This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
have been proposed in [170].
3. Data Dissemination: The data cannot be transferred
to the fog node without encryption, due to security
issues. Due to this movement of encrypted data to the
fog node, many desirable features are sacrificed such
as sharing, searching, and aggregation.
•
Searching data securely: As discussed in transient
storage, data is encrypted before uploading. How-
ever, once it is encrypted, searching or retrieving
on the ciphertext becomes difficult for owners
as well as other entities. In order to retrieve the
information from encrypted text, search-able en-
cryption and its privacy levels are defined in [171].
A dynamic symmetric search-able scheme is intro-
duced in [172].
•
Data aggregation: Fog nodes might need to aggre-
gate the data in certain cases to prevent data leak-
age and reduce communication overhead. It is im-
portant to develop secure aggregation algorithms
to prevent data thefts. Various homomorphic en-
cryption schemes, such as BGN encryption [173]
and Paillier encryption [174], have been proposed
to achieve secure data aggregation.
4. Decentralized Computation: The data stored on the
fog nodes can be processed and analyzed for better re-
sults. However, such computations have several threats
and risks associated with them. For example, attackers
can not only control the analyzed results, but can also
expose processed data.
•
Server-aided computation: Tasks which cannot be
executed by IoT devices themselves are com-
puted with the help of fog nodes. However, this
can lead to exposure of data to attackers, if the
fog nodes which received data from IoT are al-
ready compromised. Server-aided computation is
one such method whose aim is to provide secure
computation [175].
•
Verifiable computation: Users rely on the fog
nodes to compute their data. There must be a se-
cure mechanism to verify the computation results
coming from the fog node. Authors in [176], [177]
have proposed certain multi-user mechanisms that
help with verifiable computation.
Chia sẻ với bạn bè của bạn: