A survey on privacy and access control schemes in fog computingShow others and affiliations
2019 (English)In: International Journal of Communication Systems, ISSN 1074-5351, E-ISSN 1099-1131, article id e4181Article in journal (Refereed) Published
Abstract [en]
To provide reliable data storage and retrieval services to the end users, the cloud service provider implements secure data storage, sharing, and retrieval mechanisms. However, the aforesaid services provided by cloud have certain pitfalls, such as decision latency and real-time data computation. To address these aforementioned problems, fog computing was introduced for the purpose of providing cloud services at the network's edge. While this migration of the cloud services to the network's edge raises various security concerns, such as trust, authentication, mobility, intrusion, network security, and secure data computation. Among these concerns, the most critical issues that need immediate attention of researchers and practitioners are of privacy and access control in fog computing which are in direct relation to secure data storage and retrieval purposes. So, in order to highlight their importance for research community, this survey embodies to discuss, explain, and compare various privacy preserving and access control schemes in the context of fog computing for classifying and analyzing similarities and variances with respect to other researchers. Moreover, upon classification and analysis of these schemes, various open issues and future directions are also presented for researchers and practitioners for the purpose of enhancing security algorithms to address privacy and access control issues in fog computing.
Place, publisher, year, edition, pages
John Wiley and Sons Ltd , 2019. article id e4181
Keywords [en]
access control, fog computing, privacy, secure data retrieval, secure data storage, security, Data privacy, Digital storage, Distributed database systems, Fog, Surveys, Web services, Access control schemes, Cloud service providers, Research communities, Retrieval mechanisms, Secure data, Security algorithm, Network security
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-40882DOI: 10.1002/dac.4181Scopus ID: 2-s2.0-85074258699OAI: oai:DiVA.org:ri-40882DiVA, id: diva2:1373606
Note
Funding details: Conselho Nacional de Desenvolvimento Científico e Tecnológico, CNPq, 309335/2017‐5; Funding details: Fundação para a Ciência e a Tecnologia, FCT, UID/EEA/50008/2019; Funding details: National Council for Forest Research and Development, COFORD; Funding details: Fuel Cell Technologies Program, FCT; Funding text 1: This work has been supported by a national funding from the FCT—Fundação para a Ciência e a Tecnologia through the UID/EEA/50008/2019 Project and by the Brazilian National Council for Research and Development (CNPq), Grant no. 309335/2017‐5.
2019-11-272019-11-272020-10-02Bibliographically approved