On the Applicability of Secret Share Algorithms for Osmotic Computing

Osmotic Computing (OC) is an innovative computation paradigm that runs services on Cloud, Edge, and Internet of Things (IoT) resources based on their workload. Services are encapsulated in container images stored into a central repository on the Cloud. OC suffers from privacy and security issues, for example, hackers could attack the repository and download all container images. Furthermore, network latency could delay the deployment of services in Edge nodes. A possible solution to solve such problems is to employ Secret Share techniques to split the images of services into chunks and distribute them among Edge devices. This work aims at assessing the applicability of these techniques for OC employing the Redundant Residue Number System (RRNS) to split and store Micro-Elements (MELs). We made our analyses for different OC scenarios composed of 10, 100 and 1000 nodes running 1000 MELs each. Furthermore, we considered several degrees of redundancy from 0 to 7. From experimental analyses, we found that the reliability of the system increase with the increasing of the redundancy but the security decreases.

[1]  K Praveen,et al.  PUF Authentication using Visual Secret Sharing Scheme , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[2]  Hidema Tanaka,et al.  Verifiable Secret Sharing Scheme Using Hash Values , 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW).

[3]  Antonio Celesti,et al.  An approach to share MRI data over the Cloud preserving patients' privacy , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[4]  Rajiv Ranjan,et al.  Osmotic Message-Oriented Middleware for the Internet of Things , 2018, IEEE Cloud Computing.

[5]  Shi-Jinn Horng,et al.  Modified Generalized Random Grids-Based Progressive Secret Sharing with Lossless Ability for Binary Image , 2018, 2018 International Conference on Computer, Control, Informatics and its Applications (IC3INA).

[6]  Guoming Tang,et al.  A Survey on Edge Computing Systems and Tools , 2019, Proceedings of the IEEE.

[7]  Rajiv Ranjan,et al.  Software Defined Membrane: Policy-Driven Edge and Internet of Things Security , 2017, IEEE Cloud Computing.

[8]  Javid Taheri,et al.  On the Applicability of Secret Share Algorithms for Saving Data on IoT, Edge and Cloud Devices , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[9]  Maria Fazio,et al.  Towards Hybrid Multi-Cloud Storage Systems: Understanding How to Perform Data Transfer , 2019, Big Data Research.

[10]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  Alberto Pacheco,et al.  A Smart Classroom Based on Deep Learning and Osmotic IoT Computing , 2018, 2018 Congreso Internacional de Innovación y Tendencias en Ingeniería (CONIITI).

[12]  Emmanuel Oyekanlu,et al.  Osmotic Collaborative Computing for Machine Learning and Cybersecurity Applications in Industrial IoT Networks and Cyber Physical Systems with Gaussian Mixture Models , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).

[13]  Rajiv Ranjan,et al.  Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.

[14]  Ashvini Kamble,et al.  IOT based Patient Health Monitoring System with Nested Cloud Security , 2018, 2018 4th International Conference on Computing Communication and Automation (ICCCA).

[15]  Rhoda C. Joseph Data Breaches: Public Sector Perspectives , 2018, IT Professional.

[16]  Antonella Longo,et al.  Urban Pollution Monitoring Based on Mobile Crowd Sensing: An Osmotic Computing Approach , 2018, 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC).

[17]  Prem Prakash Jayaraman,et al.  Osmotic Monitoring of Microservices between the Edge and Cloud , 2018, 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Rajiv Ranjan,et al.  Using Osmotic Services Composition for Dynamic Load Balancing of Smart City Applications , 2018, 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA).

[20]  Nicola Dragoni,et al.  Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog , 2019, IEEE Access.

[21]  Shyong Jian Shyu,et al.  Implementing Secret Sharing Scheme in Parallel , 2018, 2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN).

[22]  Lior Rokach,et al.  A Survey of Data Leakage Detection and Prevention Solutions , 2012, SpringerBriefs in Computer Science.

[23]  Ilsun You,et al.  Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing , 2017, IEEE Access.

[24]  R. W. Watson,et al.  Self-checked computation using residue arithmetic , 1966 .

[25]  Basem E. Elnaghi,et al.  Osmotic Bio-Inspired Load Balancing Algorithm in Cloud Computing , 2019, IEEE Access.