A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface

Interconnection and intercommunication between people, processes, and things have been enhanced with the development of the Internet of Things (IoT) and extended with fog computing for better efficiency. Fog computing improves the network services and circumvents the problem of escalated data management as an interface between cloud and terminal with the requirement of secure data transmission. In this article, a novel security framework is designed for fog computing intended for improving the security of IoT. This framework uses single point of aggregation from fog interface and lattice cryptographic approach to establish the security for the services. Azure cloud platform and Sage lattice cryptographic base have been employed to evaluate the performance of the framework. It is noticed that the Level 1-Level 2 (L1–L2) cache implementation in the system significantly improves the efficiency of the framework. The results show that the proposed framework is robust in preventing attacks on fog nodes and additionally provides an advantage for low communication overhead.

[1]  Tie Qiu,et al.  A Local-Optimization Emergency Scheduling Scheme With Self-Recovery for a Smart Grid , 2017, IEEE Transactions on Industrial Informatics.

[2]  Man Ho Au,et al.  Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..

[3]  Martin R. Albrecht,et al.  Large Modulus Ring-LWE ≥ Module-LWE , 2017, ASIACRYPT.

[4]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[5]  François Gérard,et al.  SETLA: Signature and Encryption from Lattices , 2018, CANS.

[6]  Chris Peikert,et al.  Lattice Cryptography for the Internet , 2014, PQCrypto.

[7]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[8]  Vahid Ashktorab,et al.  Security Threats and Countermeasures in Cloud Computing , 2016 .

[9]  Junbeom Hur,et al.  Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing , 2018, Future Gener. Comput. Syst..

[10]  Nadeem Javaid,et al.  Fog Computing Over IoT: A Secure Deployment and Formal Verification , 2017, IEEE Access.

[11]  Andrews Jeyaraj,et al.  Recent security challenges in cloud computing , 2018, Comput. Electr. Eng..

[12]  Songqing Chen,et al.  FAST: A fog computing assisted distributed analytics system to monitor fall for stroke mitigation , 2015, 2015 IEEE International Conference on Networking, Architecture and Storage (NAS).

[13]  Hongwei Liu,et al.  An efficient access control scheme with outsourcing capability and attribute update for fog computing , 2018, Future Gener. Comput. Syst..

[14]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[15]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[16]  Tal Rabin,et al.  Security for Signcryption: The Two-User Model , 2010, Practical Signcryption.

[17]  Wenbin Yao,et al.  Efficient Lattice-Based Signcryption in Standard Model , 2013 .

[18]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[19]  Marco R. Spruit,et al.  Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study , 2012, J. Univers. Comput. Sci..

[20]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[21]  Vladimir Stantchev,et al.  Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare , 2015 .

[22]  Issa M. Khalil,et al.  Cloud Computing Security: A Survey , 2014, Comput..

[23]  W. Gareth J. Howells,et al.  Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.

[24]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[25]  Tie Qiu,et al.  Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..

[26]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[27]  Brij B. Gupta,et al.  Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..

[28]  Gareth Howells,et al.  Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007 .

[29]  Jianhua Ma,et al.  Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology , 2016, Future Gener. Comput. Syst..

[30]  Josep Domingo-Ferrer,et al.  Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..

[31]  Prasad Calyam,et al.  Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..

[32]  Min Chen,et al.  On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.

[33]  Nan Zhang,et al.  A security mechanism based on evolutionary game in fog computing , 2017, Saudi journal of biological sciences.

[34]  P. Herbert Raj,et al.  Exploring Data Security Issues and Solutions in Cloud Computing , 2018 .

[35]  Athanasios V. Vasilakos,et al.  Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..

[36]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[37]  Chirine Ghedira,et al.  Cloud computing security taxonomy: From an atomistic to a holistic view , 2020, Future Gener. Comput. Syst..

[38]  Mugen Peng,et al.  Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.

[39]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[40]  Eui-Nam Huh,et al.  Fog Computing: The Cloud-IoT\/IoE Middleware Paradigm , 2016, IEEE Potentials.

[41]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[42]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[43]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[44]  Tie Qiu,et al.  EABS: An Event-Aware Backpressure Scheduling Scheme for Emergency Internet of Things , 2018, IEEE Transactions on Mobile Computing.

[45]  Jiangtao Li,et al.  Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing , 2018, IEEE Access.

[46]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[47]  Zhu Han,et al.  Fog computing in multi-tier data center networks: A hierarchical game approach , 2016, 2016 IEEE International Conference on Communications (ICC).

[48]  Jiguo Yu,et al.  Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks , 2017, IEEE Transactions on Vehicular Technology.

[49]  Rahul Saha,et al.  Symmetric random function generator (SRFG): A novel cryptographic primitive for designing fast and robust algorithms , 2017 .

[50]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[51]  Yogesh L. Simmhan,et al.  Demystifying Fog Computing: Characterizing Architectures, Applications and Abstractions , 2017, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC).

[52]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..