Security Challenges for Cloud or Fog Computing-Based AI Applications
Abstract: Security challenges for Cloud or Fog-based machine learning services pose several concerns. Securing the underlying Cloud or Fog services is essential, as successful attacks against these services, on which machine learning applications rely, can lead to significant impairments of these applications. Because the requirements for AI applications can also be different, we differentiate according to whether they are used in the Cloud or in a Fog Computing network. This then also results in different threats or attack possibilities. For Cloud platforms, the responsibility for security can be divided between different parties. Security deficiencies at a lower level can have a direct impact on the higher level where user data is stored. While responsibilities are simpler for Fog Computing networks, by moving services to the edge of the network, we have to secure them against physical access to the devices. We conclude by outlining specific information security requirements for AI applications.
- “Security Challenges for Cloud or Fog Computing/Based AI Applications” In Proc of the 14th International Conference on Cloud Computing, GRIDs, and Virtualization (Cloud Computing 2023), 2023, pp. 21–29 URL: https://www.thinkmind.org/index.php?view=article&articleid=cloud_computing_2023_2_10_28004
- “Cloud computing in medicine: current trends and possibilities” In 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), 2021, pp. 1–5 IEEE
- “Fog computing: Principles, architectures, and applications” In Internet of Things: Principles and Paradigms Morgan Kaufmann, 2016, pp. 61–75
- National Security Agency “Cybersecurity Information – Cloud Security Basics”, 2018 URL: https://www.nsa.gov/portals/75/documents/what-we-do/cybersecurity/professional-resources/csi-cloud-security-basics.pdf
- “Cloud Security and Security Challenges Revisited” In Proceedings of Cloud Computing 2019 IARIA, 2019, pp. 61–66
- “A survey on data breach challenges in cloud computing security: Issues and threats” In 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT), 2017, pp. 1–8 DOI: 10.1109/ICCPCT.2017.8074287
- Farzad Sabahi “Cloud computing security threats and responses” In 2011 IEEE 3rd International Conference on Communication Software and Networks, 2011, pp. 245–249 DOI: 10.1109/ICCSN.2011.6014715
- Maria Henriquez “The top data breaches of 2021”, 2021 Security Magazine URL: https://www.securitymagazine.com/articles/96667-the-top-data-breaches-of-2021
- Jay Fitzgerald “The 10 Biggest Data Breaches Of 2022”, 2022 CRN Security News URL: https://www.crn.com/news/security/the-10-biggest-data-breaches-of-2022
- Admin “The 25 Biggest Data Breaches and Attacks of 2020”, 2020 StealthLabs URL: https://www.stealthlabs.com/blog/the-25-biggest-data-breaches-and-attacks-of-2020/
- Dell Cameron “Today’s Massive Ransomware Attack Was Mostly Preventable; Here’s How To Avoid It”, 2017 Gizmodo URL: https://www.gizmodo.com.au/2017/05/todays-massive-ransomware-attack-was-mostly-preventable-heres-how-to-avoid-it/
- “Malware Detection in Cloud Computing Infrastructures” In IEEE Transactions on Dependable and Secure Computing 13.2, 2016, pp. 192–205 DOI: 10.1109/TDSC.2015.2457918
- Amos K. Kibet, Rosanna A. Esquivel and James A. Esquivel “Ransomware: Ransomware as a Service (RaaS), methods to detects, prevent, mitigate and future directions” In Journal of Emerging Technologies and Innovative Research 9.11, 2022, pp. b264–b278
- Netscout “Threat Intelligence Report, Issue 7: Findings from 1H 2021”, 2021
- “DDoS threat report for 2023 Q1”, 2023 Cloudflare URL: https://blog.cloudflare.com/ddos-threat-report-2023-q1/
- National Vulnerability Database “CVE-2021-44228 Detail”, 2021 National Institute of StandardsTechnology URL: https://nvd.nist.gov/vuln/detail/CVE-2021-44228
- “Hotpatch for Apache Log4j”, 2021 AWS Open Source Blog URL: https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/
- hoakley “Last Week on My Mac: When the Internet caught fire”, 2021 The Eclectic Light Company URL: https://eclecticlight.co/2021/12/12/last-week-on-my-mac-when-the-internet-caught-fire/
- Erez Yalon, Inon Shkedy and Paulo Silva “OWASP API Security Top 2019”, 2019 Open Worldwide Application Security Project URL: https://owasp.org/www-project-api-security/
- Kubernetes “Overview of Cloud Native Security”, 2022 URL: https://kubernetes.io/docs/concepts/security/overview/
