SlideShare a Scribd company logo
Various Security issues and its
Solutions in the domain of Fog
Computing
by
Manash Kumar Mondal
Dept. Computer Science and Engg.
University of Kalyani
Content
• Fog computing
• Architecture of Fog Computing
• Application of Fog in Real Word
• Loop holes in fog architecture
• Fog Security Technique
• Conclusion
Fog computing
• Fog computing is an extension of Cloud Computing. Few researchers
treat fog computing as edge computing. Nowadays, billions of users
use fog/ edge enable IoT devices. Simultaneously, a trillion GB of data
is generated every second.
• That massive amount of data is needed to be secured. IoT has
become popular day by day, and Cisco introduced Fog Computing (FC)
for the excellent management of the devices[4]. A three-layer
architecture is suggested by CISCO that supports several real-life
items like energy grid, buildings, smart cities etc.
Architecture of Fog Computing
Application of Fog in Real Word
• Fog computing is becoming popular daily due to the advancement of
fog computing over cloud computing like bandwidth, latency, and
connectivity issues.
• Many-reputed organizations prefer fog in real-life. Nowadays, almost
all IoT devices are associated with fog computing. Such applications
widely use fog computing as a backbone of the entire system rather
than cloud computing.
• The following example cover two major applications of fog
computing.
Vehicular Ad Hoc Networks (VAETs)
Smart Cities
Loop holes in fog architecture
End user device layer Virtualization Core layer,
Local Data Center layer
Network layer
Information injecting Resource misuse Hardware damage (physical) Man in the
Middle attack
Privileges escalation Rogue Gateway
Leakage of privacy Denial-of-Service (DoS) attack
Service
manipulation
Virtual Machine (VM)
manipulation
Rogue DCs
Fog Security Technique
Conclusions:
• This article covers the architecture of fog computing in details. Few
real life applications along with their working principles is also
highlighted.
• In this particular article, we have mainly focus the security issues and
its solution in different aspects.
• This paper also highlighted the loopholes in every layer in FC. We also
make a roadmap to the future researcher that they can find the all
related work in one umbrella.
References
• [1] H. Madsen and B. Burtschy, “Reliability in the Utility Computing Era : Towards Reliable Fog Computing,” pp. 43–46, 2013.
• [2] I. Stojmenovic and S. Wen, “The Fog Computing Paradigm:Scenarios and Security Issues,” Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst., vol. 2, pp. 1–8, 2014.
• [3] B. Tang, Z. Chen, G. Hefferman, T. Wei, H. He, and Q. Yang, “A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities,” Proc. ASE BigData Soc. 2015, p. 28:1- 28:6, 2015.
• [4] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” Proc. first Ed. MCC Work. Mob. cloud Comput., pp. 13–16, 2012.
• [5] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog Computing: Focusing on Mobile Users at the Edge,” eprint arXiv:1502.01815, pp. 1–11, 2015.
• [6] S. J. Stolfo, M. Ben Salem, and A. D. Keromytis, “Fog computing: Mitigating insider data theft attacks in the cloud,” Proc. - IEEE CS Secur. Priv. Work. SPW 2012, pp. 125–128, 2012.
• [7] S. M. Oriol, J. Jacob, and T. Dimitrakos, “Security Challenges in Cloud Computing,” Gerontologist, vol. 53, no. 2, p. NP, 2013.
• [8] A. Kanuparthi, R. Karri, and S. Addepalli, “Hardware and embedded security in the context of internet of things,” Proc. 2013 ACM Work. Secur. Priv. dependability cyber Veh. - CyCAR ’13, pp. 61–64, 2013.
• [9] K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, “On Security and Privacy Issues of Fog Computing supported Internet of Things Environment.”
• 10] B. P. Panciatici, G. Bareux, and L. Wehenkel, “Security Management Under Uncertainty,” no. october, 2012.
• [11] W. Wang and Z. Lu, “Cyber security in the Smart Grid: Survey and challenges,” Comput. Networks, vol. 57, no. 5, pp. 1344–1371, 2013.
• [12] A. Volokyta, I. Kokhanevych, and D. Ivanov, “Secure virtualization in cloud computing,” 11th Int. Conf. Mod. Probl. Radio Eng. Telecommun. Comput. Sci., p. 395, 2012.
• [13] P. V. Madhwai and 1D. C. Saste, “FOG COMPUTING : Comprehensive Approach For Avoiding Data Theft Attack Using,” vol. 3, no. 3, pp. 3132–3139, 2015.
• [14] C. Dsouza, G. J. Ahn, and M. Taguinod, “Policy-driven security management for fog computing: Preliminary framework and a casestudy,” Proc. 2014 IEEE 15th Int. Conf. Inf. Reuse Integr. IEEE IRI 2014, pp. 16–23,
2014.
• [15] P. Kumar, N. Zaidi, and T. Choudhur, “Fog Computing : Common
• Security Issues and Proposed Countermeasures,” pp. 311–315, 2016.
• [16] C. Chen, H. Raj, S. Saroiu, I. Nsdi, and A. Wolman, “cTPM : A Cloud TPM for Cross-Device Trusted Applications,” 11th USENIX Conf. Networked Syst. Des. Implement., vol. 8, pp. 187–201, 2014.
• [17] R. Lu, K. Heung, A. Lashkari, and A. Ghorbani, “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing- Enhanced IoT,” IEEE Access, vol. 5, pp. 1–1, 2017.
• [18] Z. Qin, S. Yi, Q. Li, and D. Zamkov, “Preserving secondary users’ privacy in cognitive radio networks,” Proc. - IEEE INFOCOM, pp. 772–780, 2014.

