Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks

The fog computing paradigm presents an extension of the cloud computing in order to more ensure the requirements of Internet of things (IoT). Hence, the growth of fog-IoT system and their openness to their socioeconomic environment has led to new needs in terms of security. There are many damages resulting from security breaches and violations. In order to address these challenges, this article proposes a novel framework to further enhance the data security and privacy and the system performance, for the IoT users trying to connect to fog network. In fact, a trust-based monitoring strategy is suggested to avoid system’s damages and attacks, and also to maintain low latency, because it is easier to avoid damage resulting from security breaches than to wait for a violation and to try to restore and repair the damage caused. The findings of our evaluation indicate that the proposed monitoring process is an efficient solution for system supervision, and detection and prevention attacks, with a fast processing time.

[1]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[2]  Jérôme François,et al.  A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).

[3]  Jose M. Alcaraz Calero,et al.  IaaSMon: Monitoring Architecture for Public Cloud Computing Data Centers , 2015, Journal of Grid Computing.

[4]  Mohammad S. Obaidat,et al.  SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[5]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[6]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[7]  Faouzi Zarai,et al.  A Model of Role-Risk Based Intrusion Prevention for Cloud Environment , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[8]  Mohammad S. Obaidat,et al.  A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments , 2018 .