Fog Computing
Fog Computing
1 Introduction
1.1 SDN
SDN is gaining value by providing benefits with magical features like Openness,
rapid innovation, programmable and global view. SDN is capturing the atten-
tion of network designers because of its phenomenal features like programmable,
rapid innovation, abstraction, openness, centralized control and virtualization.
SDN can be comprehensively defined as the control and data plane separation,
central access to control logic, destination-based forwarding decisions are re-
placed with flow-based decisions. Networking Operating System (NOS) makes
possible the running of a software application for network programming[3]. SDN
has infrastructure layer, the control layer and application layer. In the light of
SDN features, it is simple and less error-prone to update policies of network
environment by using software or by gaining the advantage of programmability.
Now security specific program can be installed on the controller that alarm the
system in case of any intruder activity, sophisticated network functions can be
easily implemented with the help of global view due to the centralization of the
control. In SDN, the centralized controller sends configuration information to
network devices (router, OpenFlow switches). Multiple devices attach through
a single controller which receives switch’s information of the network to operate
flow rules according to the instructions . Once topology creation has been done
and all devices become the part of that network, the controller sends flow entries
to switches for operation. If a packet with no flow entry arrives at a switch, it
would be sent to the controller which generates a forwarding rule for the switch
to allow the transmission of that packet [4].
1
itoring, deep packet inspection etc. Northbound Interface - it is responsible
for communication between application and control plane and provides a global
view of the network. This interface has an open APIs for ensuring scalability in
network behavior. Along with this feature, it can act as an ad hoc for SDN due
to the absence of any other SDN API. Control Plane - this plane has logically
centralized controller for establishing and terminating flows and paths in SDN.
All the policies and methods are implemented with the help of programmability,
making SDN programmable and manageable. Southbound Interface - it is the
link between the control plane and data plane for maintaining communication
between controller and switch. Controlling decisions are carried towards data 2
plane for traffic handling by using southbound APIs [5]. SDN uses OpenFlow as
the most trustable protocol than Cisco’s Open Networking Environment Plat-
form Kit. Data Plane - it has forwarding network devices (switch/routers) used
for management tasks accomplishment. Forwarding devices like Switches as-
sist data plane to collect network information and send to control plane using
southbound API.
2
searchers.
III. To identify, does SDN is really a good solution specifically for security en-
forcement? To get the answers of above-defined goals, we made below questions
which we deeply investigate in the SLR on fog computing security. We also dig
deep by dividing some of the research questions into sub-questions.
R1: Which was the most trending fog computing security areas analyzed from
published papers?
R2: In fog computing security, which issues are not investigated yet?
R3: Does SDN mitigate the fog computing security issue? How?
3
2.1.3 Inclusion Criteria
We give more attention to the research publication that tied best with fog
computing, and security and trending issues of fog computing security. We are
adding 60 papers in our SLR and maximum papers are from IEEE Xplore, ACM
and Springer searched from Google scholar.
Software security means that the software must continue to function under the
heavy attack of the malicious code. It is the main challenge as the cloud com-
puting is mainly used to provide Software-as-a-Service. If the software security
fails then the clients will experience many implementation bugs, buffer overflow
[9]
2. Infrastructure security:
4
3. Capacity security:
The putting away plan of distributed computing stores the information of the
end clients end client stores the information in the cloud and never again pos-
sesses the information and where it’s put away. This dependably has been a
critical part of nature of administration. It guarantees the accuracy of client’s
information with appropriated confirmation of deletion coded information[7].
Capacity security worries about information purification, cryptography, infor-
mation Permanence, information spillage, snooping of information accessibility
and malware.
Today Fog security demands researcher’s attention as it is getting admiration
due to increasing internet connectivity, However, at the same time, this adds
a threat for the services offered by the fog computing. Latest wireless network
utilities are now being preferred on Fog technology. Attacker sends fake multiple
service requirement requests that overflow table entries and results in DoS or
other attacks in fog layer.
5
4. Relay Attack:
By performing flow eavesdropping techniques on southbound communication,
the attacker tries to dispatch a relay Attack.
