Fog computing network security based on resources management

Abstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as h...

Full description

Bibliographic Details
Main Authors: Wided Ben Daoud, Salwa Othmen, Monia Hamdi, Radhia Khdhir, Habib Hamam
Format: Article
Language:English
Published: SpringerOpen 2023-06-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:https://doi.org/10.1186/s13638-023-02256-1
_version_ 1797578594504933376
author Wided Ben Daoud
Salwa Othmen
Monia Hamdi
Radhia Khdhir
Habib Hamam
author_facet Wided Ben Daoud
Salwa Othmen
Monia Hamdi
Radhia Khdhir
Habib Hamam
author_sort Wided Ben Daoud
collection DOAJ
description Abstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2).
first_indexed 2024-03-10T22:24:02Z
format Article
id doaj.art-494c904cabf54d53b231d590ece9bf57
institution Directory Open Access Journal
issn 1687-1499
language English
last_indexed 2024-03-10T22:24:02Z
publishDate 2023-06-01
publisher SpringerOpen
record_format Article
series EURASIP Journal on Wireless Communications and Networking
spelling doaj.art-494c904cabf54d53b231d590ece9bf572023-11-19T12:10:02ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14992023-06-012023111810.1186/s13638-023-02256-1Fog computing network security based on resources managementWided Ben Daoud0Salwa Othmen1Monia Hamdi2Radhia Khdhir3Habib Hamam4NTS’Com Research Unit, ENET’Com, University of SfaxDepartment of Computers and Information Technologies, College of Sciences and Arts Turaif, Northern Border UniversityDepartment of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman UniversityDepartment of Computer Science, College of Science and Arts in Qurayyat, Jouf UniversityFaculty of Engineering, Uni de MonctonAbstract Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2).https://doi.org/10.1186/s13638-023-02256-1Fog computingSecurityAccess controlRiskTrustAccess certificate
spellingShingle Wided Ben Daoud
Salwa Othmen
Monia Hamdi
Radhia Khdhir
Habib Hamam
Fog computing network security based on resources management
EURASIP Journal on Wireless Communications and Networking
Fog computing
Security
Access control
Risk
Trust
Access certificate
title Fog computing network security based on resources management
title_full Fog computing network security based on resources management
title_fullStr Fog computing network security based on resources management
title_full_unstemmed Fog computing network security based on resources management
title_short Fog computing network security based on resources management
title_sort fog computing network security based on resources management
topic Fog computing
Security
Access control
Risk
Trust
Access certificate
url https://doi.org/10.1186/s13638-023-02256-1
work_keys_str_mv AT widedbendaoud fogcomputingnetworksecuritybasedonresourcesmanagement
AT salwaothmen fogcomputingnetworksecuritybasedonresourcesmanagement
AT moniahamdi fogcomputingnetworksecuritybasedonresourcesmanagement
AT radhiakhdhir fogcomputingnetworksecuritybasedonresourcesmanagement
AT habibhamam fogcomputingnetworksecuritybasedonresourcesmanagement