More Related Content

What's hot (20)

PDF
Ms3422732277
IJERA Editor
 
PDF
Pervasive Computing
journal ijrtem
 
PDF
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
Security research trends in 2020
AIRCC Publishing Corporation
 
PDF
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 
PDF
Most Viewed Article for an year in Academia - International Journal of Distri...
ijdpsjournal
 
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
ijwmn
 
PDF
Complexity Versus Comprehendability: Simplifying Wireless Security
Olivia Moran
 
PDF
SeGW Whitepaper from Radisys
Shah Sheikh
 
PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PPTX
Cloud computing final
University of Fallujah
 
PDF
Cloud storage limit monitoring measures
eSAT Publishing House
 
PDF
Eb31854857
IJERA Editor
 
PDF
L010517180
IOSR Journals
 
PDF
Cloud computing and security issues in the
IJNSA Journal
 
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
Ms3422732277
IJERA Editor
 
Pervasive Computing
journal ijrtem
 
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Security research trends in 2020
AIRCC Publishing Corporation
 
Novel authentication framework for securing communication in internet-of-things
IJECEIAES
 
Most Viewed Article for an year in Academia - International Journal of Distri...
ijdpsjournal
 
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
ijwmn
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Olivia Moran
 
SeGW Whitepaper from Radisys
Shah Sheikh
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Cloud computing final
University of Fallujah
 
Cloud storage limit monitoring measures
eSAT Publishing House
 
Eb31854857
IJERA Editor
 
L010517180
IOSR Journals
 
Cloud computing and security issues in the
IJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 

Similar to Various security issues and its solutions in the (20)

PDF
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
 
PDF
Jan_2024_Top_read_articles_in_ACIJ.pdf
acijjournal
 
PDF
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
AIRCC Publishing Corporation
 
PDF
December 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
January 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
September 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
November 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
May 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
October 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
December 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
April 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
PDF
November 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
July 2022 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
PDF
August 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
March 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
May 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
February 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
PDF
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
AIRCC Publishing Corporation
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
acijjournal
 
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
AIRCC Publishing Corporation
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
Ad

More from Manash Kumar Mondal (20)

PDF
The Basics of Networking . Connecting Devices in a Digital World
Manash Kumar Mondal
 