- “Analysis and Remodeling of the DirtyCOW Vulnerability by Debugging and Abstraction” In Structured Object-Oriented Formal Language and Method: 9th International Workshop (SOFL+ MSVL) 2019, Shenzhen, China, 2020, pp. 3–12 Springer
- Liz Rice “Container security: Fundamental technology concepts that protect containerized applications” O’Reilly, 2020
- Amazon “Shared Responsibility Model”, 2015 URL: https://aws.amazon.com/en/compliance/shared-responsibility-model/
- Thomas Segura “10 Rules for Better Cloud Security”, 2021 URL: https://blog.gitguardian.com/10-rules-for-better-cloud-security/
- “SCONE: Secure Linux containers with Intel SGX” In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16) 16, 2016, pp. 689–703
- GitGuardian “Kubernetes Hardening Tutorial Part 1: Pods”, 2021 URL: https://blog.gitguardian.com/kubernetes-tutorial-part-1-pods/
- Cisco Systems, Inc. “Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are”, 2015
- “Fog Computing and Its Role in the Internet of Things” In Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC ’12 Helsinki, Finland: Association for Computing Machinery, 2012, pp. 13–16 DOI: 10.1145/2342509.2342513
- Redowan Mahmud, Ramamohanarao Kotagiri and Rajkumar Buyya “Fog Computing: A Taxonomy, Survey and Future Directions” In Internet of Things Springer Singapore, 2017, pp. 103–130 DOI: 10.1007/978-981-10-5861-5_5
- Cisco Systems, Inc. “Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things”, 2015
- Saad Khan, Simon Parkinson and Yongrui Qin “Fog computing security: a review of current applications and security solutions” In Journal of Cloud Computing 6.1 Springer ScienceBusiness Media LLC, 2017, pp. 1–22 DOI: 10.1186/s13677-017-0090-3
- Abdullah Aljumah and Tariq Ahamed Ahanger “Fog computing and security issues: A review” In 2018 7th International Conference on Computers Communications and Control (ICCCC), 2018, pp. 237–239 DOI: 10.1109/ICCCC.2018.8390464
- “Security and Privacy in Fog Computing: Challenges” In IEEE Access 5, 2017, pp. 19293–19304 DOI: 10.1109/ACCESS.2017.2749422
- Farouq Aliyu, Tarek Sheltami and Elhadi M. Shakshuki “A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing” The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2018) / The 8th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2018) / Affiliated Workshops In Procedia Computer Science 141, 2018, pp. 24–31 DOI: https://doi.org/10.1016/j.procs.2018.10.125
- Mehdi Hosseinzadeh, Bruno Sinopoli and Emanuele Garone “Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems” In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2019, pp. 712–717 DOI: 10.1109/ALLERTON.2019.8919762
- Ahmed M. Alwakeel “An Overview of Fog Computing and Edge Computing Security and Privacy Issues” In Sensors 21.24 MDPI AG, 2021, pp. 8226 DOI: 10.3390/s21248226
- “Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack” In IEEE Access 6, 2018, pp. 74993–75001 DOI: 10.1109/ACCESS.2018.2884672
- “COMITMENT: A Fog Computing Trust Management Approach” In Journal of Parallel and Distributed Computing 137 Elsevier BV, 2020, pp. 1–16 DOI: 10.1016/j.jpdc.2019.10.006
- Ke Gu, XinYing Dong and WeiJia Jia “Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs” In IEEE Transactions on Cloud Computing 10.2, 2022, pp. 1215–1232 DOI: 10.1109/TCC.2020.2985050
- Shanhe Yi, Zhengrui Qin and Qun Li “Security and Privacy Issues of Fog Computing: A Survey” In Wireless Algorithms, Systems, and Applications Cham: Springer International Publishing, 2015, pp. 685–695
- Favian Dewanta “Secure Microservices Deployment for Fog Computing Services in a Remote Office” In 2020 3rd International Conference on Information and Communications Technology (ICOIACT), 2020, pp. 425–430 DOI: 10.1109/ICOIACT50329.2020.9332025
- “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels” In Advances in Cryptology — EUROCRYPT 2001 Berlin, Heidelberg: Springer Berlin Heidelberg, 2001, pp. 453–474
- “Privacy-preserving blockchain-based federated learning for traffic flow prediction” In Future Generation Computer Systems 117, 2021, pp. 328–337 DOI: https://doi.org/10.1016/j.future.2020.12.003
- “Analyzing Information Leakage of Updates to Natural Language Models” In ACM Conference on Computer and Communication Security (CCS) ACM, 2020 ACM URL: https://www.microsoft.com/en-us/research/publication/analyzing-information-leakage-of-updates-to-natural-language-models/
- “Training Data Leakage Analysis in Language Models” arXiv, 2021 DOI: 10.48550/ARXIV.2101.05405
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.