Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing

Fog computing is a new distributed computing paradigm that extends the cloud to the network edge. Fog computing aims at improving quality of service, data access, networking, computation and storage. However, the security and privacy issues persist, even if many cloud solutions were proposed. Indeed, Fog computing introduces new challenges in terms of security and privacy, due to its specific features such as mobility, geo-distribution and heterogeneity etc. Blockchain is an emergent concept bringing efficiency in many fields. In this paper, we propose a new access control scheme based on blockchain technology for the fog computing with fault tolerance in the context of the Internet of Things. Blockchain is used to provide secure management authentication and access process to IoT devices. Each network entity authenticates in the blockchain via the wallet, which allows a secure communication in decentralized environment, hence it achieves the security objectives. In addition, we propose to establish a secure connection between the users and the IoT devices, if their attributes satisfy the policy stored in the blockchain by smart contract. We also address the blockchain transparency problem by the encryption of the users attributes both in the policy and in the request. An authorization token is generated if the encrypted attributes are identical. Moreover, our proposition offers higher scalability, availability and fault tolerance in Fog nodes due to the implementation of load balancing through the Min-Min algorithm.

[1]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[2]  Jean-Luc Baril,et al.  Blockchain based trust & authentication for decentralized sensor networks , 2017, ArXiv.

[3]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[4]  Khaled Salah,et al.  A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).

[5]  T. Venkat Narayana Rao,et al.  A Paradigm Shift from Cloud to Fog Computing , 2015 .

[6]  Alan Kai-Hau Yeung,et al.  Blockchain-Based Authentication in IoT Networks , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).

[7]  Rui Zhang,et al.  Security and Privacy on Blockchain , 2019, ACM Comput. Surv..

[8]  Raffaele Giaffreda,et al.  IoT and cloud convergence: Opportunities and challenges , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[9]  C ByersCharles,et al.  Fog Computing Distributing Data and Intelligence for Resiliency and Scale Necessary for IoT , 2015 .

[10]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[11]  S. Sumathy,et al.  Efficient Load Balancing Algorithm for Task Preprocessing in Fog Computing Environment , 2019 .

[12]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[13]  Wei Peng,et al.  A Blockchain-Based Authentication and Security Mechanism for IoT , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[14]  Bharadwaj Veeravalli,et al.  Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.

[15]  Mohsen Attaran,et al.  Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance , 2017, Journal of International Technology and Information Management.

[16]  François Gagnon,et al.  An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).

[17]  François Gagnon,et al.  Blockchain-Based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).

[18]  Yu Yang,et al.  Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.

[19]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[20]  Christophe Rosenberger,et al.  A Review on Authentication Methods , 2013 .

[21]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[22]  Sudip Misra,et al.  Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.