5. DoS Attack at DCI Connections:
In this attack, the attacker creates spoofed traffic that traverse Data Center In-
terconnect (DCI) links and DCI stations to cause DoS. fog computing is getting
the involvement in data center network design for better performance at low
cost and less complexity. Currently, data centers are using DCI Protocols and
these protocols have not a satisfactory mechanism for data packet encryption
along with weak protocol design that increases vulnerabilities. These are mak-
ing fog computing-enabled data center less secure [8].
All the fog computing security policies can be bypassed by the attackers by
spoof the controller flows at the edge nodes of the system. Resource consump-
tion of the controller slows down the response time of many events like PacketIn
event or PacketOut messages. Attackers try to fail the controller and he applies
a resource consumption attack to down the controller performance.
6
Some of the fog computing areas demands researcher’s attention for security
concerns. These are mentioned below:
2. Programmability:
In a fog domain, business switches utilize propelled usefulness (e.g., bookkeep-
ing, blocking, peculiarity location, and so forth.) for programmable processor
bundle on each port. The key test of utilizing this gadget in arrange processor
is to execute parcel checking usefulness for creating programming. Numerous
product situations in organize handling utilize a low level of reflection to accom-
plish high throughput execution.
3. SNMP Server:
It is straightforward system administration convention, which intended to give
a low-overhead component to gather the information from organize gadgets.
Diverse developers in an alternate dialect compose the product and a large
number of the programming dialects have vulnerabilities. In this area, we will
talk about distinctive assortments of utilization issues in distributed computing.
5. Framework:
IBM characterized five practical security subsystems that are: review and con-
sistence, get to control, stream control, personality administration and arrange-
ment trustworthiness. The structure has planned in java and .net for confine-
ment and asset bookkeeping however they fizzled with string end. Multitasking
Virtual Machine (MVM) gave nonspecific API.
6. License:
While moving in the fog, the real issue is the authorizing of the applications.
It is an exceptionally complex issue merchants still have not discovered a legit-
imate arrangement. The Copy, Sell, Sharing or Distribution of programming
unlawfully is called programming theft. Progressively change the quantity of
servers facilitating an assortment of use request uptime, versatile scaling, un-
7
wavering quality, execution, and solidness. Indeed, even today, in the realm of
PC clients utilize 57 % pilfered programming, this is a major issue from a secu-
rity perspective. There are numerous conceivable assaults on this unapproved
pilfered programming.
7. Service Availability:
Technically, there are such huge numbers of approaches to accomplish high ac-
cessibility in the fog. In view of the vacillation in the fog condition, application
and framework level need high accessibility and adaptability. Actually, there is
a shot of accessibility assault like DoS or Botnet DDoS. Subhashini S. et al. [6]
examined multi-level engineering to receive and giving ’security as an adminis-
tration’ structure.
8. Parallel application:
Parallel application enhanced the execution of the framework, yet there are a
few difficulties while sending it. While executing numerous applications paral-
lel there is an issue of common confirmation among them and because of this
weakness a few assaults are conceivable. Because of high non-uniform informa-
tion conveyance, the parallel calculation is agitated by disastrous load uneven
characters .
9. Data Alternation:
This is the main aim for Man-In-The-Middle attacks, attackers bring change in
the flow rules to modify the packets. Control plane, southbound interface and
data plane have to bear its consequences.
10. DoS/DDoS:
Attackers cause controller-switch communication flooding in control layer, South-
bound APIs and data plane in particular, has a risk of switches flow table flood-
ing for Denial of Services. DDoS attack governs with multiple bots (hosts used
for DDoS attack). Intruder use these bots to send fake traffic but at minimal
volume to make a sense of original traffic, as many bots are requesting for the
same resources, they hijack the controller services which results in DDoS at-
tack29].
8
5 SOLUTIONS
1. Software-Defined Fog Security (SDFSec) design
9
• The controller must be updated at constant fashion.
• Record maintenance for memory usage, interface statistic and CPU utilization.
1.3 Record Analysis: Analyze records for the settlement of threshold and alarms
on centralized controller. Current research on fog computing security demands
virtualization on different layers of fog computing, so that attacker can’t access
the actual network. OpenFlow networking community is trying to experiment
on virtualization on each plane with different techniques of IDS (Intrusion De-
tection System), traffic analysis, auditing data flow on fog computing at its
centralize controller.
