Fog Computing Over IoT: A Secure Deployment and Formal Verification

Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focu...

Full description

Bibliographic Details
Main Authors: Samman Zahra, Masoom Alam, Qaisar Javaid, Abdul Wahid, Nadeem Javaid, Saif Ur Rehman Malik, Muhammad Khurram Khan
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8118288/
_version_ 1818644539417559040
author Samman Zahra
Masoom Alam
Qaisar Javaid
Abdul Wahid
Nadeem Javaid
Saif Ur Rehman Malik
Muhammad Khurram Khan
author_facet Samman Zahra
Masoom Alam
Qaisar Javaid
Abdul Wahid
Nadeem Javaid
Saif Ur Rehman Malik
Muhammad Khurram Khan
author_sort Samman Zahra
collection DOAJ
description Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the security issues encountered during the data outsourcing from fog client to fog node. We have added Shibboleth also known as security and cross domain access control protocol between fog client and fog node for improved and secure communication between the fog client and fog node. Furthermore to prove whether Shibboleth meets the security requirement needed to provide the secure outsourcing. We have also formally verified the protocol against basic security properties using high level Petri net.
first_indexed 2024-12-17T00:16:27Z
format Article
id doaj.art-2f266c0baa1047adbc2c9a537ba2d347
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T00:16:27Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-2f266c0baa1047adbc2c9a537ba2d3472022-12-21T22:10:42ZengIEEEIEEE Access2169-35362017-01-015271322714410.1109/ACCESS.2017.27661808118288Fog Computing Over IoT: A Secure Deployment and Formal VerificationSamman Zahra0https://orcid.org/0000-0003-2957-5337Masoom Alam1Qaisar Javaid2Abdul Wahid3Nadeem Javaid4Saif Ur Rehman Malik5Muhammad Khurram Khan6Department of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science and Software Engineering, International Islamic University, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanCenter of Excellence in Information Assurance, King Saud University, Riyadh, Saudi ArabiaFog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the security issues encountered during the data outsourcing from fog client to fog node. We have added Shibboleth also known as security and cross domain access control protocol between fog client and fog node for improved and secure communication between the fog client and fog node. Furthermore to prove whether Shibboleth meets the security requirement needed to provide the secure outsourcing. We have also formally verified the protocol against basic security properties using high level Petri net.https://ieeexplore.ieee.org/document/8118288/IoTfog computingshibbolethHLPNverificationZ3
spellingShingle Samman Zahra
Masoom Alam
Qaisar Javaid
Abdul Wahid
Nadeem Javaid
Saif Ur Rehman Malik
Muhammad Khurram Khan
Fog Computing Over IoT: A Secure Deployment and Formal Verification
IEEE Access
IoT
fog computing
shibboleth
HLPN
verification
Z3
title Fog Computing Over IoT: A Secure Deployment and Formal Verification
title_full Fog Computing Over IoT: A Secure Deployment and Formal Verification
title_fullStr Fog Computing Over IoT: A Secure Deployment and Formal Verification
title_full_unstemmed Fog Computing Over IoT: A Secure Deployment and Formal Verification
title_short Fog Computing Over IoT: A Secure Deployment and Formal Verification
title_sort fog computing over iot a secure deployment and formal verification
topic IoT
fog computing
shibboleth
HLPN
verification
Z3
url https://ieeexplore.ieee.org/document/8118288/
work_keys_str_mv AT sammanzahra fogcomputingoveriotasecuredeploymentandformalverification
AT masoomalam fogcomputingoveriotasecuredeploymentandformalverification
AT qaisarjavaid fogcomputingoveriotasecuredeploymentandformalverification
AT abdulwahid fogcomputingoveriotasecuredeploymentandformalverification
AT nadeemjavaid fogcomputingoveriotasecuredeploymentandformalverification
AT saifurrehmanmalik fogcomputingoveriotasecuredeploymentandformalverification
AT muhammadkhurramkhan fogcomputingoveriotasecuredeploymentandformalverification