cloud and iot: A big picture, Future generation computer systems, vol.49, pp.58-67, 2015.

H. Liu, Y. Zhang, Y. , and T. , Blockchain-enabled security in electric vehicles cloud and edge computing, IEEE Network, vol.32, p.3, 2018.

. Mckinsey, The Internet of Things: Five critical questions

D. Miorandi, S. Sicari, F. De-pellegrini, and I. Chlamtac, Internet of things: Vision, applications and research challenges, Ad hoc networks, vol.10, pp.1497-1516, 2012.

J. D. Moffett, Security & distributed systems, 1995.

M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M. A. Ferrag et al., Security and privacy in fog computing: Challenges, IEEE Access, vol.5, 2017.

N. Neshenko, E. Bou-harb, J. Crichigno, G. Kaddoum, and N. Ghani, Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations, IEEE Communications Surveys & Tutorials, 2019.

O. Consortium, OpenFog reference architecture for fog computing, 2017.

H. Ozdoganoglu, T. Vijaykumar, C. E. Brodley, B. A. Kuperman, J. et al., SmashGuard: A hardware solution to prevent security attacks on the function return address, IEEE Transactions on Computers, vol.55, issue.10, 2006.

H. Pang and K. Tan, Authenticating query results in edge computing, Proc. ICDE, 2004.

D. Puthal, S. P. Mohanty, S. A. Bhavake, G. Morgan, and R. Ranjan, Fog computing security challenges and future directions [energy and security, IEEE Consumer Electronics Magazine, vol.8, pp.92-96, 2019.

D. Puthal, S. Nepal, R. Ranjan, C. , and J. , Threats to networking cloud and edge datacenters in the internet of things, IEEE Cloud Computing, vol.3, pp.64-71, 2016.

R. Roman, J. Lopez, M. Mambo, and . Mobile-edge-computing, A survey and analysis of security threats and challenges, Future Generation Computer Systems, vol.78, pp.680-698, 2018.

A. Roy, D. S. Kim, and K. S. Trivedi, Attack countermeasure trees (act): towards unifying the constructs of attack and defense trees, Security and Communication Networks, vol.5, pp.929-943, 2012.

B. Schneier, Attack trees, Dr. Dobb's journal, vol.24, pp.21-29, 1999.

S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-porisini, Security, privacy and trust in internet of things: The road ahead, Computer networks, vol.76, pp.146-164, 2015.

A. Simmonds, P. Sandilands, and L. Van-ekert, An ontology for network security attacks, Asian Applied Computing Conference, pp.317-323, 2004.

J. G. Steiner, B. C. Neuman, and J. I. Schiller, Kerberos: An authentication service for open network systems, Usenix Winter, pp.191-202, 1988.

I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services, IEEE Communications Surveys & Tutorials, vol.20, pp.3453-3495, 2018.

I. Stojmenovic, S. Wen, X. Huang, and H. Luan, An overview of fog computing and its security issues, Concurrency and Computation: Practice and Experience, vol.28, pp.2991-3005, 2016.

A. S. Tanenbaum and M. Van-steen, Distributed systems: principles and paradigms, 2007.

P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel et al., Cross site scripting prevention with dynamic data tainting and static analysis, Proc. NDSS, 2007.

M. Wazid, A. K. Das, R. Hussain, G. Succi, and J. J. Rodrigues, Authentication in cloud-driven IoT-based big data environment: Survey and outlook, Journal of Systems Architecture, vol.97, pp.185-196, 2019.

A. Weissberger, IDC directions 2017: IoT forecast, 5G and related sessions, 2017.

. Wikipedia, Common criteria, 2019.

, Wikipedia. Communication channel, 2019.

X. Xu, Y. Chen, X. Zhang, Q. Liu, X. Liu et al., A blockchain-based computation offloading method for edge computing in 5g networks

S. Yi, Z. Qin, L. , and Q. , Security and privacy issues of fog computing: A survey, Proc. International conference on wireless algorithms, systems, and applications, 2015.

L. Zhang, W. Jia, S. Wen, and D. Yao, A man-in-the-middle attack on 3g-wlan interworking, Proc. IEEE Conference on Communications and Mobile Computing, 2010.

Z. Zhang, M. C. Cho, C. Wang, C. Hsu, C. Chen et al., IoT security: ongoing challenges and research opportunities, 2014 IEEE 7th international conference on service-oriented computing and applications, pp.230-234, 2014.

K. Zhao and L. Ge, A survey on the Internet of things security, Ninth international conference on computational intelligence and security, pp.663-667, 2013.