A Survey on Access Control in Fog Computing

Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo

    Research output: Contribution to journalArticleResearchpeer-review

    Abstract

    Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.

    Original languageEnglish
    Pages (from-to)144-149
    Number of pages6
    JournalIEEE Communications Magazine
    Volume56
    Issue number2
    DOIs
    Publication statusPublished - 1 Feb 2018

    Cite this

    Zhang, P., Liu, J. K., Richard Yu, F., Sookhak, M., Au, M. H., & Luo, X. (2018). A Survey on Access Control in Fog Computing. IEEE Communications Magazine, 56(2), 144-149. https://doi.org/10.1109/MCOM.2018.1700333
    Zhang, Peng ; Liu, Joseph K. ; Richard Yu, F. ; Sookhak, Mehdi ; Au, Man Ho ; Luo, Xiapu. / A Survey on Access Control in Fog Computing. In: IEEE Communications Magazine. 2018 ; Vol. 56, No. 2. pp. 144-149.
    @article{94ff8ae934cb48c3996b8d0a858dd85c,
    title = "A Survey on Access Control in Fog Computing",
    abstract = "Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.",
    author = "Peng Zhang and Liu, {Joseph K.} and {Richard Yu}, F. and Mehdi Sookhak and Au, {Man Ho} and Xiapu Luo",
    year = "2018",
    month = "2",
    day = "1",
    doi = "10.1109/MCOM.2018.1700333",
    language = "English",
    volume = "56",
    pages = "144--149",
    journal = "IEEE Communications Magazine",
    issn = "0163-6804",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    number = "2",

    }

    Zhang, P, Liu, JK, Richard Yu, F, Sookhak, M, Au, MH & Luo, X 2018, 'A Survey on Access Control in Fog Computing' IEEE Communications Magazine, vol. 56, no. 2, pp. 144-149. https://doi.org/10.1109/MCOM.2018.1700333

    A Survey on Access Control in Fog Computing. / Zhang, Peng; Liu, Joseph K.; Richard Yu, F.; Sookhak, Mehdi; Au, Man Ho; Luo, Xiapu.

    In: IEEE Communications Magazine, Vol. 56, No. 2, 01.02.2018, p. 144-149.

    Research output: Contribution to journalArticleResearchpeer-review

    TY - JOUR

    T1 - A Survey on Access Control in Fog Computing

    AU - Zhang, Peng

    AU - Liu, Joseph K.

    AU - Richard Yu, F.

    AU - Sookhak, Mehdi

    AU - Au, Man Ho

    AU - Luo, Xiapu

    PY - 2018/2/1

    Y1 - 2018/2/1

    N2 - Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.

    AB - Fog computing has emerged as an attractive solution to the distributed application of the Internet of Things, and could provide low-latency, highly mobile, and geo-distributed services distinguished from the cloud. While fog computing offers numerous benefits, it also faces various security challenges, of which access control is one of the fundamental requirements since it is concerned with authorizing users to access resources in the open fog environment. This article provides a comprehensive survey of access control of users' data in the environment of fog computing with the aim of highlighting security problems and challenges. It discusses the definition, architecture, and characteristics of fog computing, based on which typical requirements and essential models of access control are addressed. Finally, it highlights known access control schemes in the environment of fog computing, and identifies existing unresolved problems as future directions.

    UR - http://www.scopus.com/inward/record.url?scp=85042196401&partnerID=8YFLogxK

    U2 - 10.1109/MCOM.2018.1700333

    DO - 10.1109/MCOM.2018.1700333

    M3 - Article

    VL - 56

    SP - 144

    EP - 149

    JO - IEEE Communications Magazine

    JF - IEEE Communications Magazine

    SN - 0163-6804

    IS - 2

    ER -