Fog-Based Internet of Things Security Issues

  • Omar H. AlhazmiEmail author
Part of the Asset Analytics book series (ASAN)


Internet of things (IoT) environments are different in terms of architecture and platform type; fundamentally, some are cloud based, and some use traditional data centres to support all necessary computation and data handling. In cloud-based IoT, the core of the cloud where most of the computation takes place is usually located away from the ‘things’. Therefore, some researchers recently proposed using the fog-computing-based Internet of things by utilizing an adjacent layer of nodes (fog) to provide the essential computational support for devices to servers and from device to device. Hence, fog provides a more distributed environment that can provide support to IoT devices in the field. In this work, we analyse and compare different risks and advantages of using a cloud versus using a fog cloud and present discussion on these issues. We show that traditional cloud can be advantageous in some applications while fog can be better in other applications in terms of resistance to some types of security attacks, and each has certain strengths and weaknesses. Moreover, we preview the pros and cons of using fog in an IoT environment, and we preview some of the common attacks that can target the IoT environment and devices.


IoT Fog computing Cloud computing Security 


  1. 1.
    NIST (2011) The NIST definition of cloud computing. NIST special publication 800-145, Sept 2011.
  2. 2.
    Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the Internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing, ser MCC’12. ACM, pp 13–16Google Scholar
  3. 3.
    Cisco (2015) Fog computing, and the Internet of things: extend the cloud to where the things are. White paper.
  4. 4.
    Perera C, Qin Y, Estrella JC, Reiff-Marganiec S, Vasilakos AV (2017) Fog computing for sustainable smart cities: a survey. ACM Comput Surv (CSUR) 50(3):32. ISSN 0360-0300
  5. 5.
    Matt C (2018) Fog computing. Bus Inf Syst Eng 1–5. ISSN 2363-7005
  6. 6.
    Aljumah A, Ahanger TA (2018) Fog computing, and security issues: a review. In: 7th international conference on computers communications and control (ICCCC)Google Scholar
  7. 7.
    Abbasi BZ, Shah MA (2017) Fog computing: security issues, solutions, and robust practices. In: 23rd international conference on automation and computing (ICAC)Google Scholar
  8. 8.
    Alhazmi OH, Aloufi KS (2019) Fog-based Internet of things: a security scheme. In: Proceedings of 2nd international conference on computer applications & information security (ICCAIS). IEEE, pp 1–5.
  9. 9.
    Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng, 25 pp. Article ID 9324035.
  10. 10.
    Gubbi RB, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660CrossRefGoogle Scholar
  11. 11.
    Mashal I, Alsaryrah O, Chung T-Y, Yang C-Z, Kuo W-H, Agrawal DP (2015) Choices for interaction with things on Internet and underlying issues. Ad Hoc Netw 28:68–90Google Scholar
  12. 12.
    Said O, Masud M (2013) Towards Internet of things: survey and future vision. Int J Comput Netw 5(1):1–17CrossRefGoogle Scholar
  13. 13.
    Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet: the Internet of things architecture, possible applications, and key challenges. In: Proceedings of the 10th international conference on frontiers of information technology (FIT’12), pp 257–260Google Scholar
  14. 14.
    Cisco (2014) The Internet of things reference model. White paper, June 2014.
  15. 15.
    Alhazmi O (2018) A survivable Internet of things scheme. J Adv Res Comput Appl 13(1)Google Scholar
  16. 16.
    Rao BBP, Saluia P, Sharma N, Mittal A, Sharma SV (2012) Cloud computing for Internet of things & sensing-based applications. In: Proceedings of the 6th international conference on sensing technologyGoogle Scholar
  17. 17.
    Zhang B, Mor N, Kolb J, Chan DS, Goyal N, Lutz K, Allman E, Wawrzynek J, Lee E, Kubiatowicz J (2015) The cloud is not enough: saving IoT from the cloud. In: Proceedings of the 7th USENIX workshop on hot topics in cloud computingGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer ScienceTaibah UniversityMedinaSaudi Arabia

Personalised recommendations