当前位置:
X-MOL 学术
›
Comput. Sci. Rev.
›
论文详情
Our official English website, www.x-mol.net, welcomes your
feedback! (Note: you will need to create a separate account there.)
A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions
Computer Science Review ( IF 13.3 ) Pub Date : 2024-10-25 , DOI: 10.1016/j.cosrev.2024.100688 Navjeet Kaur
Computer Science Review ( IF 13.3 ) Pub Date : 2024-10-25 , DOI: 10.1016/j.cosrev.2024.100688 Navjeet Kaur
The dynamic and decentralized architecture of fog computing, which extends cloud computing closer to the edge of the network, offers benefits such as reduced latency and enhanced bandwidth. However, the existing fog architecture introduces unique security challenges due to the large number of distributed fog nodes, often deployed in diverse and resource-constrained environments. Further, the proximity of fog computing nodes to end-users and the open, distributed nature of the architecture make fog environments particularly vulnerable to unauthorized access and various types of cyberattacks. Therefore, in order to address these challenges, the study presented a detailed systematic review that aims to analyze existing security technologies in fog computing environments, identify current security gaps, and propose future research directions. The comprehensive literature review uses quality databases, focusing on articles published within the last four years, i.e. from 2020 to 2024. Further, the review followed a systematic methodology with clear inclusion and exclusion criteria to ensure relevance and quality with respect to security in fog computing. Consequently, key research questions are also formulated and answered for addressing various security concerns, such as architectural security, IoT integration vulnerabilities, and dynamic security management. Finally, the detailed review summarizes the key findings through MTGIR analysis to give valuable insights on the existing security framework of fog computing systems. The result analysis further revealed that 16% of the research is focusing on blockchain and elliptic curve cryptography, alongside the utilization of artificial intelligence and machine learning, which is around 13.2%, specifically for dynamic threat detection. Furthermore, there are few technologies which require attention are federated learning, secure key management, and secure communication mechanisms, as these technologies are less considered in literature, i.e. around 3% only. Finally, the analysis underscored the necessity for real-time security monitoring and adaptive threat response to manage the dynamic nature of fog computing environments effectively.
中文翻译:
雾计算环境安全方面的系统综述:挑战、解决方案和未来方向
雾计算的动态和分散式架构将云计算扩展到更靠近网络边缘的位置,具有减少延迟和增强带宽等优势。然而,由于分布式 fog 节点数量众多,通常部署在多样化且资源受限的环境中,现有的 fog 架构带来了独特的安全挑战。此外,雾计算节点靠近最终用户以及架构的开放、分布式特性使雾环境特别容易受到未经授权的访问和各种类型的网络攻击。因此,为了应对这些挑战,该研究提出了详细的系统综述,旨在分析雾计算环境中的现有安全技术,确定当前的安全差距,并提出未来的研究方向。综合文献综述使用质量数据库,侧重于过去四年(即 2020 年至 2024 年)发表的文章。此外,该审查遵循了具有明确纳入和排除标准的系统方法,以确保雾计算安全性的相关性和质量。因此,还制定并回答了关键研究问题,以解决各种安全问题,例如架构安全、物联网集成漏洞和动态安全管理。最后,详细回顾通过 MTGIR 分析总结了主要发现,为现有的雾计算系统安全框架提供了有价值的见解。结果分析进一步显示,16% 的研究集中在区块链和椭圆曲线密码学上,以及人工智能和机器学习的使用,约为 13 人。2%,专门用于动态威胁检测。此外,需要关注的技术很少是联邦学习、安全密钥管理和安全通信机制,因为这些技术在文献中很少被考虑,即只有 3% 左右。最后,该分析强调了实时安全监控和自适应威胁响应的必要性,以有效管理雾计算环境的动态性质。
更新日期:2024-10-25
中文翻译:
雾计算环境安全方面的系统综述:挑战、解决方案和未来方向
雾计算的动态和分散式架构将云计算扩展到更靠近网络边缘的位置,具有减少延迟和增强带宽等优势。然而,由于分布式 fog 节点数量众多,通常部署在多样化且资源受限的环境中,现有的 fog 架构带来了独特的安全挑战。此外,雾计算节点靠近最终用户以及架构的开放、分布式特性使雾环境特别容易受到未经授权的访问和各种类型的网络攻击。因此,为了应对这些挑战,该研究提出了详细的系统综述,旨在分析雾计算环境中的现有安全技术,确定当前的安全差距,并提出未来的研究方向。综合文献综述使用质量数据库,侧重于过去四年(即 2020 年至 2024 年)发表的文章。此外,该审查遵循了具有明确纳入和排除标准的系统方法,以确保雾计算安全性的相关性和质量。因此,还制定并回答了关键研究问题,以解决各种安全问题,例如架构安全、物联网集成漏洞和动态安全管理。最后,详细回顾通过 MTGIR 分析总结了主要发现,为现有的雾计算系统安全框架提供了有价值的见解。结果分析进一步显示,16% 的研究集中在区块链和椭圆曲线密码学上,以及人工智能和机器学习的使用,约为 13 人。2%,专门用于动态威胁检测。此外,需要关注的技术很少是联邦学习、安全密钥管理和安全通信机制,因为这些技术在文献中很少被考虑,即只有 3% 左右。最后,该分析强调了实时安全监控和自适应威胁响应的必要性,以有效管理雾计算环境的动态性质。