Securing Combined Fog-to-Cloud Systems: Challenges and Directions

  • Sarang KahvazadehEmail author
  • Xavi Masip-BruinEmail author
  • Eva Marín-TorderaEmail author
  • Alejandro Gómez CárdenasEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1069)


Nowadays, fog computing is emerged for providing computational power closer to the users. Fog computing brings real-time processing, low-latency, geo-distributed, etc. Although, fog computing do not come to compete cloud computing, it comes to collaborate. Recently, Fog-To-Cloud (F2C) continuum system is introduced to provide hierarchical computing system and facilitates fog-cloud collaboration. This F2C continuum system might encounter security issues and challenges due to their hierarchical and distributed nature. In this paper, we analyze attacks in different layer of F2C system and identify most potential security requirements and challenges for the F2C continuum system. Finally, we introduce the most remarkable efforts and trends for bringing secure F2C system.


Security Fog-to-cloud computing 



This work is supported by the H2020 projects mF2C (730929). It is also supported by the Spanish Ministry of Economy and Competitiveness and the European Regional Development Fund both under contract RTI2018-094532-B-100.


  1. 1.
    Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347–2376 (2015)CrossRefGoogle Scholar
  2. 2.
    Chen, K.-C., Lien, S.-Y.: Machine-to-Machine Communications: Technologies and Challenges. Ad Hoc Netw. 18, 3–23 (2014)CrossRefGoogle Scholar
  3. 3.
    Gonzalez-Martinez, J., et al.: Cloud computing and education: a state-of the-art survey. Comput. Educ. 80, 132–151 (2014)CrossRefGoogle Scholar
  4. 4.
    Bonomi, F., et al.: Fog computing: a platform for internet of things and analytics. In: Big Data and Internet of Things: A Roadmap for Smart Environments. Studies in Computational Intelligence, vol. 546 (2014)CrossRefGoogle Scholar
  5. 5.
    Marín-Tordera, E., et al.: Do we all really know what a fog node is? Current trends towards an open definition. Comput. Commun. 109, 117–130 (2017)CrossRefGoogle Scholar
  6. 6.
    Gupta, H., et al.: SDFog: A Software Defined Computing Architecture for QoS Aware Service Orchestration over Edge Devices. Accessed Sept 2018
  7. 7.
    Coughlin, T.: Convergence through the cloud-to-thing consortium. IEEE Consum. Electron. Mag. 6(3), 14–17 (2017)CrossRefGoogle Scholar
  8. 8.
    The OpenFog Consortium. Accessed Apr 2018
  9. 9.
    mF2C project. Accessed Apr 2018
  10. 10.
    Masip-Bruin, X., et al.: Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel. Commun. 23(5), 120–128 (2016)CrossRefGoogle Scholar
  11. 11.
    Irwan, S.: Redesigning security for fog computing with blockchain. Accessed Nov 2018
  12. 12.
    Ni, J., et al.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2017)CrossRefGoogle Scholar
  13. 13.
    Martin, B.A., et al.: OpenFog security requirements and approaches. In: Fog World Congress (2017)Google Scholar
  14. 14.
    Gomez, A., et al.: A resource identity management strategy for combined fog-to-cloud systems. In: IoT-SoS (2018)Google Scholar
  15. 15.
    Moosavi, S.R., et al.: End-to-end security scheme for mobility enabled healthcare internet of things. Future Gener. Comput. Syst. 64, 108–124 (2016)CrossRefGoogle Scholar
  16. 16.
    Kahvazadeh, S., et al.: Securing combined fog-to-cloud system through SDN approach. In: Crosscloud (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Advanced Network Architectures Lab (CRAAX)Universitat Politècnica de Catalunya (UPC)BarcelonaSpain

Personalised recommendations