Vulnerabilities in Fog/Edge Computing from Architectural Perspectives

Dao, Nhu Ngoc; Dinh, Ngoc-Thanh; Pham, Quoc-Viet; Phan, Trung V.; Cho, Sungrae; Braun, Torsten (2021). Vulnerabilities in Fog/Edge Computing from Architectural Perspectives. In: Chang, Wei; Wu, Jie (eds.) Fog/Edge Computing For Security, Privacy, and Applications. Advances in Information Security: Vol. 83 (pp. 193-212). Springer Nature Switzerland 10.1007/978-3-030-57328-7_8

Full text not available from this repository. (Request a copy)

Recently, the emerging IoTization paradigm generates a tremendous amount of heterogeneous data offloaded from digital devices to networks. The heterogeneity of these big IoT data requires the networks to expand their computational capability from the cloud to the edge, realizing a new fog/edge computing (FEC) system. The FEC system provides multiple satisfactory levels in terms of performance, latency, security, etc. to user devices according to service demands. Because the FEC system is in between the cloud and user devices, this supplemental part introduces several vulnerabilities on both north and south interfaces as well as among internal FEC components. This chapter analyzes open security and privacy issues in FEC from architectural perspectives. First, a comprehensive overview of computational cloudization is presented, which leads to a hierarchical computing architecture in the network. From that, vulnerabilities within each architectural model, such as intrinsic FEC, the standard reference FEC architecture, FEC virtualization, and FEC integration into the 5G network, are discussed in detail. Finally, we summarize the chapter in the last section.

Item Type:

Book Section (Book Chapter)


08 Faculty of Science > Institute of Computer Science (INF) > Communication and Distributed Systems (CDS)
08 Faculty of Science > Institute of Computer Science (INF)

UniBE Contributor:

Dao, Nhu Ngoc and Braun, Torsten


000 Computer science, knowledge & systems
500 Science > 510 Mathematics




Advances in Information Security


Springer Nature Switzerland




Dimitrios Xenakis

Date Deposited:

31 Mar 2021 15:00

Last Modified:

31 Mar 2021 15:00

Publisher DOI:



Actions (login required)

Edit item Edit item
Provide Feedback