Department of Computer Science, National University of Computer and Emerging Sciences, Islamabad 44000, Pakistan.
College of Technological Innovation, Zayed University, Abu Dhabi 144534, UAE.
Sensors (Basel). 2019 Apr 14;19(8):1788. doi: 10.3390/s19081788.
The proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today's society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today's hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.
互联设备在医疗和电网等关键行业的广泛应用正在改变人们对关键基础设施的认知。新关键行业的互联程度不断提高,这是由于世界变得更加移动和互联,物联网不断发展,对无缝信息访问的需求不断增长。关键行业是当今社会的基础,这些行业中的任何一个服务中断都可能在其他行业甚至全球范围内产生连锁反应。在当今高度互联的世界中,关键基础设施比以往任何时候都更容易受到网络威胁,无论是国家赞助的、犯罪集团还是个人的威胁。随着互联设备数量的增加,黑客破坏关键基础设施的潜在接入点数量也在增加。这种新的攻击面源于组织技术系统关键基础设施的根本变化。本文旨在提高对未来数字基础设施安全的理解,因为它仍在不断发展。在介绍产生大数据的基础设施之后,定义了基于功能的雾体系结构。此外,还对雾使能物联网系统中的安全要求进行了全面回顾。然后,深入分析了雾计算安全挑战以及与雾使能物联网相关的大数据隐私和信任问题。我们还讨论了区块链作为解决物联网中许多安全相关问题的关键推动者,并密切考虑了区块链和雾计算之间的互补关系。在这种情况下,这项工作将保护大数据及其范围的任务形式化,提供了一种分类法来对基于雾的物联网系统的威胁进行分类,并根据其安全服务对该领域的最新研究成果进行全面比较,并为未来的研究推荐有前途的研究方向。