Main Article Content

Abstract

Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively unchanged in a cloud environment, but the paradigm does reveal new exploit possibilities. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. In this article, we elaborate the motivation and advantages of Fog computing, and analyze its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks. Security and privacy issues are further disclosed according to current Fog computing paradigm.. We investigate the stealthy features of this attack by examining its CPU and memory consumption on Fog device.

Article Details

How to Cite
Sam Immanuvel.P, Shankara Perumal.A, Shiddharth.C, & Parvathi.M. (2018). Mitigating Security Challenges for Insider Attacker on Fog Devices . International Journal of Intellectual Advancements and Research in Engineering Computations, 6(2), 1776–1782. Retrieved from https://ijiarec.com/ijiarec/article/view/733