SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
SECURITY ISSUES OF IOT WITH FOG.
Achu Anna Antony
S1 M.Tech CSE
Roll No: 01
Guide: Mr.Bino Thomas
Assistant Professor, CSE
November 9, 2016
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
OUTLINE
Introduction
Existing System
Problem Statement
Proposed System
Conclusion
Future Works
References
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
INTRODUCTION
Cloud: Storing and accessing data and programs over the
Internet instead of computer’s hard drive.
IoT : Everyday objects(IoT nodes) connected through
Internet, allowing them to send and receive data
IoT uses:
Internet : Infrastructure to interconnect IoT nodes
Cloud: Background supporting infrastructure
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
INTRODUCTION contd...
Huge network latency and Backend overhead occurs as data
to be processed increases in IoT cloud. So IoT uses,
Fog as a solution : ie.. intermediate computing buffer between
IoT nodes and Cloud
Adoption of IoT fog can cause many security threats, which is
explored throughout
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
EXISTING SYSTEM
Title:- ”Fog Computing and Its Role in the Internet of Things”
(F.Bonomi, R. Milito, J. Zhu, and S. Addepalli)
Proposed:
Fog Computing - Extension of cloud computing Features used
Features:
Highly virtualized platform
Limitations
Multi fog OS prevents from access of other OS. If there occur
any problem on Kernel mode, it does not prevent.
Figure: Fog with computing features
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
EXISTING SYSTEM contd...
Title:-”The Fog Computing Paradigm: Scenarios and Security
Issues” (I. Stojmenovic and W. Sheng)
Proposed:
Man in the middle attack- Fog devices get replaced by fake
ones.
Features:
Intrusion Detection method signature, behavioural or anomaly
based detection method
Limitations
Protection methods like encryption and decryption of data
consume large amount of battery on mobile devices.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
EXISTING SYSTEM contd...
Title:- Semantics-Aware Android Malware Classification Using
Weighted Contextual API Dependency Graphs (M. Zhang, Y.
Duan, H. Yun, and Z.Zhao)
Proposed:
Android based malware detection
Features:
Uses Signature based approach for detection of malware
Graphs are generated from behaviour graphs and convert it to
signature and stores in database.
Limitations
Detection of malware from unknown or new malware family
will be hectic.
Figure: Android based malware to signature conversion[4]
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
FOG COMPUTING
Fog computing is an extension of cloud computing paradigm,
but is a more highly virtualized platform that provides
computation, storage, and networking services between end
IoT devices and back-end cloud servers.
Figure: The hierarchical fog computing architecture
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
ADVANTAGES AND APPLICATIONS OF FOG
Advantages
Greater business agility
Low latency
Geo distribution
Lower operating expense
Applications
Geographically distributed applications
Fast mobile applications
Large-scale distributed control systems
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
PROBLEM STATEMENT
As fog infrastructure is prone to many security threats, there
is a need for studying about them deeply so as the methods
discussed in the proposed systems is needed to combine which
is examined in the proposed system
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
RELEVANT SECURITY TECHNOLOGIES
Security technology for IoT network
When client wants to access cloud services, he must go
through authentication process to ensure confidentiality and
security for IoT network.
Authorized users can access cloud with mobile devices.
Protocol is of two phases: Registration and Authentication.
Figure: Authentication as a service
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for fog node
In fog Computing, much of the information is gathered into
fog node.
If a wrong information is spread by exploiting vulnerability is a
big problem.
So need dynamic analysis techniques to monitor fog node in
real time
Typically, the performance overhead of dynamic analysis is
high.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
Security technology for IoT node
When some IoT nodes are out of order or provide wrong
information, it can affect people.
Attacker has many chances to compromise various devices
with sensors.
The attacker is able to predict user behavior and abuse its
information.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
RELEVANT SECURITY TECHNOLOGIES contd...
For IoT nodes, to be truly secure, an IoT node must also
obtain application layer security.
That means that the node itself, and not just the
communication channel (i.e. the pipe), should be
authenticated.
In addition to channel authentication, encryption and data
integrity should be established at the application layer to
protect the data flowing through the pipe.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING
