{"title":"Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments","authors":"Roshan Gunwantrao Belsare, Premchand B. Ambhore","doi":"10.47164/ijngc.v13i5.935","DOIUrl":null,"url":null,"abstract":"Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"498 1","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Next-Generation Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47164/ijngc.v13i5.935","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.