A4 Refereed article in a conference publication

A Security Framework for Fog Networks based on Role-Based Access Control and Trust Models




AuthorsHosseinpour Farhoud, Siddiqui Ali Shuja, Plosila Juha, Tenhunen Hannu

EditorsA Min Tjoa, Li-Rong Zheng, Zhuo Zou, Maria Raffai, Li Da Xu, Niina Maarit Novak

Conference nameInternational Conference on Research and Practical Issues of Enterprise Information Systems

Publication year2018

JournalLecture Notes in Business Information Processing

Book title Research and Practical Issues of Enterprise Information Systems: 11th IFIP WG 8.9 Working Conference, CONFENIS 2017, Shanghai, China, October 18-20, 2017, Revised Selected Papers

Series titleLecture Notes in Business Information Processing

Volume310

First page 168

Last page180

ISBN978-3-319-94844-7

eISBN978-3-319-94845-4

DOIhttps://doi.org/10.1007/978-3-319-94845-4_15

Web address https://doi.org/10.1007/978-3-319-94845-4_15

Self-archived copy’s web addresshttps://research.utu.fi/converis/portal/detail/Publication/29122189


Abstract

Fog networks have been introduced as a new intermediate computational layer between the cloud layer and the consumer layer in a typical cloud computing model. The fog layer takes advantage of distributed computing through tiny smart devices and access points. To enhance the performance of the fog layer we propose utilization of unused computational resources of surrounding smart devices in the fog layer. However, this will raise security concerns. To tackle this problem, we propose in this paper a novel method using a trust model and Role Based Access Control System to manage dynamically joining mobile fog nodes in a fog computing system. In our approach, the new dynamic nodes are assigned non-critical computing tasks. Their trust level is then evaluated based on the satisfaction rate of assigned tasks which is obtained through different computing parameters. As the result of this evaluation, untrusted nodes are dropped by the fog system and nodes with a higher trust level are given a new role and privileges to access and process categorized data.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 11:06