Open tuhinadasgupta opened 4 years ago
Reviewer: Lily Shpak Review Type: Comprehension
The problem that the authors in this paper are trying to solve is how to make the Internet of Things more secure by using fog computing. The authors acknowledge that there are many obstacles that would have to be crossed in order to make this a secure and effective solution.
The main contributions this paper makes to solving this issue is providing solutions to the biggest issue that fog computing introduces, security. The authors give different facets of security that would need help, and then they provide solutions for these issues but they also recognize that there are extreme strides that need to be made in order for fog computing to be an effective solution.
Reviewer: Pat Cody Review Type: Comprehension
IoT devices by themselves generate massive amounts of data and have intrinsic problems due to being small physical devices, on top of the security challenges from being connected to the Internet. As a result, these shortcomings place a higher burden on cloud computing servers. Fog computing has been introduced as a means to bridge IoT devices with the cloud, but they also suffer from security issues.
This paper highlights a wide variety of security issues present in IoT. It proposes a novel means of performing certificate revocation using fog computing. It also describes how fog computing can be used more generally to solve the security issues they previously highlighted.
Reviewer: Greg Kahl Review Type: Comprehensive
In this survey paper, the authors discuss the advantages of using Fog Computing, or Edge Computing, in IoT. They also discuss the security risks that may be brought about by utilizing Fog Computing and address these risks with solutions to mitigate the risks that may arise.
In the first portion of the survey discusses the issues that the use of Fog Computing may bring with it. They then move on to discuss their solution which helps to mitigate these issues and hopefully provide a better experience than the systems currently in place. And finally, they discuss Fog Computing could be utilized to help solve some of the problems discussed earlier.
Reviewer: Sam Hanna Review Type: Comprehension
Problem Being Solved: This paper talks about fog computing and the security and privacy implications of using fog computing with IoT devices. The paper covers common security problems and gives an example of a solution for one of the problems, Certificate Revocation.
Important Areas: The paper focused on how fog computing can help improve the security of IoT devices. The areas of security that were focused on in particular were authentication, privacy, and access control. It also gave a solution for Certificate Revocation, which uses Bloom Filters on the device and checks any false positives on the edge.
Questions about the Survey:
Reviewer: Sean McBride Review type: Comprehension
"Fog Computing for the IOT: Security and Privacy Issues" seeks to provide a high-level and non-exhaustive list of security and privacy issues around the IOT, demonstrate a focused example of fog computing to one of the many problems in this domain, and then outlines numerous open research issues at the intersection of fog computing and IOT security and privacy."
Reviewer: Cuidi Wei Review Type: Comprehension
Problem being solved Employing fog to improve the distribution of certificate revocation information among IoT devices security enhancement. Also. The fog computing paradigm aims to reduce the data volume and traffic to cloud servers, decrease latency, and improve quality of service.
Main contributions Proposing a new scheme using fog to solve security issues in distributing certificate revocation information IoT environments.
Questions about the survey 1.Is there a possibility that a client A disguises as another client B to communicate with fog and access a certain source? 2.How to measure the communicate overhead? Is the comparison between the latency and communicate overhead fair enough? I mean, if there is a fog between cloud and client, there may be more latency because there is one more step to communicate with. 3.Why high bandwidth use and timeliness issues could lead to security consequences?
Reviewer: Rachell Kim Review Type: Comprehension
Problem Being Solved
Ensuring security and privacy in IoT devices can be a unique challenge due to architectural constraints and the mobile nature of the devices involved. This paper discusses areas that may pose as security and privacy threats to IoT as well as the insufficiency of existing mechanisms to cover for these identified problems. The authors also propose a new method which utilizes fog computing to enhance security in IoT environments that do interact with fog devices.
Main Contributions
The authors survey various vulnerabilities in IoT devices and propose a new system to improve certificate revocation schemes through fog computing. They also survey different facets of security in IoT that may benefit from incorporating the usage of fog computing as a part of potential solutions.
Questions
Reviewer: Michael Hegarty Review Type: Comprehension
This paper discusses the challenges related to IoT devices fitting into the current internet system. They discuss how different aspects of security and privacy are facing issues due to the unique nature of IoT. The authors go into detail about the challenges of certificate revocation, particularly in IoT devices.
The authors sum up different problems facing the world of IoT while explaining how the nature of IoT lead to these problems. They give a case study to show how the specific issue of certificate revocation in IoT would be fairly difficult to solve in a conventional way without making trade offs involving data size, round trip time, or security, and provide a solution using a fog based framework. They then discuss the potential issues that fog computing will need to address.
The authors discuss in the later sections how location verification can be an issue with IoT devices moving in a fast and dynamic way. Wouldn't this issue have already been addressed and solved by the numerous maps programs on cell phones?
The authors mention the idea that a user's usage pattern of IoT devices can be revealed from the data generated from the devices. Assuming the attacker gets this information from intercepting the wireless transmission from node to node is this something that can be dealt with without simply encrypting every transmission?
How would the trust model based on reputation be implemented in the IoT domain? Wouldn't it get computationally expensive to keep track of reputations for every single device on the network and update them based on their behavior?
Reviewer: Huachuan Wang Review Type: Comprehension
Overview
This paper analyzed the security and privacy issues of fog computing in IoT environments. It proposed a new methodology using fog to solve security issues in distributing certificate revocation information in IoT environments.
Contribution
This paper investigated and discussed security and privacy challenges of introducing fog computing in IoT environments. It emphasized great attention should be paid to solve the authentication in the context of fog computing in IoT applications and other security problems. This paper also did research on the location and other new privacy issues.
Questions
Reviewer: Ratnadeep Bhattacharya Review type: Critical
Problem Solved
The paper analyzes the overall security situation of IoT devices. It then goes on to describe the role fog nodes can play. Finally, it discusses the use of a scheme to provide certificate revocation better than current schemes.
Main Contribution
It discusses a scheme that combines hashing and a bloom filter data structure (a bit map) that provides certificate revocation information better than current schemes like CRL (Certificate Revocation List) and OCSP (Online Certificate Status Protocol).
Figure 1 and 2 in the paper provide a very concise description of the scheme. It improves on two aspects of current schemes
The method is rather simple where each fog node maintains CRL files for a CA. The node then passes the certificates through k hashing functions and store a single bit for each certificate in a bloom filter. The data structures are stored in the IoT devices. If a source device talks to a destination device then the bits corresponding to the destination are checked. If they are unset then the destination has a valid certificate; otherwise the fog is checked with because there is a small probability for false positives.
According to my calculations, for a fog having 1000 devices in a hostile environment (500 devices could be malicious), the size of the CRL file would be around 1 KB. Also, in case of revoked certificates, the devices make much lesser requests to the fog.
Critique
@lrshpak The second question is a great point and one that is not addressed by the paper (great critique!) @pcodes The second question is an issue that the paper assumes doesn't occur (nice catch!) The third question is a concern addressed in the first half of the paper, admittedly without a solid solution (proposed computation in the fog node) @gkahl You have two great questions (would love to discuss them in class) but I'm not totally sure what you mean by the last question (feel free to bring it up in the class discussion) @s-hanna15 The critical thought behind the first question is excellent & something I hope we discuss tomorrow. @bushidocodes The first question is insightful as the focus of the prayer is unclear @chandaweia The second question is mentioned in my presentation! (you'll get an answer!) @rachellkm Both questions are insightful but I don't know the answer to the first & would love to know! @mjhegarty The third question is a consideration that must be made but I too am unsure how it occurs efficiently. @huachuan The first question will be answered in my presentation! (you'll get an answer!)