PDF
Cloud Computing : Fundamental Concepts and Models
Manash Kumar Mondal
 
PDF
Cloud Computing: Cloud Enabling Technologies
Manash Kumar Mondal
 
PDF
An Introduction to Cloud Computing and its Applications
Manash Kumar Mondal
 
PDF
Introduction to Machine_Learning for Absolute Beginner
Manash Kumar Mondal
 
PDF
Complexity Class of Algorithm for Beginner
Manash Kumar Mondal
 
PDF
Introduction to Artificial Intelligence (AI)
Manash Kumar Mondal
 
PDF
Introduction to Data Preprocessing for Machine Learning
Manash Kumar Mondal
 
PDF
A brief Introduction to Linux Operating System.
Manash Kumar Mondal
 
PDF
Systematic Literature Review on academic research
Manash Kumar Mondal
 
PDF
Statistical Inference & Hypothesis Testing.pdf
Manash Kumar Mondal
 
PDF
Role of NDLI in Higher Education _ Research, KU.pdf
Manash Kumar Mondal
 
PPTX
Omicron - A Covid 19 variant
Manash Kumar Mondal
 
PPTX
Computer network
Manash Kumar Mondal
 
PPTX
Boolean alebra
Manash Kumar Mondal
 
PPTX
Introduction to Algorithm
Manash Kumar Mondal
 
PPTX
File in C language
Manash Kumar Mondal
 
PDF
Pegasus, A spyware
Manash Kumar Mondal
 
PPTX
A comparative study between cloud computing and fog
Manash Kumar Mondal
 
The Basics of Networking . Connecting Devices in a Digital World
Manash Kumar Mondal
 
Cloud Computing : Fundamental Concepts and Models
Manash Kumar Mondal
 
Cloud Computing: Cloud Enabling Technologies
Manash Kumar Mondal
 
An Introduction to Cloud Computing and its Applications
Manash Kumar Mondal
 
Introduction to Machine_Learning for Absolute Beginner
Manash Kumar Mondal
 
Complexity Class of Algorithm for Beginner
Manash Kumar Mondal
 
Introduction to Artificial Intelligence (AI)
Manash Kumar Mondal
 
Introduction to Data Preprocessing for Machine Learning
Manash Kumar Mondal
 
A brief Introduction to Linux Operating System.
Manash Kumar Mondal
 
Systematic Literature Review on academic research
Manash Kumar Mondal
 
Statistical Inference & Hypothesis Testing.pdf
Manash Kumar Mondal
 
Role of NDLI in Higher Education _ Research, KU.pdf
Manash Kumar Mondal
 
Omicron - A Covid 19 variant
Manash Kumar Mondal
 
Computer network
Manash Kumar Mondal
 
Boolean alebra
Manash Kumar Mondal
 
Introduction to Algorithm
Manash Kumar Mondal
 
File in C language
Manash Kumar Mondal
 
Pegasus, A spyware
Manash Kumar Mondal
 
A comparative study between cloud computing and fog
Manash Kumar Mondal
 
Ad

Recently uploaded (20)

PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PPTX
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
GitOps_Without_K8s_Training simple one without k8s
DanialHabibi2
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Design Thinking basics for Engineers.pdf
CMR University
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Day2 B2 Best.pptx
helenjenefa1
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Lecture 1 Shell and Tube Heat exchanger-1.pptx
mailforillegalwork
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Hashing Introduction , hash functions and techniques
sailajam21
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 

