Detailed analysis of security measures
Question:
Discuss about the Challenges and Software Architecture.
According to the authors, the report focuses on the security threats that mobile edge computing faces and the challenges it faces. The positive impacts of mobile edge computing has been stated in the report and some security measures have been discussed in the recommendation section.
A detailed analysis have been conducted stating the need for security measures and why they need to be enforced in the system to protect user data. In the report, a quantitative survey has been conducted with over 12 organizations (which use mobile edge computing systems) from three countries to gain a deeper insight into the security details of mobile edge computing.
Though the authors have stressed a lot on the security threats and challenges of mobile edge computing, it does not discuss the security measures or protocols in detail. The report only states that the security protocols for mobile edge computing are being developed by the Industrial Internet Consortium. Other than that, it proposes the organizations to perform regular monitoring and check any anomalies that are security related. Besides that, the survey report fails to define clearly the proposed security guidelines for the system.
In this article, the authors have discussed the application and architectures of fog computing in IoTs.The advantages and features of the desired applications of IoT such as mission critical services and latency sensitive services have been discussed in details.
The underlying optimizations, privacy, fault tolerance and reliability of latency reduction for the framework of resource allocations have been discussed in the following article. The authors have also investigated an application scenario and conducted a security check to formulate the resource optimization issues of the organization. The resulting analysis helps to formulate a proper security protocol which will be followed by the organization in the future for incorporating fog computing in the IoT devices.
The article fails to deliver proper security protocols that can be applied to organizations in a general way. The security protocols have been selected only for the organization itself and not for the other organizations that are also into the development of Iot devices. Overally, the authors should have highlighted some general security recommendations that could be adopted by other enterprises to facilitate their adoption of fog computing.
A wireline and mobile scenario has been taken as research subjects and how the technology traverses across software and hardware. The journal also discusses details about how it supports applications, IoT devices, 5g wireless networks, AI systems and the related security measures needed to protect them from external threats. It also highlights the challenges and opportunities of Fog in the context of IoT networking.
Although the authors have tried to explain the research opportunities of Fog in the paper, it fails to provide appropriate recommendations for the Fog architecture. The research methodology is not proper as well and the limitations of the research are unjustified. The authors have stressed little on explaining the cross layer design of Fog. The author should have highlighted the security issues first before explaining the paradigms and protocols.
Quantitative survey conducted with 12 organizations
In this journal, the authors have investigated the networking issues that are linked with Fog computing. The authors have discussed the extension of cloud computing due to fog computing by giving resources virtually and providing location based services. It describes how cloud computing brings together the applications of mobile and cloud based services.
The architecture and design goals of Fog computing has been emphasized more by the authors. The authors have also described the key issues of mobile networks such as high quality services, increasing customer demand and accommodation of mobile traffics. Comparisons with cloud computing has been made with features such as local services, wireless features and distributed management. The authors have also discussed the capabilities of fog such as communication, computing and storage systems but has failed to implement the proper security measures to prove them as a secure system.
But the author have failed to conduct an independent research to assess whether the proposed methodologies of fog computing are safe and secure or not. The surveys are loosely integrated and the drawbacks of fog computing are not properly investigated. Another limitation of the report is the absence of research issues form a networking perspective. The communication system between the cloud and the fog systems have been loosely analysed and the security protocols for addressing the system issues have been loosely developed.
The authors have discussed the advantages of Fog applications in providing service related to application, storage and computing services. In this article, the authors have stressed on the applications of the given system in real life scenarios for example, smart traffic lights, SmartGrid and software defined networks. The article also explains further the privacy and security issues that is related to the paradigm of Fog computing.
The authors have evaluated the authorization techniques that is required for Fog computing and the related security protocols that are required for authentication. The article also discusses a man in the middle attack as a typical attack to discuss the security protocols in fog computing. The Attack was evaluated and analysed by examining the memory conditions and the CPU conditions. The article also discusses the respective authentication techniques for addressing the security vulnerability scene and describes the area where the system is fragile.
Despite the benefits of Fog computing, the article fails to conclusively analyse the security protocols of Fog computing in general and basically assesse the whole system based on the given vulnerable scenario. The authors should have presented the attack scenario by properly highlighting the analysis, the detailed findings and the discussion of the real life topic with interview and questionnaire analysis. To understand the required security system, the authors have not emphasized on getting a detailed and precise analysis.
In this article, a survey has been conducted by the authors to understand Fog computing that enhances the features of Cloud computing to the network edges. The authors have discussed the similarities of cloud computing with fog computing and has discussed the privacy and security challenges that Fog computing faces.
Lack of clear security guidelines in survey report
In the paper, a survey has been conducted to understand the solutions and challenges that Fog computing faces in a brief manner. Deployment models and service delivery models of Fog computing has been discussed in detail. Security issues related to authentication techniques, trust models and infected fog node has been discussed in detail in the article. Other issues such as network security secure computation and secure data storage has been discussed by the authors in detail.
The survey fails to properly state the recommended security protocols for addressing the defined security and privacy issues that are mentioned in the paper. The authors have also failed to analyse the security threats through a recent survey analysis and the entire survey has been taken to address the security issues of Fog computing in a general way. Another limitation of the study is enabling proper methodologies to analyse the survey. The paper does not contain any methodologies about how the survey was carried out and how the security and privacy issues were discovered.
