دانلود رایگان مقاله انگلیسی امنیت و حریم شخصی محیط اینترنت اشیای پشتیبانی شده با محاسبات مه - نشریه IEEE

عنوان فارسی
مسائل مربوط به امنیت و حریم شخصی محیط اینترنت اشیای پشتیبانی شده با محاسبات مه
عنوان انگلیسی
On Security and Privacy Issues of Fog Computing supported Internet of Things Environment
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
3
سال انتشار
2015
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
کد محصول
E5807
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات
گرایش های مرتبط با این مقاله
اینترنت و شبکه های گسترده
مجله
ششمین کنفرانس بین المللی شبکه های آینده - (6th International Conference on the Network of the Future (NOF
دانشگاه
Department of Computer Science and Engineering - Hanyang University - ERICA Campus - South Korea
چکیده

Abstract


Recently, the concept of Internet of Things (IoT) is attracting much attention due to the huge potential. IoT uses the Internet as a key infrastructure to interconnect numerous geographically diversified IoT nodes which usually have scare resources, and therefore cloud is used as a key back-end supporting infrastructure. In the literature, the collection of the IoT nodes and the cloud is collectively called as an IoT cloud. Unfortunately, the IoT cloud suffers from various drawbacks such as huge network latency as the volume of data which is being processed within the system increases. To alleviate this issue, the concept of fog computing is introduced, in which foglike intermediate computing buffers are located between the IoT nodes and the cloud infrastructure to locally process a significant amount of regional data. Compared to the original IoT cloud, the communication latency as well as the overhead at the backend cloud infrastructure could be significantly reduced in the fog computing supported IoT cloud, which we will refer as IoT fog. Consequently, several valuable services, which were difficult to be delivered by the traditional IoT cloud, can be effectively offered by the IoT fog. In this paper, however, we argue that the adoption of IoT fog introduces several unique security threats. We first discuss the concept of the IoT fog as well as the existing security measures, which might be useful to secure IoT fog. Then, we explore potential threats to IoT fog.

نتیجه گیری

V. CONCLUSIONS AND FUTURE WORK


In this paper, we explore sensor, a fog node and cloud which combine to form a fog computing environment. We also describe security issues in each area. Fog computing provides the improved quality of services to the user by complementing shortages of cloud in IoT environment. IoT technology is utilized in various fields in the future and have to be protected from security threats. In this paper, we highlighted the need to configure the secure fog computing environment through security technologies which we analyzed. The extended work could be to develop a system to efficiently collect and analyze various logs generated in fog computing environment. It provides a meaningful situation information to users.


بدون دیدگاه