Various security issues and its solutions in the

  • 1. Various Security issues and its Solutions in the domain of Fog Computing by Manash Kumar Mondal Dept. Computer Science and Engg. University of Kalyani
  • 2. Content • Fog computing • Architecture of Fog Computing • Application of Fog in Real Word • Loop holes in fog architecture • Fog Security Technique • Conclusion
  • 3. Fog computing • Fog computing is an extension of Cloud Computing. Few researchers treat fog computing as edge computing. Nowadays, billions of users use fog/ edge enable IoT devices. Simultaneously, a trillion GB of data is generated every second. • That massive amount of data is needed to be secured. IoT has become popular day by day, and Cisco introduced Fog Computing (FC) for the excellent management of the devices[4]. A three-layer architecture is suggested by CISCO that supports several real-life items like energy grid, buildings, smart cities etc.
  • 5. Application of Fog in Real Word • Fog computing is becoming popular daily due to the advancement of fog computing over cloud computing like bandwidth, latency, and connectivity issues. • Many-reputed organizations prefer fog in real-life. Nowadays, almost all IoT devices are associated with fog computing. Such applications widely use fog computing as a backbone of the entire system rather than cloud computing. • The following example cover two major applications of fog computing.
  • 6. Vehicular Ad Hoc Networks (VAETs)
  • 8. Loop holes in fog architecture End user device layer Virtualization Core layer, Local Data Center layer Network layer Information injecting Resource misuse Hardware damage (physical) Man in the Middle attack Privileges escalation Rogue Gateway Leakage of privacy Denial-of-Service (DoS) attack Service manipulation Virtual Machine (VM) manipulation Rogue DCs
  • 10. Conclusions: • This article covers the architecture of fog computing in details. Few real life applications along with their working principles is also highlighted. • In this particular article, we have mainly focus the security issues and its solution in different aspects. • This paper also highlighted the loopholes in every layer in FC. We also make a roadmap to the future researcher that they can find the all related work in one umbrella.
  • 11. References • [1] H. Madsen and B. Burtschy, “Reliability in the Utility Computing Era : Towards Reliable Fog Computing,” pp. 43–46, 2013. • [2] I. Stojmenovic and S. Wen, “The Fog Computing Paradigm:Scenarios and Security Issues,” Proc. 2014 Fed. Conf. Comput. Sci. Inf. Syst., vol. 2, pp. 1–8, 2014. • [3] B. Tang, Z. Chen, G. Hefferman, T. Wei, H. He, and Q. Yang, “A Hierarchical Distributed Fog Computing Architecture for Big Data Analysis in Smart Cities,” Proc. ASE BigData Soc. 2015, p. 28:1- 28:6, 2015. • [4] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” Proc. first Ed. MCC Work. Mob. cloud Comput., pp. 13–16, 2012. • [5] T. H. Luan, L. Gao, Z. Li, Y. Xiang, and L. Sun, “Fog Computing: Focusing on Mobile Users at the Edge,” eprint arXiv:1502.01815, pp. 1–11, 2015. • [6] S. J. Stolfo, M. Ben Salem, and A. D. Keromytis, “Fog computing: Mitigating insider data theft attacks in the cloud,” Proc. - IEEE CS Secur. Priv. Work. SPW 2012, pp. 125–128, 2012. • [7] S. M. Oriol, J. Jacob, and T. Dimitrakos, “Security Challenges in Cloud Computing,” Gerontologist, vol. 53, no. 2, p. NP, 2013. • [8] A. Kanuparthi, R. Karri, and S. Addepalli, “Hardware and embedded security in the context of internet of things,” Proc. 2013 ACM Work. Secur. Priv. dependability cyber Veh. - CyCAR ’13, pp. 61–64, 2013. • [9] K. Lee, D. Kim, D. Ha, U. Rajput, and H. Oh, “On Security and Privacy Issues of Fog Computing supported Internet of Things Environment.” • 10] B. P. Panciatici, G. Bareux, and L. Wehenkel, “Security Management Under Uncertainty,” no. october, 2012. • [11] W. Wang and Z. Lu, “Cyber security in the Smart Grid: Survey and challenges,” Comput. Networks, vol. 57, no. 5, pp. 1344–1371, 2013. • [12] A. Volokyta, I. Kokhanevych, and D. Ivanov, “Secure virtualization in cloud computing,” 11th Int. Conf. Mod. Probl. Radio Eng. Telecommun. Comput. Sci., p. 395, 2012. • [13] P. V. Madhwai and 1D. C. Saste, “FOG COMPUTING : Comprehensive Approach For Avoiding Data Theft Attack Using,” vol. 3, no. 3, pp. 3132–3139, 2015. • [14] C. Dsouza, G. J. Ahn, and M. Taguinod, “Policy-driven security management for fog computing: Preliminary framework and a casestudy,” Proc. 2014 IEEE 15th Int. Conf. Inf. Reuse Integr. IEEE IRI 2014, pp. 16–23, 2014. • [15] P. Kumar, N. Zaidi, and T. Choudhur, “Fog Computing : Common • Security Issues and Proposed Countermeasures,” pp. 311–315, 2016. • [16] C. Chen, H. Raj, S. Saroiu, I. Nsdi, and A. Wolman, “cTPM : A Cloud TPM for Cross-Device Trusted Applications,” 11th USENIX Conf. Networked Syst. Des. Implement., vol. 8, pp. 187–201, 2014. • [17] R. Lu, K. Heung, A. Lashkari, and A. Ghorbani, “A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing- Enhanced IoT,” IEEE Access, vol. 5, pp. 1–1, 2017. • [18] Z. Qin, S. Yi, Q. Li, and D. Zamkov, “Preserving secondary users’ privacy in cognitive radio networks,” Proc. - IEEE INFOCOM, pp. 772–780, 2014.