Fog computing network security based on resources management
Abstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as h...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2023-06-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Subjects: | |
Online Access: | https://doi.org/10.1186/s13638-023-02256-1 |
_version_ | 1797578594504933376 |
---|---|
author | Wided Ben Daoud Salwa Othmen Monia Hamdi Radhia Khdhir Habib Hamam |
author_facet | Wided Ben Daoud Salwa Othmen Monia Hamdi Radhia Khdhir Habib Hamam |
author_sort | Wided Ben Daoud |
collection | DOAJ |
description | Abstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2). |
first_indexed | 2024-03-10T22:24:02Z |
format | Article |
id | doaj.art-494c904cabf54d53b231d590ece9bf57 |
institution | Directory Open Access Journal |
issn | 1687-1499 |
language | English |
last_indexed | 2024-03-10T22:24:02Z |
publishDate | 2023-06-01 |
publisher | SpringerOpen |
record_format | Article |
series | EURASIP Journal on Wireless Communications and Networking |
spelling | doaj.art-494c904cabf54d53b231d590ece9bf572023-11-19T12:10:02ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992023-06-012023111810.1186/s13638-023-02256-1Fog computing network security based on resources managementWided Ben Daoud0Salwa Othmen1Monia Hamdi2Radhia Khdhir3Habib Hamam4NTS’Com Research Unit, ENET’Com, University of SfaxDepartment of Computers and Information Technologies, College of Sciences and Arts Turaif, Northern Border UniversityDepartment of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman UniversityDepartment of Computer Science, College of Science and Arts in Qurayyat, Jouf UniversityFaculty of Engineering, Uni de MonctonAbstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2).https://doi.org/10.1186/s13638-023-02256-1Fog computingSecurityAccess controlRiskTrustAccess certificate |
spellingShingle | Wided Ben Daoud Salwa Othmen Monia Hamdi Radhia Khdhir Habib Hamam Fog computing network security based on resources management EURASIP Journal on Wireless Communications and Networking Fog computing Security Access control Risk Trust Access certificate |
title | Fog computing network security based on resources management |
title_full | Fog computing network security based on resources management |
title_fullStr | Fog computing network security based on resources management |
title_full_unstemmed | Fog computing network security based on resources management |
title_short | Fog computing network security based on resources management |
title_sort | fog computing network security based on resources management |
topic | Fog computing Security Access control Risk Trust Access certificate |
url | https://doi.org/10.1186/s13638-023-02256-1 |
work_keys_str_mv | AT widedbendaoud fogcomputingnetworksecuritybasedonresourcesmanagement AT salwaothmen fogcomputingnetworksecuritybasedonresourcesmanagement AT moniahamdi fogcomputingnetworksecuritybasedonresourcesmanagement AT radhiakhdhir fogcomputingnetworksecuritybasedonresourcesmanagement AT habibhamam fogcomputingnetworksecuritybasedonresourcesmanagement |