BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture

Fog computing complements cloud computing by removing several limitations, such as delays and network bandwidth. It emerged to support Internet of Things (IoT) applications wherein its computations and tasks are carried out at the network’s edge. Heterogeneous IoT devices interact with different users throughout a network. However, data security is a crucial concern for IoT, fog and cloud network ecosystems. Since the number of anonymous users increases and new identity disclosures occur within the IoTs, it is becoming challenging to grow mesh networks to deliver end to end communications, as the extended IoT networks resemble a mesh architecture. To reinforce data security over IoTs, we deploy a microservice-based blockchain mechanism for fogs, which works as a decentralized client-server network medium (i.e., secured end device-based communication). We implement a blockchain equipped security scheme to be used with a fog-IoT hierarchical tree-based overlay mesh architecture to address and develop the network performance issues. In this study, we consider encryption and decryption delays from IoT and fog-integrated parts to monitor data records and compare them through the developed security scheme. The blocks of a blockchain offer the desired execution results mainly in terms of the algorithmic efficiency, which correlates with the existing algorithms, namely the Advanced Encryption Standard (AES), the Rivest Shamir Adleman (RSA), and the Data Encryption Standard (DES). Our ‘BFIM’ scheme has an enhanced task scheduling capacity and a more efficient throughput than the AES, DES, RSA resource deliverables (i.e., tasks). Our comprehensive performance evaluation implies that the Blockchain-based Fog IoT Microservice (i.e., BFIM) architecture provides a task delivery efficiency of 78.79% (i.e., task deliverable) and a service delivery efficiency of 83.24% (i.e., task scheduling). The ‘BFIM’ also has an overall process delivery efficiency of 75% (i.e., time delay, throughput) in the fog layer, rather than a central cloud layer running the AES, DES, and RSA algorithms.

[1]  Haipeng Yao,et al.  Resource Trading in Blockchain-Based Industrial Internet of Things , 2019, IEEE Transactions on Industrial Informatics.

[2]  Nor Badrul Anuar,et al.  Cloud Service Selection Using Multicriteria Decision Analysis , 2014, TheScientificWorldJournal.

[3]  M. Shamim Hossain,et al.  A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.

[4]  Shau-Yin Tseng,et al.  Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[5]  Hiroki Watanabe,et al.  The Blockchain-Based Digital Content Distribution System , 2015, 2015 IEEE Fifth International Conference on Big Data and Cloud Computing.

[6]  J. Enrique Muñoz Expósito,et al.  Smart Containers Schedulers for Microservices Provision in Cloud-Fog-IoT Networks. Challenges and Opportunities , 2020, Sensors.

[7]  Md Whaiduzzaman,et al.  Credit Based Task Scheduling Process Management in Fog Computing , 2020, PACIS.

[8]  Dezhi Han,et al.  Fabric-iot: A Blockchain-Based Access Control System in IoT , 2020, IEEE Access.

[9]  Ivan Stojmenovic,et al.  An overview of Fog computing and its security issues , 2016, Concurr. Comput. Pract. Exp..

[10]  Abdullah Gani,et al.  A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.

[11]  Tu Peng,et al.  Implementation of High-Performance Blockchain Network Based on Cross-Chain Technology for IoT Applications , 2020, Sensors.

[12]  Jing He,et al.  Security in Fog Computing through Encryption , 2016 .

[13]  Ifeyinwa E. Achumba,et al.  Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology , 2017, J. Electr. Comput. Eng..

[14]  Antonio Ortega,et al.  Grasp: A matlab toolbox for graph signal processing , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[15]  Abdullah Gani,et al.  MobiCoRE: Mobile Device Based Cloudlet Resource Enhancement for Optimal Task Response , 2018, IEEE Transactions on Services Computing.

[16]  Agostino Cortesi,et al.  A Hierarchical and Abstraction-Based Blockchain Model , 2019, Applied Sciences.

[17]  Biswaraj Sen,et al.  Design and Simulation of Wireless Sensor Network in NS2 , 2015 .

[18]  Guojun Wang,et al.  Resource Management in a Peer to Peer Cloud Network for IoT , 2020, Wireless Personal Communications.

[19]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[20]  David Hutchison,et al.  Fog computing systems: State of the art, research issues and future trends, with a focus on resilience , 2020, J. Netw. Comput. Appl..

[21]  Matthias Dehmer,et al.  NETWORK COMPLEXITY MEASURES. AN INFORMATION-THEORETIC APPROACH , 2015 .

[22]  Rajkumar Buyya,et al.  A scheduling-based dynamic fog computing framework for augmenting resource utilization , 2021, Simul. Model. Pract. Theory.

[23]  Alexandru Stanciu,et al.  Blockchain Based Distributed Control System for Edge Computing , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[24]  Hector Zenil,et al.  A Review of Graph and Network Complexity from an Algorithmic Information Perspective , 2018, Entropy.

[25]  Md Torikur Rahman,et al.  Proposal for SZRP protocol with the establishment of the salted SHA-256 Bit HMAC PBKDF2 advance security system in a MANET , 2014, 2014 International Conference on Electrical Engineering and Information & Communication Technology.

[26]  Guisheng Fan,et al.  Contract-Based Resource Sharing for Time Effective Task Scheduling in Fog-Cloud Environment , 2020, IEEE Transactions on Network and Service Management.

[27]  Sachchidanand Singh,et al.  Blockchain: Future of financial and cyber security , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[28]  Alistair Barros,et al.  AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment , 2020, 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[29]  Madini O. Alassafi,et al.  Blockchain with Internet of Things: Benefits, Challenges, and Future Directions , 2018, International Journal of Intelligent Systems and Applications.

[30]  Shanto Roy,et al.  A RESTful E-Governance Application Framework for People Identity Verification in Cloud , 2018, CLOUD.

[31]  Kun Yang,et al.  Securing SDN-Controlled IoT Networks Through Edge Blockchain , 2021, IEEE Internet of Things Journal.

[32]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[33]  Simon Parkinson,et al.  Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.

[34]  Rajkumar Buyya,et al.  Network-centric performance analysis of runtime application migration in mobile cloud computing , 2015, Simul. Model. Pract. Theory.

[35]  Juan Boubeta-Puig,et al.  Real-Time Context-Aware Microservice Architecture for Predictive Analytics and Smart Decision-Making , 2019, IEEE Access.

[36]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[37]  Eklas Hossain,et al.  Authentication Protocol for Cloud Databases Using Blockchain Mechanism , 2019, Sensors.

[38]  R Kiran Kumar,et al.  A survey on conventional encryption algorithms of Cryptography , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[39]  Jims Marchang,et al.  IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN , 2020, IET Inf. Secur..

[40]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[41]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[42]  Arwa Alrawais,et al.  An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.

[43]  Wei-Meng Lee Implementing Your Own Blockchain Using Python , 2019 .

[44]  Prerna Mahajan,et al.  A Study of Encryption Algorithms AES, DES and RSA for Security , 2013 .

[45]  Roberto Baldoni,et al.  Blockchain-Based Database to Ensure Data Integrity in Cloud Computing Environments , 2017, ITASEC.

[46]  Erik Blasch,et al.  BlendMAS: A Blockchain-Enabled Decentralized Microservices Architecture for Smart Public Safety , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).

[47]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[48]  Md Whaiduzzaman,et al.  An Identity-Based Encryption Scheme for Data Security in Fog Computing , 2018, IJCCI.

[49]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..