Abstract
Inventive advancements, in cloud computing frameworks, offer cooperative services of assistance for end clients and medium to enormous organizations. As increasingly more data of people and organizations are put in the cloud, there is a developing worry about the security of data. Clients are apprehensive to send their business to the cloud, despite its popularity. Perhaps, the most major hindrance to cloud computing's expansion is security concerns. It increases the inconveniences associated with information security, and information insurance continues to influence the market. Clients must understand the risk of data breaches in the cloud environment. Fog computing brings cloud computing storage, networking, and computing capabilities to the edge. The issue of security and safety is one of the most pressing concerns for fog computing systems. Edge computing has been a tremendous assistance to lightweight devices in completing complicated tasks in a timely manner; yet, its hasty development has resulted in the neglect of safety risks in edge computing stages and their enabled applications in general. In this study, we compare and explain each computing paradigm, as well as examine the security issues that cloud, fog, and edge computing paradigms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dolui K, Datta SK (2017) Comparison of edge computing implementations: fog computing, cloudlet and mobile edge computing. In: 2017 global internet of things summit (GIoTS), pp 1–6
Kumar SN, Vajpayee A (2016) A survey on secure cloud: security and privacy in cloud computing. Am J Syst Softw 4(1):14–26
Dong X, Yu J, Luo Y, Chen Y, Xue G, Li M (2013) Achieving secure and efficient data collaboration in cloud computing. In: 2013 IEEE/ACM 21st international symposium on quality of service (IWQoS), pp 1–6. https://doi.org/10.1109/IWQoS.2013.6550281
Kuyoro SO, Ibikunie F, Awodele O (2011) Cloud computing security issues and challenges. Int J Comput Netw (IJCN) 3:247–255
King NJ, Raja VT (2012) Protecting the privacy and security of sensitive customer data in the cloud. Comput law Secur Rev 28:308–319
Dong MT, Zhou X (2016) Fog computing: comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology. Open Access Library J 3(09):1
Rios R, Roman R, Onieva JA, Lopez J (2017) From smog to fog: a security perspective. In: 2017 second international conference on fog and mobile edge computing (FMEC). IEEE, pp 56–61
Alrawais A, Alhothaily A, Hu C, Cheng X (2017) Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput 21(2):34–42
Ashi Z, Al-Fawa'reh M, Al-Fayoumi M (2020) Fog computing: security challenges and countermeasures. Int J Comput Appl 175(15):30–36
Cao K, Liu Y, Meng G, Sun Q (2020) An overview on edge computing research. IEEE Access 8:85714–85728. https://doi.org/10.1109/ACCESS.2020.2991734
Xiao Y, Jia Y, Liu C, Cheng X, Yu J, Lv W (2019) Edge computing security: state of the art and challenges. Proc IEEE 107:1608–1631
Sun Z, Zhang X, Wang T, Wang Z (2020) Edge computing in internet of things: a novel sensing-data reconstruction algorithm under intelligent-migration strategy. IEEE Access 8:50696–50708. https://doi.org/10.1109/ACCESS.2020.2979874
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shah, D.R., Dhawan, D.A., Thoday, V. (2022). An Overview on Security Challenges in Cloud, Fog, and Edge Computing. In: Shukla, S., Gao, XZ., Kureethara, J.V., Mishra, D. (eds) Data Science and Security. Lecture Notes in Networks and Systems, vol 462. Springer, Singapore. https://doi.org/10.1007/978-981-19-2211-4_29
Download citation
DOI: https://doi.org/10.1007/978-981-19-2211-4_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-2210-7
Online ISBN: 978-981-19-2211-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)