Cargando…

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information...

Descripción completa

Detalles Bibliográficos
Autores principales: Tariq, Noshina, Asim, Muhammad, Al-Obeidat, Feras, Zubair Farooqi, Muhammad, Baker, Thar, Hammoudeh, Mohammad, Ghafir, Ibrahim
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6515199/
https://www.ncbi.nlm.nih.gov/pubmed/31013993
http://dx.doi.org/10.3390/s19081788
_version_ 1783418036361887744
author Tariq, Noshina
Asim, Muhammad
Al-Obeidat, Feras
Zubair Farooqi, Muhammad
Baker, Thar
Hammoudeh, Mohammad
Ghafir, Ibrahim
author_facet Tariq, Noshina
Asim, Muhammad
Al-Obeidat, Feras
Zubair Farooqi, Muhammad
Baker, Thar
Hammoudeh, Mohammad
Ghafir, Ibrahim
author_sort Tariq, Noshina
collection PubMed
description The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
format Online
Article
Text
id pubmed-6515199
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-65151992019-05-30 The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey Tariq, Noshina Asim, Muhammad Al-Obeidat, Feras Zubair Farooqi, Muhammad Baker, Thar Hammoudeh, Mohammad Ghafir, Ibrahim Sensors (Basel) Article The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations. MDPI 2019-04-14 /pmc/articles/PMC6515199/ /pubmed/31013993 http://dx.doi.org/10.3390/s19081788 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Tariq, Noshina
Asim, Muhammad
Al-Obeidat, Feras
Zubair Farooqi, Muhammad
Baker, Thar
Hammoudeh, Mohammad
Ghafir, Ibrahim
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_full The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_fullStr The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_full_unstemmed The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_short The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey
title_sort security of big data in fog-enabled iot applications including blockchain: a survey
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6515199/
https://www.ncbi.nlm.nih.gov/pubmed/31013993
http://dx.doi.org/10.3390/s19081788
work_keys_str_mv AT tariqnoshina thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT asimmuhammad thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT alobeidatferas thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT zubairfarooqimuhammad thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT bakerthar thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT hammoudehmohammad thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ghafiribrahim thesecurityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT tariqnoshina securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT asimmuhammad securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT alobeidatferas securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT zubairfarooqimuhammad securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT bakerthar securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT hammoudehmohammad securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey
AT ghafiribrahim securityofbigdatainfogenablediotapplicationsincludingblockchainasurvey