Security and Privacy in Fog/Cloud-based IoT Systems for AI and Robotics
DOI:
https://doi.org/10.4108/airo.3616Keywords:
Security and privacy, Artificial Intelligence, Robotics, Internet of Things, Fog Computing, Cloud ComputingAbstract
Integration of Internet of Things (IoT) systems based on the fog or the cloud with Artificial Intelligence (AI) and Robotics has prepared the way for breakthrough advancements in a variety of different fields of business. However, these cross-disciplinary technologies present significant difficulties in terms of maintaining confidentiality and safeguarding data. This article digs into the issues of establishing robust security and protecting user privacy in IoT systems that are based in the fog or the cloud and are utilized for AI and robotics applications. This study gives insights into the possible hazards encountered by such interconnected systems by conducting an in-depth review of existing security threats, vulnerabilities, and privacy concerns. In addition, the study investigates cutting-edge security mechanisms, encryption approaches, access control strategies, and privacy-preserving solutions that can be utilized to safeguard data, communications, and user identities. The results of this study highlight the demand for comprehensive security and privacy solutions to support the mainstream deployment of Fog/Cloud-based Internet of Things systems in the field of artificial intelligence and robotics.
Downloads
References
P. Singh and K. D. Singh, “Fog-Centric Intelligent Surveillance System: A Novel Approach for Effective and Efficient Surveillance,” in 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), 2023, pp. 762–766.
K. D. Singh, “Securing of Cloud Infrastructure using Enterprise Honeypot,” in Proceedings - 2021 3rd International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2021, 2021, pp. 1388–1393. doi: 10.1109/ICAC3N53548.2021.9725389.
G. Aceto, V. Persico, and A. Pescapé, “Industry 4.0 and Health: Internet of Things, Big Data, and Cloud Computing for Healthcare 4.0,” J. Ind. Inf. Integr., vol. 18, 2020, doi: 10.1016/j.jii.2020.100129.
S. S. Kang, K. D. Singh, and S. Kumari, “Smart antenna for emerging 5G and application,” in Printed Antennas, CRC Press, 2022, pp. 249–264.
K. D. Singh, “Particle Swarm Optimization assisted Support Vector Machine based Diagnostic System for Dengue prediction at the early stage,” in Proceedings - 2021 3rd International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2021, 2021, pp. 844–848. doi: 10.1109/ICAC3N53548.2021.9725670.
U. S. P. Srinivas Aditya, R. Singh, P. K. Singh, and A. Kalla, “A Survey on Blockchain in Robotics: Issues, Opportunities, Challenges and Future Directions,” J. Netw. Comput. Appl., vol. 196, p. 103245, 2021, doi: 10.1016/j.jnca.2021.103245.
S. Meng, X. He, and X. Tian, “Research on Fintech development issues based on embedded cloud computing and big data analysis,” Microprocess. Microsyst., vol. 83, 2021, doi: 10.1016/j.micpro.2021.103977.
H. Goumidi, Z. Aliouat, and S. Harous, “Vehicular Cloud Computing Security: A Survey,” Arab. J. Sci. Eng., vol. 45, no. 4, pp. 2473–2499, 2020, doi: 10.1007/s13369-019-04094-0.
K. D. Singh and P. Singh, “A Novel Cloud-based Framework to Predict the Employability of Students,” in 2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT), 2023, pp. 528–532.
P. Dhiman et al., “A novel deep learning model for detection of severity level of the disease in citrus fruits,” Electronics, vol. 11, no. 3, p. 495, 2022.
S. Tiwari, S. Kumar, and K. Guleria, “Outbreak Trends of Coronavirus Disease-2019 in India: A Prediction,” Disaster Med. Public Health Prep., vol. 14, no. 5, pp. e33–e38, 2020, doi: 10.1017/dmp.2020.115.
J. Venkatesh et al., “A Complex Brain Learning Skeleton Comprising Enriched Pattern Neural Network System for Next Era Internet of Things,” J. Healthc. Eng., vol. 2023, 2023.
P. R. Kapula, B. Pant, B. Kanwer, D. Buddhi, K. V. D. Sagar, and S. Sinthu, “Integration of AI in implementation of Wire-less Webbing: A detailed Review,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), 2023, pp. 983–989.
M. Wang, T. Zhu, T. Zhang, J. Zhang, S. Yu, and W. Zhou, “Security and privacy in 6G networks: New areas and new challenges,” Digit. Commun. Networks, vol. 6, no. 3, pp. 281–291, 2020, doi: 10.1016/j.dcan.2020.07.003.
G. Yang et al., “Homecare Robotic Systems for Healthcare 4.0: Visions and Enabling Technologies,” IEEE J. Biomed. Heal. Informatics, vol. 24, no. 9, pp. 2535–2549, 2020, doi: 10.1109/JBHI.2020.2990529.
