A non-cooperative differential game-based security model in fog computing

Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with QoS guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies.

[1]  Anuj Kumar,et al.  Fog in Comparison to Cloud: A Survey , 2015 .

[2]  Vladimir Stantchev,et al.  Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare , 2015 .

[3]  Hao Hu,et al.  Improving Web Sites Performance Using Edge Servers in Fog Computing Architecture , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.

[4]  Xianwei Zhou,et al.  Steiner tree based optimal resource caching scheme in fog computing , 2015 .

[5]  V. Anil Kumar,et al.  Fog Computing : Characteristics, Advantages and Security - Privacy , 2014 .

[6]  Hongke Zhang,et al.  An Optimization-Based Scheme for Efficient Virtual Machine Placement , 2013, International Journal of Parallel Programming.

[7]  Yu-Te Wang,et al.  Pervasive brain monitoring and data sharing based on multi-tier distributed computing and linked data technology , 2014, Front. Hum. Neurosci..

[8]  Mahadev Satyanarayanan,et al.  The case for cyber foraging , 2002, EW 10.

[9]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[10]  David W. K. Yeung,et al.  Dynamically Consistent Cooperative Solution in a Differential Game of Transboundary Industrial Pollution , 2007 .

[11]  Kurt Rothermel,et al.  MigCEP: operator migration for mobility driven distributed complex event processing , 2013, DEBS.

[12]  Liu Qian,et al.  Cooperative differential game for model energy-bandwidth efficiency tradeoff in the Internet of Things , 2014, China Communications.

[13]  David Lillethun,et al.  Mobile fog: a programming model for large-scale applications on the internet of things , 2013, MCC '13.

[14]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[15]  Osman Ghazali,et al.  Fog Computing: Will it be the Future of Cloud Computing? , 2014 .

[16]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.