Abstract

In the Cloud-Fog computing infrastructure, the Fog layer is located between the end device and the cloud and this improves efficiency by performing local tasks at Fog layer. A number of security algorithms and cryptographic tools are used to provide confidentiality and protect the data from untrustworthy users and adversaries. Due to the large number of end devices connecting to the fog node, tracking the source of the malicious activity and revoking access to the services provided by the fog node become a tedious task. We extend the existing Fine-Grained Bilateral Access Control system to provide traceability and revocability by introducing a central authority in each fog node. The central authority is a fully trusted entity that monitors the communication channel between the end node and the fog node. It detects anomalies in the data traffic to identify various attacks and malicious nodes. The proposed approach has been implemented using iFog simulator.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call