Title: Fog computing: survey on decoy information technology

Authors: Wesam Almobaideen; Muhyidean Altarawneh

Addresses: Electrical Engineering and Computing Sciences Department, Rochester Institute of Technology University, Dubai, United Arab Emirates; King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan ' Electrical Engineering and Computing Sciences Department, Rochester Institute of Technology University, Dubai, United Arab Emirates; King Abdullah II School of Information Technology, University of Jordan, Amman, Jordan

Abstract: Fog computing extends the cloud paradigm to the edge of the network, thus covering deficiencies that are in cloud computing infrastructure. Security concerns are reduced, but this does not provide a secured platform, since data could be simply compromised in constrained environments. This survey emphasises on possible security mechanisms that uses technologies like user behaviour profiling and decoy technology to mitigate security threats. It mainly focuses on reviewing papers that have used decoy technology on fields of fog computing and other environments that fall under the same umbrella. After comparing papers, based on the results, classifications were provided in different perspectives such as detecting unauthorised access and decoy technology deployment. These classifications could support in selecting the best practice based on the required function and environment of deployment.

Keywords: decoy technology; honeypots; security; fog computing; constrained networks.

DOI: 10.1504/IJSN.2020.106833

International Journal of Security and Networks, 2020 Vol.15 No.2, pp.111 - 121

Received: 29 Jul 2019
Accepted: 03 Aug 2019

Published online: 17 Apr 2020 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article