Cargando…
A Survey of Security in Cloud, Edge, and Fog Computing
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The hetero...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8838093/ https://www.ncbi.nlm.nih.gov/pubmed/35161675 http://dx.doi.org/10.3390/s22030927 |
_version_ | 1784650040818532352 |
---|---|
author | Ometov, Aleksandr Molua, Oliver Liombe Komarov, Mikhail Nurmi, Jari |
author_facet | Ometov, Aleksandr Molua, Oliver Liombe Komarov, Mikhail Nurmi, Jari |
author_sort | Ometov, Aleksandr |
collection | PubMed |
description | The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings. |
format | Online Article Text |
id | pubmed-8838093 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-88380932022-02-13 A Survey of Security in Cloud, Edge, and Fog Computing Ometov, Aleksandr Molua, Oliver Liombe Komarov, Mikhail Nurmi, Jari Sensors (Basel) Review The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limitations, particularly security and privacy challenges. This systematic literature review aims to identify similarities, differences, main attacks, and countermeasures in the various paradigms mentioned. The main determining outcome points out the essential security and privacy threats. The presented results also outline important similarities and differences in Cloud, Edge, and Fog computing paradigms. Finally, the work identified that the heterogeneity of such an ecosystem does have issues and poses a great setback in the deployment of security and privacy mechanisms to counter security attacks and privacy leakages. Different deployment techniques were found in the review studies as ways to mitigate and enhance security and privacy shortcomings. MDPI 2022-01-25 /pmc/articles/PMC8838093/ /pubmed/35161675 http://dx.doi.org/10.3390/s22030927 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Ometov, Aleksandr Molua, Oliver Liombe Komarov, Mikhail Nurmi, Jari A Survey of Security in Cloud, Edge, and Fog Computing |
title | A Survey of Security in Cloud, Edge, and Fog Computing |
title_full | A Survey of Security in Cloud, Edge, and Fog Computing |
title_fullStr | A Survey of Security in Cloud, Edge, and Fog Computing |
title_full_unstemmed | A Survey of Security in Cloud, Edge, and Fog Computing |
title_short | A Survey of Security in Cloud, Edge, and Fog Computing |
title_sort | survey of security in cloud, edge, and fog computing |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8838093/ https://www.ncbi.nlm.nih.gov/pubmed/35161675 http://dx.doi.org/10.3390/s22030927 |
work_keys_str_mv | AT ometovaleksandr asurveyofsecurityincloudedgeandfogcomputing AT moluaoliverliombe asurveyofsecurityincloudedgeandfogcomputing AT komarovmikhail asurveyofsecurityincloudedgeandfogcomputing AT nurmijari asurveyofsecurityincloudedgeandfogcomputing AT ometovaleksandr surveyofsecurityincloudedgeandfogcomputing AT moluaoliverliombe surveyofsecurityincloudedgeandfogcomputing AT komarovmikhail surveyofsecurityincloudedgeandfogcomputing AT nurmijari surveyofsecurityincloudedgeandfogcomputing |