Show simple item record

dc.contributor.authorTariq, N.
dc.contributor.authorAsim, M.
dc.contributor.authorAl-Obeidat, F.
dc.contributor.authorFarooqi, M.Z.
dc.contributor.authorBaker, T.
dc.contributor.authorHammoudeh, M.
dc.contributor.authorGhafir, Ibrahim
dc.date.accessioned2020-01-24T12:12:55Z
dc.date.accessioned2020-01-31T10:13:33Z
dc.date.available2020-01-24T12:12:55Z
dc.date.available2020-01-31T10:13:33Z
dc.date.issued2019-04
dc.identifier.citationTariq N, Asim M, Al-Obeidat F et al (2019) The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors. 19(8): 1788.en_US
dc.identifier.urihttp://hdl.handle.net/10454/17612
dc.descriptionYesen_US
dc.description.abstractThe proliferation of inter-connected devices in critical industries, such as healthcare and power grid, is changing the perception of what constitutes critical infrastructure. The rising interconnectedness of new critical industries is driven by the growing demand for seamless access to information as the world becomes more mobile and connected and as the Internet of Things (IoT) grows. Critical industries are essential to the foundation of today’s society, and interruption of service in any of these sectors can reverberate through other sectors and even around the globe. In today’s hyper-connected world, the critical infrastructure is more vulnerable than ever to cyber threats, whether state sponsored, criminal groups or individuals. As the number of interconnected devices increases, the number of potential access points for hackers to disrupt critical infrastructure grows. This new attack surface emerges from fundamental changes in the critical infrastructure of organizations technology systems. This paper aims to improve understanding the challenges to secure future digital infrastructure while it is still evolving. After introducing the infrastructure generating big data, the functionality-based fog architecture is defined. In addition, a comprehensive review of security requirements in fog-enabled IoT systems is presented. Then, an in-depth analysis of the fog computing security challenges and big data privacy and trust concerns in relation to fog-enabled IoT are given. We also discuss blockchain as a key enabler to address many security related issues in IoT and consider closely the complementary interrelationships between blockchain and fog computing. In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art contributions in the field according to their security service and recommends promising research directions for future investigations.en_US
dc.language.isoenen_US
dc.relation.isreferencedbyhttps://doi.org/10.3390/s19081788en_US
dc.rights©2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).en_US
dc.subjectSecurityen_US
dc.subjectBig dataen_US
dc.subjectInternet of Thingsen_US
dc.subjectFog computingen_US
dc.subjectEdge computingen_US
dc.subjectBlockchainen_US
dc.titleThe security of big data in fog-enabled IoT applications including blockchain: a surveyen_US
dc.status.refereedYesen_US
dc.date.Accepted2019-04-12
dc.date.application2019-04-14
dc.typeArticleen_US
dc.type.versionPublished versionen_US
dc.date.updated2020-01-24T12:12:59Z
refterms.dateFOA2020-01-31T10:14:16Z


Item file(s)

Thumbnail
Name:
TheSecurityofBigDatainFog-Enab ...
Size:
588.7Kb
Format:
PDF
Description:
Ghafir_Sensors

This item appears in the following Collection(s)

Show simple item record