Abstract
Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network's edge. Heterogeneous IoT devices interact with different users throughout a network. However, data security is a crucial concern for IoT, fog and cloud network ecosystems. Since the number of anonymous users increases and new identity disclosures occur within the IoTs, it is becoming challenging to grow mesh networks to deliver end to end communications, as the extended IoT networks resemble a mesh architecture. To reinforce data security over IoTs, we deploy a microservice-based blockchain mechanism for fogs, which works as a decentralized client-server network medium (i.e., secured end device-based communication). We implement a blockchain equipped security scheme to be used with a fog-IoT hierarchical tree-based overlay mesh architecture to address and develop the network performance issues. In this study, we consider encryption and decryption delays from IoT and fog-integrated parts to monitor data records and compare them through the developed security scheme. The blocks of a blockchain offer the desired execution results mainly in terms of the algorithmic efficiency, which correlates with the existing algorithms, namely the Advanced Encryption Standard (AES), the Rivest Shamir Adleman (RSA), and the Data Encryption Standard (DES). Our `BFIM' scheme has an enhanced task scheduling capacity and a more efficient throughput than the AES, DES, RSA resource deliverables (i.e., tasks). Our comprehensive performance evaluation implies that the Blockchain-based Fog IoT Microservice (i.e., BFIM) architecture provides a task delivery efficiency of 78.79% (i.e., task deliverable) and a service delivery efficiency of 83.24% (i.e., task scheduling). The `BFIM' also has an overall process delivery efficiency of 75% (i.e., time delay, throughput) in the fog layer, rather than a central cloud layer running the AES, DES, and RSA algorithms.
Highlights
C LOUD computing, a paradigm of on-demand deliverybased computing services, runs through the internet
To minimize the anonymity security issue over hop-tohop mesh interconnections at the Internet of Things (IoT) end to end deliveries, we developed a blockchain-based security scheme for hierarchical-tree-based fog–IoT mesh architectures
If an intruder attacks an IoT device within the IoT network layer, the valuable information around the network might be in danger of being stalked
Summary
C LOUD computing, a paradigm of on-demand deliverybased computing services, runs through the internet. The traditional and sophisticated (e.g., sensor networks) IoTs share and distribute data through mesh networks and cause delays (e.g., latencies towards the end to end communication) when there is an increased number of anonymous users. We contrived iterative building blocks to act as a continuous information run-time for our blockchain carrier over the mesh network or IoT nodes In this scheme, the building blocks are generated iteratively when needed to pass or process information but not overcome the One Time Session Password (OTSP) session (e.g., session-based delay for layer verification and validation) from fog–IoT and fog–cloud.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.