Abstract

In this paper, we consider the issues of trustworthy computing for the dynamic IoT cloud. First, we introduce the vertical and horizontal computing structures in the extended IoT cloud where IoT devices, edge, fog, and cloud are integrated in a layered infrastructure. Then, we consider the issues and design a framework and accompanying mechanisms for performing trustworthy computing making use of the vertical IoT cloud structure to secure the IoT cloud in vertical and horizontal computation structures. Specifically, we discuss a general trustworthy computing pattern in the IoT cloud and use intrusion detection as an example to illustrate the idea, develop an advanced access control and policy definition model for highly dynamic IoT networks, and introduce an integrated data provenance and information control mechanism to assure the data integrity and secure the information flow for various computation patterns in the IoT cloud.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call