Man- in- the middle Attack
In this attack, gateways serving as fog devices may be
compromised or replaced by fake ones.
Use a strong encryption between the client and the server and
never connect to open WiFi routers directly.
Encryption and decryption methods consume large amount of
battery on mobile device.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Intrusion Detection
Intrusion detection system analyzes and monitors
i) access control policy, ii) a log file, and iii)user log
information in order to detect intrusion behavior.
It can be run on network side in order to detect malicious
activity such as DoS, port scanning.
Intrusion detection techniques have been applied to mitigate
attacks such as i) insider attack, ii) flooding attack, iii) port
scanning, iv) attacks on VM or hypervisor.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Fog node problem
In order to provide service to user, fog nodes process data
received from the IoT devices.
If the workloads is heavy, it is divided into several jobs and
processed by several fog nodes.
If some fog nodes are compounded by a malicious user, it is
difficult to ensure the integrity of the data.
Before the computation begin, fog nodes must trust each
other.
An authentication protocol is required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Malicious Detection Technique
When some fog nodes are compromised, hybrid detection
technique is useful to detect malicious code in fog nodes.
It is combined with signature-based detection technique and
behavior-based detection technique.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Protection
Messages generated from IoT devices is sent to the nearest
fog nodes.
When distributed and processed data is merged, the integrity
of the data should be guaranteed.
Because of limited resources, it is difficult to encrypt or
decrypt data on IoT device so light-weight encryption
algorithms or masking techniques are required.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Data Management Issues
Fog nodes are geographically distributed, making it difficult to
know data location.
The user wants to be provided with the same services in other
areas.
It is difficult for user to know whether the node provides the
same service.
Some fog nodes by having duplicated files will cause a waste
of resources.
IoT will create enormous amounts of data there is a need for
distributed intelligence and so-called fast Big Data processing.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
SECURITY AND PRIVACY ISSUES IN FOG
COMPUTING contd...
Every communication deployment of IoT is unique.
However, there are four basic stages that are common to just
about every IoT application. Those components are:
data collection,
data transmission,
data assessment, and
response to the available information.
Successful data management is therefore very important to
the success of IoT.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
CONCLUSION
IoT cloud with fog embedded system can overcome
congestion problem
network latency
Fog computing provides the improved quality of services to
the user by complementing shortages of IoT cloud.
IoT technology can be utilized in various fields in the future.
This presentation highlights the need to configure the secure
fog computing environment through security technologies
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
FUTURE WORKS
Future work should be done to develop a system for efficiently
collect and analyze various logs generated in fog computing
environment..
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
REFERENCES
[1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput
and Heekuck Oh,”On Security and Privacy Issues of Fog
Computing supported Internet of Things Environment,”Hanyang
University, ERICA Campus, South Korea,2015.
[2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in
Fog:Towards a Comprehensive Definition of Fog Computing, ACM
SIGCOMM Computer Communication Review, vol.44, Oct. 2014.
[3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and
Its Role in the Internet of Things, Proceedings of the first edition
of the MCC workshop on Mobile Cloud Computing,Aug.2012.
[4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm:
Scenarios and Security Issues, Federated Conference on Computer
Science and Information Systems, pp.1-8, Sept. 2014.
[5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware
Android Malware Classification Using Weighted Contextual API
Dependency Graphs, Proceedings of the 2014 ACM SIGSAC
Conference on Computer and Communications Security, Nov.2014.
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
THANK YOU
Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
IoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & PerformanceIoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & Performance
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Iot how it works
Iot   how it worksIot   how it works
Iot how it works
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IoT Healthcare
IoT HealthcareIoT Healthcare
IoT Healthcare
 
