A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks

Caching content with fog computing at the edge nodes has been a promising alternative to mitigate burdens of backbone networks and improve mobile users’ quality of experience in mobile social networks (MSNs). However, as edge node may be vulnerable due to the attacks from malicious users, the design of secure caching schemes for the fog/edge enabled MSNs becomes a new challenge. In this paper, to tackle the above problem, we propose a secure caching scheme for disaster backup in MSNs with fog computing. Specifically, to protect the privacy, a partitioning and scrambling method is first designed to encrypt the contents. Then, the encrypted contents are replicated to multiple replicates, where these replicates are delivered and stored in different servers. Based on the recovery time objective and content delivery latency, an auction game model is developed to determine the optimal servers, where both edge nodes and cloud servers can obtain the maximum utilities. Extensive simulations are conducted to show the effectiveness and reliability of the proposed scheme.

[1]  Qing Ling,et al.  Evacuate Before Too Late: Distributed Backup in Inter-DC Networks with Progressive Disasters , 2018, IEEE Transactions on Parallel and Distributed Systems.

[2]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[3]  Yan Zhang,et al.  A Reinforcement Learning-Based Data Storage Scheme for Vehicular Ad Hoc Networks , 2017, IEEE Transactions on Vehicular Technology.

[4]  Jia Yu,et al.  Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Qinghua Zheng,et al.  Secure Content Delivery With Edge Nodes to Save Caching Resources for Mobile Users in Green Cities , 2018, IEEE Transactions on Industrial Informatics.

[6]  Anfeng Liu,et al.  Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things , 2018, Wirel. Commun. Mob. Comput..

[7]  Zhou Su,et al.  An Edge Caching Scheme to Distribute Content in Vehicular Networks , 2018, IEEE Transactions on Vehicular Technology.

[8]  Hua Wang,et al.  Receiving-Capacity-Constrained Rapid and Fair Disaster Backup for multiple datacenters in SDN , 2017, 2017 IEEE International Conference on Communications (ICC).

[9]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[10]  Victor C. M. Leung,et al.  A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.

[11]  Song Guo,et al.  Engineering a Game Theoretic Access for Urban Vehicular Networks , 2017, IEEE Transactions on Vehicular Technology.

[12]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[13]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[14]  Zhou Su,et al.  Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint , 2017, IEEE Access.

[15]  Zhou Su,et al.  Edge Caching for Layered Video Contents in Mobile Social Networks , 2017, IEEE Transactions on Multimedia.

[16]  Song Guo,et al.  A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.

[17]  Rose Qingyang Hu,et al.  Scalable Distributed Communication Architectures to Support Advanced Metering Infrastructure in Smart Grid , 2012, IEEE Transactions on Parallel and Distributed Systems.

[18]  Min Sheng,et al.  Learning-Based Content Caching and Sharing for Wireless Networks , 2017, IEEE Transactions on Communications.

[19]  Song Guo,et al.  Incentive Scheme for Cyber Physical Social Systems Based on User Behaviors , 2020, IEEE Transactions on Emerging Topics in Computing.

[20]  Ping Wang,et al.  On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices , 2018, IEEE Systems Journal.

[21]  Hongyi Wu,et al.  Incentive Mechanisms for Data Dissemination in Autonomous Mobile Social Networks , 2017, IEEE Transactions on Mobile Computing.

[22]  F. Richard Yu,et al.  Enhancing QoE-Aware Wireless Edge Caching With Software-Defined Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[23]  Xiaofei Wang,et al.  Collaborative Multi-Tier Caching in Heterogeneous Networks: Modeling, Analysis, and Design , 2017, IEEE Transactions on Wireless Communications.

[24]  Zhetao Li,et al.  Context-aware collect data with energy efficient in Cyber-physical cloud systems , 2017, Future Gener. Comput. Syst..

[25]  Xiaoying Gan,et al.  Analytical model with a novel selfishness division of mobile nodes to participate cooperation , 2016, Peer-to-Peer Netw. Appl..

[26]  Jin Li,et al.  Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.

[27]  Nāgārjuna,et al.  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding , 2014 .

[28]  Qichao Xu,et al.  Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution , 2017, IEEE Transactions on Big Data.

[29]  Zhigang Chen,et al.  Energy-Harvesting-Aided Spectrum Sensing and Data Transmission in Heterogeneous Cognitive Radio Sensor Network , 2016, IEEE Transactions on Vehicular Technology.

[30]  Heekuck Oh,et al.  PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks , 2016, IEEE Access.

[31]  Mohsen Guizani,et al.  A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.

[32]  Zhenyu Zhou,et al.  Social Network-Based Content Delivery in Device-to-Device Underlay Cellular Networks Using Matching Theory , 2017, IEEE Access.

[33]  Meixia Tao,et al.  Optimal dynamic multicast scheduling for cache-enabled content-centric wireless networks , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[34]  Xiao Liu,et al.  Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things , 2018, EURASIP J. Wirel. Commun. Netw..

[35]  Xuemin Shen,et al.  Wi-Fi Hotspot at Signalized Intersection: Cost-Effectiveness for Vehicular Internet Access , 2016, IEEE Transactions on Vehicular Technology.

[36]  Jeffrey G. Andrews,et al.  Spatially Correlated Content Caching for Device-to-Device Communications , 2016, IEEE Transactions on Wireless Communications.

[37]  Jie Wu,et al.  Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms , 2016, IEEE Transactions on Vehicular Technology.

[38]  Yuxin Liu,et al.  Construction of Large-Scale Low-Cost Delivery Infrastructure Using Vehicular Networks , 2018, IEEE Access.

[39]  Xiao Liu,et al.  A Time and Location Correlation Incentive Scheme for Deep Data Gathering in Crowdsourcing Networks , 2018, Wirel. Commun. Mob. Comput..

[40]  Xiaofeng Tao,et al.  Mobile Edge Computing Enhanced Adaptive Bitrate Video Delivery With Joint Cache and Radio Resource Allocation , 2017, IEEE Access.