Author:
Daoud Wided Ben,Othmen Salwa,Hamdi Monia,Khdhir Radhia,Hamam Habib
Abstract
AbstractFog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2).
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference28 articles.
1. A. Karakaya, S. Akleylek, A novel IoT-based health and tactical analysis model with fog computing. PeerJ Comput. Sci. 7, 1–34 (2021)
2. G. Caiza, M. Saeteros, W. Oñate, M.V. Garcia, Fog computing at industrial level, architecture, latency, energy, and security: a review. Heliyon 6, e03706 (2020)
3. S. Mahfoudhi, M. Frehat, Enhancing cloud of things performance by avoiding unnecessary data through artificial intelligence tools, in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), pp. 1463–1467 (2019)
4. M. Al-Masarweh, T. Alwada, W. Afandi, Fog computing, cloud computing and IoT environment: advanced broker management system. J. Sens. Actuator Netw. 11(84), 1–17 (2022)
5. W. Saeed, Z. Ahmad, A.I. Jehangiri, N. Mohamed, A.I. Umar, A Fault tolerant data management scheme for healthcare internet of things in fog computing. KSII Trans. Internet Inf. Syst. 15(1), 35–57 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Correction: Fog computing network security based on resources management;EURASIP Journal on Wireless Communications and Networking;2023-10-20