Fog computing
Fog computingFog computing
Fog computing
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | EdurekaIoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
IoT Technology Tutorial | IoT Technology Stack | IoT Project Hands-On | Edureka
 
Fog computing 000
Fog computing 000Fog computing 000
Fog computing 000
 

Destacado

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technologyNikhil Sabu
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Destacado (16)

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Latest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computingLatest Thesis Topics for Fog computing
Latest Thesis Topics for Fog computing
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing technology
Fog computing technologyFog computing technology
Fog computing technology
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar a Security Issues of IoT with Fog

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspectiveijtsrd
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 

Similar a Security Issues of IoT with Fog (20)

SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
Internet of Things IoT Security Perspective
Internet of Things IoT Security PerspectiveInternet of Things IoT Security Perspective
Internet of Things IoT Security Perspective
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Security aspect of IOT.pptx
Security aspect of IOT.pptxSecurity aspect of IOT.pptx
Security aspect of IOT.pptx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 

Último

Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsMonica Sydney
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...meghakumariji156
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 

Último (20)

Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Call girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girlsCall girls Service in Ajman 0505086370 Ajman call girls
Call girls Service in Ajman 0505086370 Ajman call girls
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 

Security Issues of IoT with Fog

  • 1. SECURITY ISSUES OF IOT WITH FOG. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSE November 9, 2016 Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 1 / 25
  • 2. OUTLINE Introduction Existing System Problem Statement Proposed System Conclusion Future Works References Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 2 / 25
  • 3. INTRODUCTION Cloud: Storing and accessing data and programs over the Internet instead of computer’s hard drive. IoT : Everyday objects(IoT nodes) connected through Internet, allowing them to send and receive data IoT uses: Internet : Infrastructure to interconnect IoT nodes Cloud: Background supporting infrastructure Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 3 / 25
  • 4. INTRODUCTION contd... Huge network latency and Backend overhead occurs as data to be processed increases in IoT cloud. So IoT uses, Fog as a solution : ie.. intermediate computing buffer between IoT nodes and Cloud Adoption of IoT fog can cause many security threats, which is explored throughout Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 4 / 25
  • 5. EXISTING SYSTEM Title:- ”Fog Computing and Its Role in the Internet of Things” (F.Bonomi, R. Milito, J. Zhu, and S. Addepalli) Proposed: Fog Computing - Extension of cloud computing Features used Features: Highly virtualized platform Limitations Multi fog OS prevents from access of other OS. If there occur any problem on Kernel mode, it does not prevent. Figure: Fog with computing features Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 5 / 25
  • 6. EXISTING SYSTEM contd... Title:-”The Fog Computing Paradigm: Scenarios and Security Issues” (I. Stojmenovic and W. Sheng) Proposed: Man in the middle attack- Fog devices get replaced by fake ones. Features: Intrusion Detection method signature, behavioural or anomaly based detection method Limitations Protection methods like encryption and decryption of data consume large amount of battery on mobile devices. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 6 / 25
  • 7. EXISTING SYSTEM contd... Title:- Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs (M. Zhang, Y. Duan, H. Yun, and Z.Zhao) Proposed: Android based malware detection Features: Uses Signature based approach for detection of malware Graphs are generated from behaviour graphs and convert it to signature and stores in database. Limitations Detection of malware from unknown or new malware family will be hectic. Figure: Android based malware to signature conversion[4] Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 7 / 25
  • 8. FOG COMPUTING Fog computing is an extension of cloud computing paradigm, but is a more highly virtualized platform that provides computation, storage, and networking services between end IoT devices and back-end cloud servers. Figure: The hierarchical fog computing architecture Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 8 / 25
  • 9. ADVANTAGES AND APPLICATIONS OF FOG Advantages Greater business agility Low latency Geo distribution Lower operating expense Applications Geographically distributed applications Fast mobile applications Large-scale distributed control systems Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 9 / 25
  • 10. PROBLEM STATEMENT As fog infrastructure is prone to many security threats, there is a need for studying about them deeply so as the methods discussed in the proposed systems is needed to combine which is examined in the proposed system Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 10 / 25
  • 11. RELEVANT SECURITY TECHNOLOGIES Security technology for IoT network When client wants to access cloud services, he must go through authentication process to ensure confidentiality and security for IoT network. Authorized users can access cloud with mobile devices. Protocol is of two phases: Registration and Authentication. Figure: Authentication as a service Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 11 / 25
