Abstract

Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog based fifth generation mobile communication (5G) system is challenged by the need for data sharing security. In fact, without properly securing access to Fog node resources in IoT network, services providers may not be able to achieve the desired performance. Indeed, fog computing obviously confront numerous security and privacy risks, due to its features, such as huge scale geolocation, heterogeneity and mobility. Thus, we propose a security model that is based on cooperation between IoT and fog. This model integrates an efficient access control process associated with a monitoring scheme to ensure secure cooperation between diverse resources and different operational parts. Indeed, a comprehensive scheduling process and resource allocation mechanism using our security model is proposed to improve the intended performance of the system. In fact, our main contribution is to introduce a distributed access control based on security resource management framework for fog-IoT networks, and proactive security scheme under ultra-trustworthiness and low-latency constraints. After evaluation based on iFogSim, we have proved that our scheme not only provides low latency with high security and privacy, but also reduces the complexity of administration and management of security and resources mechanisms.

Highlights

  • Despite the fact that cloud computing is an effective solution for handling data in distributed environments, it is considered as an appropriate way to efficiently process the mass data generated by Internet of Thing (IoT) devices [1]

  • Evaluation results and discussions To evaluate Trust access control and resource management mechanism (TACRM) scheme, we propose to implement it on the case of the architecture shown in Fig. 7, where we assume that we have 10 users who want to access to the fog network, and where RA designates Resource Available in that FN

  • As illustrated in the proposed architecture, resources are allocated to users based on resources available as in following; U2 is served from FN1; U1 is served from FN2; U3 is served from FN2, because, FN2 still have resource available

Read more

Summary

Introduction

Despite the fact that cloud computing is an effective solution for handling data in distributed environments, it is considered as an appropriate way to efficiently process the mass data generated by IoT devices [1]. The design of a combined wireless fog-cloud computing approach based IoT network becomes essential for network control security and resource management. For the purpose of improving fog network performance and reducing cost, the authors of [18] proposed a task scheduling algorithm based on priority levels. They ensure that the communication between fog nodes in the fog layer can lead to efficient resource allocation and load balancing. The proposed TACRM is a security access control scheme based on trust assessment and monitoring user’s activities, where a resource management strategy in integrated wireless fog in IoT networks is applied to improve the resource utilization and reduce the transmission latency. | Extension-header ; Content-length: It contains information about the resource allowed by the cluster head, after the achievement of the scheduling and the resource allocation procedures, based on the resources available in the system

Monitoring process
Resource management
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call