A. Martinetti, P. K. Chemweno, K. Nizamis, and E. Fosch-Villaronga, “Redefining Safety in Light of Human-Robot Interaction: A Critical Review of Current Standards and Regulations,” Front. Chem. Eng., vol. 3, 2021, doi: 10.3389/fceng.2021.666237.
Y. Chen, Y. Ping, Z. Zhang, B. Wang, and S. Y. He, “Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT,” Neural Comput. Appl., vol. 33, no. 10, pp. 4677–4694, 2021, doi: 10.1007/s00521-020-05426-0.
N. A. Angel, D. Ravindran, P. M. D. R. Vincent, K. Srinivasan, and Y. C. Hu, “Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies,” Sensors, vol. 22, no. 1, 2022, doi: 10.3390/s22010196.
F. Bademosi and R. R. A. Issa, “Factors Influencing Adoption and Integration of Construction Robotics and Automation Technology in the US,” J. Constr. Eng. Manag., vol. 147, no. 8, 2021, doi: 10.1061/(asce)co.1943-7862.0002103.
H. Goumidi, Z. Aliouat, and S. Harous, “Vehicular Cloud Computing Security: A Survey,” Arab. J. Sci. Eng., vol. 45, no. 4, pp. 2473–2499, Apr. 2020, doi: 10.1007/s13369-019-04094-0.
Y. Chen, Y. Ping, Z. Zhang, B. Wang, and S. Y. He, “Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT,” Neural Comput. Appl., vol. 33, no. 10, pp. 4677–4694, May 2021, doi: 10.1007/s00521-020-05426-0.
E. Fosch-Villaronga and C. Millard, “Cloud robotics law and regulation: Challenges in the governance of complex and dynamic cyber–physical ecosystems,” Rob. Auton. Syst., vol. 119, pp. 77–91, 2019, doi: 10.1016/j.robot.2019.06.003.
S. Chatterjee, R. Chaudhuri, and D. Vrontis, “Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives,” Inf. Syst. Front., 2021, doi: 10.1007/s10796-021-10197-7.
S. Jain, C. Nandhini, R. D.-W. P. Communications, and undefined 2021, “ECC-based authentication scheme for cloud-based robots,” Springer.
A. K. Tanwani, R. Anand, J. E. Gonzalez, and K. Goldberg, “RILaaS: Robot Inference and Learning as a Service,” IEEE Robot. Autom. Lett., vol. 5, no. 3, pp. 4423–4430, 2020, doi: 10.1109/LRA.2020.2998414.
J. Wan, J. Li, M. Imran, and D. Li, “A blockchain-based solution for enhancing security and privacy in smart factory,” IEEE Trans. Ind. Informatics, vol. 15, no. 6, pp. 3652–3660, 2019, doi: 10.1109/TII.2019.2894573.
J. P. A. Yaacoub, H. N. Noura, O. Salman, and A. Chehab, “Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations,” Int. J. Inf. Secur., vol. 21, no. 1, pp. 115–158, 2022, doi: 10.1007/s10207-021-00545-8.
E. Fosch-Villaronga and T. Mahler, “Cybersecurity, safety and robots: Strengthening the link between cybersecurity and safety in the context of care robots,” Comput. Law Secur. Rev., vol. 41, 2021, doi: 10.1016/j.clsr.2021.105528.
Y. Xianjia, J. P. Queralta, J. Heikkonen, and T. Westerlund, “Federated Learning in Robotic and Autonomous Systems,” Procedia Comput. Sci., vol. 191, pp. 135–142, 2021, doi: 10.1016/j.procs.2021.07.041.
A. K. Tanwani, N. Mor, J. Kubiatowicz, J. E. Gonzalez, and K. Goldberg, “A Fog Robotics Approach to Deep Robot Learning: Application to object recognition and grasp planning in surface decluttering,” Proc. - IEEE Int. Conf. Robot. Autom., vol. 2019-May, pp. 4559–4566, 2019, doi: 10.1109/ICRA.2019.8793690.
W. Liang, Z. Ning, S. Xie, Y. Hu, S. Lu, and D. Zhang, “Secure fusion approach for the Internet of Things in smart autonomous multi-robot systems,” Inf. Sci. (Ny)., vol. 579, pp. 468–482, 2021, doi: 10.1016/j.ins.2021.08.035.
S. Chatterjee, R. Chaudhuri, and D. Vrontis, “Usage Intention of Social Robots for Domestic Purpose: From Security, Privacy, and Legal Perspectives,” Inf. Syst. Front., 2021, doi: 10.1007/s10796-021-10197-7.
S. Jain, C. Nandhini, and R. Doriya, “ECC-Based Authentication Scheme for Cloud-Based Robots,” Wirel. Pers. Commun., vol. 117, no. 2, pp. 1557–1576, Mar. 2021, doi: 10.1007/s11277-020-07935-6.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2023 Kiran Singh, Prabh Deep Singh
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.