  • 12. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for fog node In fog Computing, much of the information is gathered into fog node. If a wrong information is spread by exploiting vulnerability is a big problem. So need dynamic analysis techniques to monitor fog node in real time Typically, the performance overhead of dynamic analysis is high. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 12 / 25
  • 13. RELEVANT SECURITY TECHNOLOGIES contd... Security technology for IoT node When some IoT nodes are out of order or provide wrong information, it can affect people. Attacker has many chances to compromise various devices with sensors. The attacker is able to predict user behavior and abuse its information. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 13 / 25
  • 14. RELEVANT SECURITY TECHNOLOGIES contd... For IoT nodes, to be truly secure, an IoT node must also obtain application layer security. That means that the node itself, and not just the communication channel (i.e. the pipe), should be authenticated. In addition to channel authentication, encryption and data integrity should be established at the application layer to protect the data flowing through the pipe. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 14 / 25
  • 15. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING Man- in- the middle Attack In this attack, gateways serving as fog devices may be compromised or replaced by fake ones. Use a strong encryption between the client and the server and never connect to open WiFi routers directly. Encryption and decryption methods consume large amount of battery on mobile device. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 15 / 25
  • 16. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Intrusion Detection Intrusion detection system analyzes and monitors i) access control policy, ii) a log file, and iii)user log information in order to detect intrusion behavior. It can be run on network side in order to detect malicious activity such as DoS, port scanning. Intrusion detection techniques have been applied to mitigate attacks such as i) insider attack, ii) flooding attack, iii) port scanning, iv) attacks on VM or hypervisor. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 16 / 25
  • 17. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Fog node problem In order to provide service to user, fog nodes process data received from the IoT devices. If the workloads is heavy, it is divided into several jobs and processed by several fog nodes. If some fog nodes are compounded by a malicious user, it is difficult to ensure the integrity of the data. Before the computation begin, fog nodes must trust each other. An authentication protocol is required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 17 / 25
  • 18. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Malicious Detection Technique When some fog nodes are compromised, hybrid detection technique is useful to detect malicious code in fog nodes. It is combined with signature-based detection technique and behavior-based detection technique. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 18 / 25
  • 19. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Protection Messages generated from IoT devices is sent to the nearest fog nodes. When distributed and processed data is merged, the integrity of the data should be guaranteed. Because of limited resources, it is difficult to encrypt or decrypt data on IoT device so light-weight encryption algorithms or masking techniques are required. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 19 / 25
  • 20. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Data Management Issues Fog nodes are geographically distributed, making it difficult to know data location. The user wants to be provided with the same services in other areas. It is difficult for user to know whether the node provides the same service. Some fog nodes by having duplicated files will cause a waste of resources. IoT will create enormous amounts of data there is a need for distributed intelligence and so-called fast Big Data processing. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 20 / 25
  • 21. SECURITY AND PRIVACY ISSUES IN FOG COMPUTING contd... Every communication deployment of IoT is unique. However, there are four basic stages that are common to just about every IoT application. Those components are: data collection, data transmission, data assessment, and response to the available information. Successful data management is therefore very important to the success of IoT. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 21 / 25
  • 22. CONCLUSION IoT cloud with fog embedded system can overcome congestion problem network latency Fog computing provides the improved quality of services to the user by complementing shortages of IoT cloud. IoT technology can be utilized in various fields in the future. This presentation highlights the need to configure the secure fog computing environment through security technologies Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 22 / 25
  • 23. FUTURE WORKS Future work should be done to develop a system for efficiently collect and analyze various logs generated in fog computing environment.. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 23 / 25
  • 24. REFERENCES [1] Kanghyo Lee , Donghyun Kim, Dongsoo Ha, Ubaidullah Rajput and Heekuck Oh,”On Security and Privacy Issues of Fog Computing supported Internet of Things Environment,”Hanyang University, ERICA Campus, South Korea,2015. [2] L.M.Vaquero and L.Rodero-Merino,Finding your Way in Fog:Towards a Comprehensive Definition of Fog Computing, ACM SIGCOMM Computer Communication Review, vol.44, Oct. 2014. [3] F.Bonomi, R.Milito, J.Zhu, and S.Addepalli,Fog Computing and Its Role in the Internet of Things, Proceedings of the first edition of the MCC workshop on Mobile Cloud Computing,Aug.2012. [4] I.Stojmenovic and W.Sheng,The Fog Computing Paradigm: Scenarios and Security Issues, Federated Conference on Computer Science and Information Systems, pp.1-8, Sept. 2014. [5] M.Zhang, Y.Duan, H.Yun, and Z.Zhao,Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Nov.2014. Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 24 / 25
  • 25. THANK YOU Achu Anna Antony S1 M.Tech CSE Roll No: 01 Guide: Mr.Bino Thomas Assistant Professor, CSESECURITY ISSUES OF IOT WITH FOG. 25 / 25