Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing

2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.

2019 ◽  
pp. 1927-1951
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


2018 ◽  
Vol 1 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Akashdeep Bhardwaj

This article describes how the rise of fog computing to improve cloud computing performance and the acceptance of smart devices is slowly but surely changing our future and shaping the computing environment around us. IoT integrated with advances in low cost computing, storage and power, along with high speed networks and big data, supports distributed computing. However, much like cloud computing, which are under constant security attacks and issues, distributed computing also faces similar challenges and security threats. This can be mitigated to a great extent using fog computing, which extends the limits of Cloud services to the last mile edge near to the nodes and networks, thereby increasing the performance and security levels. Fog computing also helps increase the reach and comes across as a viable solution for distributed computing. This article presents a review of the academic literature research work on the Fog Computing. The authors discuss the challenges in Fog environment and propose a new taxonomy.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3001
Author(s):  
Taehong Kim ◽  
Seong-eun Yoo ◽  
Youngsoo Kim

The prevalence of smart devices and cloud computing has led to an explosion in the amount of data generated by IoT devices [...]


2021 ◽  
Author(s):  
Hamed Hasibi ◽  
Saeed Sedighian Kashi

Fog computing brings cloud capabilities closer to the Internet of Things (IoT) devices. IoT devices generate a tremendous amount of stream data towards the cloud via hierarchical fog nodes. To process data streams, many Stream Processing Engines (SPEs) have been developed. Without the fog layer, the stream query processing executes on the cloud, which forwards much traffic toward the cloud. When a hierarchical fog layer is available, a complex query can be divided into simple queries to run on fog nodes by using distributed stream processing. In this paper, we propose an approach to assign stream queries to fog nodes using container technology. We name this approach Stream Queries Placement in Fog (SQPF). Our goal is to minimize end-to-end delay to achieve a better quality of service. At first, in the emulation step, we make docker container instances from SPEs and evaluate their processing delay and throughput under different resource configurations and queries with varying input rates. Then in the placement step, we assign queries among fog nodes by using a genetic algorithm. The practical approach used in SQPF achieves a near-the-best assignment based on the lowest application deadline in real scenarios, and evaluation results are evidence of this goal.


Author(s):  
Mirjana Maksimović

Nowhere do the technology advancements bring improvements than in the healthcare sector, constantly creating new healthcare applications and systems which completely revolutionize the healthcare domain. The appearance of Internet of Things (IoT) based healthcare systems has immensely improved quality and delivery of care, and significantly reduced the costs. At the same time, these systems generate the enormous amount of health-associated data which has to be properly gathered, analyzed and shared. The smart devices, as the components of IoT-driven healthcare systems, are not able to deal with IoT-produced data, neither data posting to the Cloud is the appropriate solution. To overcome smart devices’ and Cloud’s limitations the new paradigm, known as Fog computing, has appeared, where an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits Fog computing brings into IoT-based environments, the privacy and security issues remain the main challenge for its implementation. The reasons for integrating the IoT-based healthcare system and Fog computing, benefits and challenges, as well as the proposition of simple low-cost system are presented in this paper.


Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Vasileios Moysiadis ◽  
Panagiotis Sarigiannidis ◽  
Ioannis Moscholios

In the emerging area of the Internet of Things (IoT), the exponential growth of the number of smart devices leads to a growing need for efficient data storage mechanisms. Cloud Computing was an efficient solution so far to store and manipulate such huge amount of data. However, in the next years it is expected that Cloud Computing will be unable to handle the huge amount of the IoT devices efficiently due to bandwidth limitations. An arising technology which promises to overwhelm many drawbacks in large-scale networks in IoT is Fog Computing. Fog Computing provides high-quality Cloud services in the physical proximity of mobile users. Computational power and storage capacity could be offered from the Fog, with low latency and high bandwidth. This survey discusses the main features of Fog Computing, introduces representative simulators and tools, highlights the benefits of Fog Computing in line with the applications of large-scale IoT networks, and identifies various aspects of issues we may encounter when designing and implementing social IoT systems in the context of the Fog Computing paradigm. The rationale behind this work lies in the data storage discussion which is performed by taking into account the importance of storage capabilities in modern Fog Computing systems. In addition, we provide a comprehensive comparison among previously developed distributed data storage systems which consist of a promising solution for data storage allocation in Fog Computing.


Sensors ◽  
2019 ◽  
Vol 19 (15) ◽  
pp. 3292 ◽  
Author(s):  
Daniel Díaz-Sánchez ◽  
Andrés Marín-Lopez ◽  
Florina Almenárez Mendoza ◽  
Patricia Arias Cabarcos

IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices’ clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.


Sign in / Sign up

Export Citation Format

Share Document