Fog Computing Over IoT: A Secure Deployment and Formal Verification
Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focu...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8118288/ |
_version_ | 1818644539417559040 |
---|---|
author | Samman Zahra Masoom Alam Qaisar Javaid Abdul Wahid Nadeem Javaid Saif Ur Rehman Malik Muhammad Khurram Khan |
author_facet | Samman Zahra Masoom Alam Qaisar Javaid Abdul Wahid Nadeem Javaid Saif Ur Rehman Malik Muhammad Khurram Khan |
author_sort | Samman Zahra |
collection | DOAJ |
description | Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the security issues encountered during the data outsourcing from fog client to fog node. We have added Shibboleth also known as security and cross domain access control protocol between fog client and fog node for improved and secure communication between the fog client and fog node. Furthermore to prove whether Shibboleth meets the security requirement needed to provide the secure outsourcing. We have also formally verified the protocol against basic security properties using high level Petri net. |
first_indexed | 2024-12-17T00:16:27Z |
format | Article |
id | doaj.art-2f266c0baa1047adbc2c9a537ba2d347 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-17T00:16:27Z |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-2f266c0baa1047adbc2c9a537ba2d3472022-12-21T22:10:42ZengIEEEIEEE Access2169-35362017-01-015271322714410.1109/ACCESS.2017.27661808118288Fog Computing Over IoT: A Secure Deployment and Formal VerificationSamman Zahra0https://orcid.org/0000-0003-2957-5337Masoom Alam1Qaisar Javaid2Abdul Wahid3Nadeem Javaid4Saif Ur Rehman Malik5Muhammad Khurram Khan6Department of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science and Software Engineering, International Islamic University, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanDepartment of Computer Science, Cyber Security Lab, COMSATS Institute of Information Technology, Islamabad, PakistanCenter of Excellence in Information Assurance, King Saud University, Riyadh, Saudi ArabiaFog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the security issues encountered during the data outsourcing from fog client to fog node. We have added Shibboleth also known as security and cross domain access control protocol between fog client and fog node for improved and secure communication between the fog client and fog node. Furthermore to prove whether Shibboleth meets the security requirement needed to provide the secure outsourcing. We have also formally verified the protocol against basic security properties using high level Petri net.https://ieeexplore.ieee.org/document/8118288/IoTfog computingshibbolethHLPNverificationZ3 |
spellingShingle | Samman Zahra Masoom Alam Qaisar Javaid Abdul Wahid Nadeem Javaid Saif Ur Rehman Malik Muhammad Khurram Khan Fog Computing Over IoT: A Secure Deployment and Formal Verification IEEE Access IoT fog computing shibboleth HLPN verification Z3 |
title | Fog Computing Over IoT: A Secure Deployment and Formal Verification |
title_full | Fog Computing Over IoT: A Secure Deployment and Formal Verification |
title_fullStr | Fog Computing Over IoT: A Secure Deployment and Formal Verification |
title_full_unstemmed | Fog Computing Over IoT: A Secure Deployment and Formal Verification |
title_short | Fog Computing Over IoT: A Secure Deployment and Formal Verification |
title_sort | fog computing over iot a secure deployment and formal verification |
topic | IoT fog computing shibboleth HLPN verification Z3 |
url | https://ieeexplore.ieee.org/document/8118288/ |
work_keys_str_mv | AT sammanzahra fogcomputingoveriotasecuredeploymentandformalverification AT masoomalam fogcomputingoveriotasecuredeploymentandformalverification AT qaisarjavaid fogcomputingoveriotasecuredeploymentandformalverification AT abdulwahid fogcomputingoveriotasecuredeploymentandformalverification AT nadeemjavaid fogcomputingoveriotasecuredeploymentandformalverification AT saifurrehmanmalik fogcomputingoveriotasecuredeploymentandformalverification AT muhammadkhurramkhan fogcomputingoveriotasecuredeploymentandformalverification |