Blockchain Expansion to secure Assets with Fog Node on special Duty

Blockchain expansion is the high priority necessity to improve security. Hacking and other attacks are headway from system innovation and security measures for the cloud architecture. That is why the countermeasure deployed for such attacks should act in an opportune way and ought to be situated as close as possible to attacking device. As an example, DDoS attacks were not that complex as they are getting now with the new technology known as IoT. Imagine the consequences if 25 billion of IoT devices generate a huge amount of data for DDoS attacks. That is why we propose a new framework that can expand blockchain in a manner where more companies can share their resources to enhance security. So, we proposed a new and complete framework with cloud, fog, to secure configuration files with blockchain technology. Our framework considers the configuration files from SDN or NFV as an asset to secure with blockchain. By saving configuration files into blockchain, we can detect illegal changes occurred to configuration files after hacking attack. This study also focuses on expanding blockchain between the multiple service providers with ease to prevent waste of resources. This paper mainly provides opportunities for different could or companies to secure their assets by employing the power of blockchain and smart contracts.

[1]  Reza Tadayoni,et al.  Cyber Security Threats to IoT Applications and Service Domains , 2017, Wireless Personal Communications.

[2]  Tao Xiaofeng,et al.  SDN based next generation Mobile Network with Service Slicing and trials , 2014, China Communications.

[3]  Prasad Calyam,et al.  Dolus: Cyber Defense using Pretense against DDoS Attacks in Cloud Platforms , 2018, ICDCN.

[4]  Manoj Singh Gaur,et al.  DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2017, Comput. Commun..

[5]  ChooKim-Kwang Raymond,et al.  Distributed denial of service (DDoS) resilience in cloud , 2016 .

[6]  Athanasios V. Vasilakos,et al.  The role of big data analytics in Internet of Things , 2017, Comput. Networks.

[7]  Sunghyun Choi,et al.  3GPP SA2 architecture and functions for 5G mobile communication system , 2017, ICT Express.

[8]  Brij B. Gupta,et al.  Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..

[9]  Yiliang Han,et al.  Secure data outsourcing scheme in cloud computing with attribute-based encryption , 2018, Int. J. High Perform. Comput. Netw..

[10]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[11]  Christopher Krügel,et al.  Demystifying DDoS as a Service , 2017, IEEE Communications Magazine.

[12]  Faisal Saeed,et al.  IoT-Based Intelligent Modeling of Smart Home Environment for Fire Prevention and Safety , 2018, J. Sens. Actuator Networks.

[13]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[14]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[15]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[16]  Salim Hariri,et al.  IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).

[17]  P. Siano,et al.  Iot-based smart cities: A survey , 2016, 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC).

[18]  Harry Timmermans,et al.  Understanding travellers’ preferences for different types of trip destination based on mobile internet usage data , 2018 .

[19]  Ling Li,et al.  Introduction: Advances in IoT research and applications , 2015, Inf. Syst. Frontiers.

[20]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[21]  Miltiadis D. Lytras,et al.  Enabling Technologies and Business Infrastructures for Next Generation Social Media: Big Data, Cloud Computing, Internet of Things and Virtual Reality , 2015, J. Univers. Comput. Sci..

[22]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[23]  Mohammed Ouzzif,et al.  A Novel Security Framework for Managing Android Permissions Using Blockchain Technology , 2018, Int. J. Cloud Appl. Comput..

[24]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[25]  Navrati Saxena,et al.  Next Generation 5G Wireless Networks: A Comprehensive Survey , 2016, IEEE Communications Surveys & Tutorials.

[26]  Dimitris Mourtzis,et al.  Industrial Big Data as a Result of IoT Adoption in Manufacturing , 2016 .

[27]  ImreSándor,et al.  A survey of handover management in LTE-based multi-tier femtocell networks , 2015 .

[28]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[29]  ContiMauro,et al.  DDoS attacks in cloud computing , 2016 .

[30]  Sándor Imre,et al.  A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions , 2015, Comput. Networks.

[31]  Oladayo Olufemi Olakanmi,et al.  An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms , 2019, Int. J. Cloud Appl. Comput..