A4 Article in conference proceedings
A Security Framework for Fog Networks based on Role-Based Access Control and Trust Models

List of Authors: Hosseinpour Farhoud, Siddiqui Ali Shuja, Plosila Juha, Tenhunen Hannu
Publication year: 2018
Journal: Lecture Notes in Business Information Processing
Book title *: Research and Practical Issues of Enterprise Information Systems: 11th IFIP WG 8.9 Working Conference, CONFENIS 2017, Shanghai, China, October 18-20, 2017, Revised Selected Papers
Title of series: Lecture Notes in Business Information Processing
Volume number: 310
ISBN: 978-3-319-94844-7
eISBN: 978-3-319-94845-4


Fog networks have been introduced as a new intermediate computational layer between the cloud layer and the consumer layer in a typical cloud computing model. The fog layer takes advantage of distributed computing through tiny smart devices and access points. To enhance the performance of the fog layer we propose utilization of unused computational resources of surrounding smart devices in the fog layer. However, this will raise security concerns. To tackle this problem, we propose in this paper a novel method using a trust model and Role Based Access Control System to manage dynamically joining mobile fog nodes in a fog computing system. In our approach, the new dynamic nodes are assigned non-critical computing tasks. Their trust level is then evaluated based on the satisfaction rate of assigned tasks which is obtained through different computing parameters. As the result of this evaluation, untrusted nodes are dropped by the fog system and nodes with a higher trust level are given a new role and privileges to access and process categorized data.

Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.

Last updated on 2019-16-07 at 18:07