Trust Management in Fog Computing

With the rise of fog computing, computation is moved away from a purely centralized approach. In the centralized approach devices have direct contact with the cloud servers. In fog computing allows for processing data along the path from the edge to the core of the network. The introduction of fog will have several benefits, such as reduced latency and increased reliability. The network topology changes continually in a fog computing network. New objects will join and leave. Since fog computing is a new field of study, there exists several open issues, one of them is how to establish trust. Trust is the level of assurance that an object will behave in a satisfactory manner. Trust can also be used to form autonomous collaboration. This thesis explores the need for trust management in fog computing. Through a literature review, specific tasks for trust management in fog computing have been identified. Trust can provide assistance in the decision making, and allow autonomous connections to be established between fog nodes and resource constrained IoT devices, called fog clients. Requirements for the trust in fog computing has also been defined. Additionally, misbehaving nodes can be detected in a network as well. By surveying existing solutions in other domains, requirements for trust is fog computing were defined. Based on these requirements a trust management solution for fog computing has been devised. Finally, two main open issues are identified and discussed.

[1]  S. Challa,et al.  Trust Management in Wireless Sensor Networks , 2007 .

[2]  Abderrazak Jemai,et al.  A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).

[3]  S. Buchegger,et al.  A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .

[4]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[5]  Pablo Chacin,et al.  A New Era for Cities with Fog Computing , 2017, IEEE Internet Computing.

[6]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[7]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[8]  Manju Khari,et al.  Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network , 2011 .

[9]  Gyu Myoung Lee,et al.  Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).

[10]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[11]  Ananthram Swami,et al.  LogitTrust : A Logit Regression-based Trust Model for Mobile Ad Hoc Networks , 2014 .

[12]  Michael I. Hill,et al.  Generalizeability of Latency Detection in a Variety of Virtual Environments , 2004 .

[13]  João H. Kleinschmidt,et al.  Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.

[14]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[15]  Samer Salam,et al.  Internet of Things From Hype to Reality , 2017 .

[16]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[17]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[18]  Hua Wang,et al.  Trust-Based Access Control for Privacy Protection in Collaborative Environment , 2009, 2009 IEEE International Conference on e-Business Engineering.

[19]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[20]  Li Ma,et al.  A hierarchical trust model for cluster-based wireless sensor network , 2015, 2015 International Conference on Control, Automation and Information Sciences (ICCAIS).

[21]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[22]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[23]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[24]  Peter Herrmann,et al.  How to Secure Internet of Things Devices in an Energy Efficient Way , 2017, ERCIM News.

[25]  Svein J. Knapskog,et al.  A metric for trusted systems , 1998 .

[26]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[27]  Mario Nemirovsky,et al.  Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[28]  Minming Ni,et al.  Seamless handover for high mobility environments , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).

[29]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[30]  Mahadev Satyanarayanan,et al.  Towards wearable cognitive assistance , 2014, MobiSys.

[31]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[32]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[33]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[34]  Luis Rodero-Merino,et al.  Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.

[35]  Hui Xia,et al.  Node Trust Assessment and Prediction in Mobile Ad Hoc Networks , 2015 .

[36]  Dongqi Fu,et al.  Blockchain-based trusted computing in social network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[37]  Alia I. Abdelmoty,et al.  Towards Location Privacy Awareness on Geo-Social Networks , 2016, 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).

[38]  Claudia Keser,et al.  Can We Manage Trust? , 2005, iTrust.

[39]  David Palma,et al.  Fog Computing in Healthcare–A Review and Discussion , 2017, IEEE Access.

[40]  Vipin Swarup,et al.  Trust: Benefits, Models, and Mechanisms , 2001, Secure Internet Programming.

[41]  Michael B. Lewis,et al.  Face Detection: Mapping Human Performance , 2003, Perception.

[42]  Karthik Thyagarajan Iyer Computational complexity of data mining algorithms used in fraud detection , 2015 .

[43]  Edna Dias Canedo,et al.  Trust model for private cloud , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[44]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.