Policy-driven security management for fog computing: Preliminary framework and a case study

With the increasing user demand for elastic provisioning of resources coupled with ubiquitous and on-demand access to data, cloud computing has been recognized as an emerging technology to meet such dynamic user demands. In addition, with the introduction and rising use of mobile devices, the Internet of Things (IoT) has recently received considerable attention since the IoT has brought physical devices and connected them to the Internet, enabling each device to share data with surrounding devices and virtualized technologies in real-time. Consequently, the exploding data usage requires a new, innovative computing platform that can provide robust real-time data analytics and resource provisioning to clients. As a result, fog computing has recently been introduced to provide computation, storage and networking services between the end-users and traditional cloud computing data centers. This paper proposes a policy-based management of resources in fog computing, expanding the current fog computing platform to support secure collaboration and interoperability between different user-requested resources in fog computing.

[1]  Tim Moses,et al.  EXtensible Access Control Markup Language (XACML) version 1 , 2003 .

[2]  Gail-Joon Ahn,et al.  Towards Effective Security Policy Management for Heterogeneous Network Environments , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[3]  Zhengping Wu,et al.  Dynamic policy conflict analysis for collaborative web services , 2010, 2010 International Conference on Network and Service Management.

[4]  Gail-Joon Ahn,et al.  Detecting and Resolving Firewall Policy Anomalies , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Toni Anwar,et al.  Analysis of Adaptive Policy-Based Approach to Avoid Policy Conflicts , 2012, 2012 19th Asia-Pacific Software Engineering Conference.

[6]  H. Madsen,et al.  Reliability in the utility computing era: Towards reliable Fog computing , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[7]  Simon Y. Berkovich,et al.  Internet of Things as a Methodological Concept , 2013, 2013 Fourth International Conference on Computing for Geospatial Research and Application.

[8]  Carlos E. Rubio-Medrano,et al.  Supporting secure collaborations with attribute-based access control , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[9]  Gail-Joon Ahn,et al.  Discovery and Resolution of Anomalies in Web Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.

[10]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[11]  Ciprian Dobre,et al.  Big Data and Internet of Things: A Roadmap for Smart Environments , 2014, Big Data and Internet of Things.