29
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.

          Related collections

          Most cited references165

          • Record: found
          • Abstract: not found
          • Article: not found

          Blockchains and Smart Contracts for the Internet of Things

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Fog and IoT: An Overview of Research Opportunities

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                14 April 2019
                April 2019
                : 19
                : 8
                : 1788
                Affiliations
                [1 ]Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan; i131502@ 123456nu.edu.pk (N.T.); muhammad.asim@ 123456nu.edu.pk (M.A.); zubair.farooqi@ 123456nu.edu.pk (M.Z.F.)
                [2 ]College of Technological Innovation, Zayed University, Abu Dhabi 144534, UAE; Feras.Al-Obeidat@ 123456zu.ac.ae
                [3 ]Department of Computer Science, Liverpool John Moores University, Liverpool L3 3AF, UK
                [4 ]School of Computing, Mathematics and Digital Technology, Manchester Metropolitan University, Manchester M1 5GD, UK; M.Hammoudeh@ 123456mmu.ac.uk
                [5 ]Faculty of Informatics, Masaryk University, 60177 Brno, Czech Republic; ghafir@ 123456mail.muni.cz
                Author notes
                [* ]Correspondence: t.baker@ 123456ljmu.ac.uk
                Author information
                https://orcid.org/0000-0002-2894-7891
                https://orcid.org/0000-0002-5166-4873
                https://orcid.org/0000-0003-1058-0996
                Article
                sensors-19-01788
                10.3390/s19081788
                6515199
                31013993
                c59236b3-b08c-4752-ad3f-501a1cee6fa6
                © 2019 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 19 February 2019
                : 12 April 2019
                Categories
                Article

                Biomedical engineering
                security,big data,internet of things,fog computing,edge computing,blockchain
                Biomedical engineering
                security, big data, internet of things, fog computing, edge computing, blockchain

                Comments

                Comment on this article