The research paper does have some inherent limitations. First of all, the prototype does not have a proper implementation strategy. The authors have failed to mention which industries are tolerable for integrating the designed systems and what setbacks they might face during the implementation process. The paper also fails to demonstrate the negative implications the industries might face due to the prototype and proper mitigation procedures of the issues.The security measures for implementing latency critical applications and computation intensive tasks have been highlighted for resource limited smart devices. The key security challenges for implementing 5g technology for reducing the energy consumption and latency in mobile devices have been highlighted in the article by the authors.
The article fails to provide proper details on standardization efforts on Mobile edge computing and the respective application scenarios. The authors have also failed to mention the security systems for making Mobile edge computing a truly secure system to work on.
In this article, the authors have discussed the requirement for a new platform to accommodate characteristics of Internet of things like limited computational power and storage. The authors have highlighted the importance of bridging the gap between IoT devices and remote data centres.
The benefits of fog computing has been widely evaluated such as reduced latency, decreased bandwidth and enhanced security. Just like traditional data centeers, the authors have emphasized the privacy and security threats the Fog computing system faces and a mechanism has been proposed to distribute the information for security enhancements among the IoT devices. The prescribed privacy and security issues have been used to direct the research towards the enhancing the security of Fog computational system.
The data analysis methods were consistent with plenty of data on daily monitoring, weekly interviews and post challenge interviews. The purpose of the report struggled to appeal to anyone other than a hard core enthusiasts but managed to reach a wide number of passive readers. The authors have failed to mention the real world constrints that are necessary for maintain a Fog computational environment.
Application and architectures of Fog computing in IoT
A flexible software architecture has been proposed which is necessary for incorporating user specified policies and various design choices. The authors have also presented a design of WM-FOG which is a framework for fog environments. The system has been evaluated just like a prototype system.
The journal fails to demonstrate the dangers of fog computing in Iot devices if safety measures are not implemented properly. The authors have also failed to incorporate a risk assessment of the proposed prototype system and has failed to mention the proper security protocols for implementing the Fog framework safely.
In the report, the author have properly analysed and evaluated the usage of mobile edge computing in 5G devices. The report has been made keeping in mind the working of core computing servers that are used in cloud environments.
The mobile edge computing functionalities have been described in detail along with the architecture. The authors have also mentioned case studies and relevant challenges that the mobile edge computing scenario faces in real life.
Despite the benefits of MEC, the report lacks a suitable research to conclusively analyse the influence of mobile edge computing with respect to a network centric view where most of the devices such as mobiles and computers are attached to the internet. The report also fails to provide proper recommendations for safely incorporating the defined security protocols in the MEC environment.
In the report, the author have mentioned the emergence of computing environments such as virtual reality and has emphasized on the possibilities of incorporating the technology in pool based services and resources. The authors have mentioned the disadvantages of cloud based environments such as low mobility support and location awareness.
The importance and emergence of mobile edge computing has been widely appreciated by the authors and the MEC environment has been analysed in detail throughout the report. Various applications of MEC has been discussed and the research challenges of the environment has been debated.
The authors have failed to analyse the real life threats that the Fog environment can have if proper security protocols are not followed. The security regulations that has been proposed in brief is least effective in real life scenarios without proper assessment and risk analysis. Finally, the authors have failed to evaluate the strict delay requirements that are caused by delay sensitive applications which can be a risky endeavour for the ecosystem.
References
Ahmed, E., & Rehmani, M. H. (2017). Mobile edge computing: opportunities, solutions, and challenges.
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.
Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854-864.
Dastjerdi, A. V., Gupta, H., Calheiros, R. N., Ghosh, S. K., & Buyya, R. (2016). Fog computing: Principles, architectures, and applications. In Internet of Things (pp. 61-75).
Hao, Z., Novak, E., Yi, S., & Li, Q. (2017). Challenges and software architecture for fog computing. IEEE Internet Computing, 21(2), 44-53.
Liang, B. (2017). Mobile edge computing (pp. 76-91). Cambridge University Press.
Luan, T. H., Gao, L., Li, Z., Xiang, Y., Wei, G., & Sun, L. (2015). Fog computing: Focusing on mobile users at the edge. arXiv preprint arXiv:1502.01815.
Mao, Y., You, C., Zhang, J., Huang, K., & Letaief, K. B. (2017). Mobile edge computing: Survey and research outlook. arXiv preprint arXiv:1701.01090.
Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Computer Systems, 78, 680-698.fog et al.: A survey and analysis of security threats and challenges. Future Generation C
Stojmenovic, I., Wen, S., Huang, X., & Luan, H. (2016). An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), 2991-3005.
Yi, S., Hao, Z., Qin, Z., & Li, Q. (2015, November). Fog computing: Platform and applications. In Hot Topics in Web Systems and Technologies (HotWeb), 2015 Third IEEE Workshop on (pp. 73-78). IEEE.
Yi, S., Qin, Z., & Li, Q. (2015, August). Security and privacy issues of fog computing: A survey. In International Conference on Wireless Algorithms, Systems, and Applications (pp. 685-695). Springer, Cham.