A4 Vertaisarvioitu artikkeli konferenssijulkaisussa

A Security Framework for Fog Networks based on Role-Based Access Control and Trust Models




TekijätHosseinpour Farhoud, Siddiqui Ali Shuja, Plosila Juha, Tenhunen Hannu

ToimittajaA Min Tjoa, Li-Rong Zheng, Zhuo Zou, Maria Raffai, Li Da Xu, Niina Maarit Novak

Konferenssin vakiintunut nimiInternational Conference on Research and Practical Issues of Enterprise Information Systems

Julkaisuvuosi2018

JournalLecture Notes in Business Information Processing

Kokoomateoksen nimiResearch and Practical Issues of Enterprise Information Systems: 11th IFIP WG 8.9 Working Conference, CONFENIS 2017, Shanghai, China, October 18-20, 2017, Revised Selected Papers

Sarjan nimiLecture Notes in Business Information Processing

Vuosikerta310

Aloitussivu168

Lopetussivu180

ISBN978-3-319-94844-7

eISBN978-3-319-94845-4

DOIhttps://doi.org/10.1007/978-3-319-94845-4_15

Verkko-osoitehttps://doi.org/10.1007/978-3-319-94845-4_15

Rinnakkaistallenteen osoitehttps://research.utu.fi/converis/portal/detail/Publication/29122189


Tiivistelmä

Fog networks have been introduced as a new intermediate computational layer between the cloud layer and the consumer layer in a typical cloud computing model. The fog layer takes advantage of distributed computing through tiny smart devices and access points. To enhance the performance of the fog layer we propose utilization of unused computational resources of surrounding smart devices in the fog layer. However, this will raise security concerns. To tackle this problem, we propose in this paper a novel method using a trust model and Role Based Access Control System to manage dynamically joining mobile fog nodes in a fog computing system. In our approach, the new dynamic nodes are assigned non-critical computing tasks. Their trust level is then evaluated based on the satisfaction rate of assigned tasks which is obtained through different computing parameters. As the result of this evaluation, untrusted nodes are dropped by the fog system and nodes with a higher trust level are given a new role and privileges to access and process categorized data.


Ladattava julkaisu

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 11:06