Abstract

Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network's edge. Heterogeneous IoT devices interact with different users throughout a network. However, data security is a crucial concern for IoT, fog and cloud network ecosystems. Since the number of anonymous users increases and new identity disclosures occur within the IoTs, it is becoming challenging to grow mesh networks to deliver end to end communications, as the extended IoT networks resemble a mesh architecture. To reinforce data security over IoTs, we deploy a microservice-based blockchain mechanism for fogs, which works as a decentralized client-server network medium (i.e., secured end device-based communication). We implement a blockchain equipped security scheme to be used with a fog-IoT hierarchical tree-based overlay mesh architecture to address and develop the network performance issues. In this study, we consider encryption and decryption delays from IoT and fog-integrated parts to monitor data records and compare them through the developed security scheme. The blocks of a blockchain offer the desired execution results mainly in terms of the algorithmic efficiency, which correlates with the existing algorithms, namely the Advanced Encryption Standard (AES), the Rivest Shamir Adleman (RSA), and the Data Encryption Standard (DES). Our `BFIM' scheme has an enhanced task scheduling capacity and a more efficient throughput than the AES, DES, RSA resource deliverables (i.e., tasks). Our comprehensive performance evaluation implies that the Blockchain-based Fog IoT Microservice (i.e., BFIM) architecture provides a task delivery efficiency of 78.79% (i.e., task deliverable) and a service delivery efficiency of 83.24% (i.e., task scheduling). The `BFIM' also has an overall process delivery efficiency of 75% (i.e., time delay, throughput) in the fog layer, rather than a central cloud layer running the AES, DES, and RSA algorithms.

Highlights

  • C LOUD computing, a paradigm of on-demand deliverybased computing services, runs through the internet

  • To minimize the anonymity security issue over hop-tohop mesh interconnections at the Internet of Things (IoT) end to end deliveries, we developed a blockchain-based security scheme for hierarchical-tree-based fog–IoT mesh architectures

  • If an intruder attacks an IoT device within the IoT network layer, the valuable information around the network might be in danger of being stalked

Read more

Summary

INTRODUCTION

C LOUD computing, a paradigm of on-demand deliverybased computing services, runs through the internet. The traditional and sophisticated (e.g., sensor networks) IoTs share and distribute data through mesh networks and cause delays (e.g., latencies towards the end to end communication) when there is an increased number of anonymous users. We contrived iterative building blocks to act as a continuous information run-time for our blockchain carrier over the mesh network or IoT nodes In this scheme, the building blocks are generated iteratively when needed to pass or process information but not overcome the One Time Session Password (OTSP) session (e.g., session-based delay for layer verification and validation) from fog–IoT and fog–cloud.

BACKGROUND
Methodology
COMPONENTS OF THE HIERARCHICAL FOG–IOT MESH TOPOLOGY AND DERIVED ARCHITECTURE
Step 1: Actor
Step 1
DERIVED MATHEMATICAL EQUATIONS FOR THE CONSTRUCTED PROCESSES
OUR NEW ALGORITHM AND THE DERIVED DEVELOPMENT PROCESS
EXPERIMENTAL RESEARCH AND SIMULATION
Findings
DISCUSSION
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.