Visible to the public Risk Management of Fog Computing for Improving IoT Security

TitleRisk Management of Fog Computing for Improving IoT Security
Publication TypeConference Paper
Year of Publication2021
AuthorsTanimoto, Shigeaki, Matsumoto, Mari, Endo, Teruo, Sato, Hiroyuki, Kanai, Atsushi
Conference Name2021 10th International Congress on Advanced Applied Informatics (IIAI-AAI)
Date Publishedjul
Keywordscloud computing, delays, Electric breakdown, Fog Computing, Human Behavior, human factors, Internet of Things, IoT device, Metrics, Protocols, pubcrawl, resilience, Resiliency, Risk Breakdown Structure, risk management, Risk Matrix, Scalability, security, security risk management
AbstractWith the spread of the Internet, various devices are now connected to it and the number of IoT devices is increasing. Data generated by IoT devices has traditionally been aggregated in the cloud and processed over time. However, there are two issues with using the cloud. The first is the response delay caused by the long distance between the IoT device and the cloud, and the second is the difficulty of implementing sufficient security measures on the IoT device side due to the limited resources of the IoT device at the end. To address these issues, fog computing, which is located in the middle between IoT devices and the cloud, has been attracting attention as a new network component. However, the risks associated with the introduction of fog computing have not yet been fully investigated. In this study, we conducted a risk assessment of fog computing, which is newly established to promote the use of IoT devices, and identified 24 risk factors. The main countermeasures include the gradual introduction of connected IoT connection protocols and security policy matching. We also demonstrated the effectiveness of the proposed risk measures by evaluating the risk values. The proposed risk countermeasures for fog computing should help us to utilize IoT devices in a safe and secure manner.
Citation Keytanimoto_risk_2021