A data protection model for fog computing

Cloud computing has established itself as an alternative IT infrastructure and service model. However, as with all logically centralized resource and service provisioning infrastructures, cloud does not handle well local issues involving a large number of networked elements (IoTs) and it is not responsive enough for many applications that require immediate attention of a local controller. Fog computing preserves many benefits of cloud computing and it is also in a good position to address these local and performance issues because its resources and specific services are virtualized and located at the edge of the customer premise. However, data security is a critical challenge in fog computing especially when fog nodes and their data move frequently in its environment. This paper addresses the data protection and the performance issues by 1) proposing a Region-Based Trust-Aware (RBTA) model for trust translation among fog nodes of regions, 2) introducing a Fog-based Privacy-aware Role Based Access Control (FPRBAC) for access control at fog nodes, and 3) developing a mobility management service to handle changes of users and fog devices' locations. The implementation results demonstrate the feasibility and the efficiency of our proposed framework.

[1]  Hao Liang,et al.  Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption , 2016, IEEE Internet of Things Journal.

[2]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[3]  Priyadarsi Nanda,et al.  Data Mobility Management Model for Active Data Cubes , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[4]  Doan B. Hoang,et al.  Challenge-response trust assessment model for personal space IoT , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[5]  Donghyun Kim,et al.  On security and privacy issues of fog computing supported Internet of Things environment , 2015, 2015 6th International Conference on the Network of the Future (NOF).

[6]  Haiying Shen,et al.  An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System , 2015, IEEE Transactions on Computers.

[7]  Songqing Chen,et al.  Help your mobile applications with fog computing , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking - Workshops (SECON Workshops).

[8]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[9]  Pascal Bouvry,et al.  Amazon Elastic Compute Cloud (EC2) vs. In-House HPC Platform: A Cost Analysis , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[10]  Marthony Taguinod,et al.  Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).

[11]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[12]  Jinjun Chen,et al.  Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.

[13]  Doan B. Hoang,et al.  Active data-centric framework for data protection in cloud environment , 2012 .