10
4. DoS/DDoS protection:
Protection against DoS /DDoS is also possible by using artificial neural net-
works called Self-Organizing Maps. They monitor OpenFlow switches to get
the record of a number of average packet per flow, average bytes of data per
flow and then identify traffic as usual or suspicious. By using DDoS Block Ap-
plications (DBA), DDoS attacks can be blocked. DBA monitor flow metrics at
the controller, if it identifies any fake traffic, it retransmitted it to the controller
with a new IP address, by this, all compromised hosts (Bots) are blocked. More
advanced, DDoS defender helps in DDoS attacks detection and response. This
makes the use of OpenFlow and Locator to indicate protocols working to dif-
ferentiate authorized and unauthorized sources [2]. Host have fixed identifier
and changeable locator that changes at every move. Network analyst use fog
computing analysis mechanism at the controller for detecting traffic volume, if
it crosses the threshold, it must be detected by the controller and it enforced to
drop the packet.
6 CONCLUSION
SDN offering tremendous benefits to the modern networks including fog com-
puting as many enterprises are introducing SDN for gaining agility in IT infras-
tructure. Latest network designs are getting much advantage of the centralized
control with data plane and control plane separation. Two properties make
SDN more suitable choice for the security maintenance of fog computing than
any traditional network. First is the network controlling with software and SDN
controller have centralized network intelligence. By integrating the SDN poli-
cies with the fog layer, the malicious users never get the full network control
by accessing the servers for network controlling. For the protection of resources
within fog layer, we need to enforce tough security rules for giving availability
and integrity using novel mechanism that are being possible to design using the
software defined networks.
Advanced features of SDN makes it dynamic and productive. It has been no-
ticed that SDN is paving the way for network engineers and researchers towards
networking excellence. The study gives a comprehensive knowledge on fog com-
puting vulnerabilities, possible security breaches. After examining possible at-
tacks, we are giving some solutions for the mitigation of those attacks. The
study concludes that SDN secure architecture design is the need of time and
network engineers and security experts can dig deep for improving the security
of fog computing, especially at the enterprise level in the data centers.
The study encourages the future research for the utilization of SDN features
to protect fog layer. Flow control of network traffic is possible with security
monitoring services to provide the network-wide view. Programmability gives
support for the development of novel security functions with the advantage of
testing the prototype. In future, research is required in improving security ser-
vices, intelligent defense system and secure policy design with efficient resource
11
management. This study will not serve as initial understanding on fog comput-
ing security, rather it acts as an initiator for foster development in the security
of fog computing.
7 REFERENCES
References
[1] Songqing Chen, Tao Zhang, and Weisong Shi. Fog computing. IEEE Internet
Computing, 21(2):4–6, 2017.
[2] Samuel Kofi Erskine and Khaled M Elleithy. Real-time detection of dos
attacks in ieee 802.11 p using fog computing for a secure intelligent vehicular
network. Electronics, 8(7):776, 2019.
[3] Hamid Farhady, HyunYong Lee, and Akihiro Nakao. Software-defined net-
working: A survey. Computer Networks, 81:79–95, 2015.
[4] Diego Kreutz, Fernando MV Ramos, Paulo Esteves Verissimo, Christian Es-
teve Rothenberg, Siamak Azodolmolky, and Steve Uhlig. Software-defined
networking: A comprehensive survey. Proceedings of the IEEE, 103(1):14–
76, 2014.
[5] Yong Li and Min Chen. Software-defined network function virtualization:
A survey. IEEE Access, 3:2542–2553, 2015.
[6] Redowan Mahmud, Ramamohanarao Kotagiri, and Rajkumar Buyya. Fog
computing: A taxonomy, survey and future directions. In Internet of every-
thing, pages 103–130. Springer, 2018.
[7] Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mo-
hamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. Security
and privacy in fog computing: Challenges. IEEE Access, 5:19293–19304,
2017.
[8] Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mo-
hamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. Security
and privacy in fog computing: Challenges. IEEE Access, 5:19293–19304,
2017.
[9] PeiYun Zhang, MengChu Zhou, and Giancarlo Fortino. Security and trust
issues in fog computing: A survey. Future Generation Computer Systems,
88:16–27, 2018.
12