193 Hits in 4.5 sec

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing.  ...  Moreover, the Blockchain-based solutions towards a secure Fog computing environment is presented and various research challenges and directions for future research are discussed.  ...  Access Control Models Access control is the best method to achieve preservation within the networks, devices, and systems.  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
To provide the required trust and privacy, we need to also focus on authentication, threats and access control mechanisms as well as techniques in Fog computing.  ...  We discuss the Blockchain-based solutions towards a secure Fog computing environment and presented various research challenges and directions for future research.  ...  [19] Smart home and Smart office Provides automation control in home to control the electrical appliances and security and alarm systems Electric- ity [20][21] Smart grid and Smart metering  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Attribute-Based Secure Data Sharing with Efficient Revocation in Fog Computing

Asma Alotaibi, Ahmed Barnawi, Mohammed Buhari
2017 Journal of Information Security  
We will address the security challenges of data sharing, such as fine-grained access control, data confidentiality, collusion resistance, scalability, and the issue of user revocation.  ...  This architecture sought to outperform the cloud-based architecture and to ensure further enhancements to system performance, especially from the perspective of security.  ...  The enforcement of fine-grained access control is achieved using (KP-ABE), which provides a flexible access structure for each user based on data attributes [9] .  ... 
doi:10.4236/jis.2017.83014 fatcat:r4vcotkvujf5pdzks4iyx5lhem

Fog Computing for Realizing Smart Neighborhoods in Smart Grids

Rituka Jaiswal, Reggie Davidrajuh, Chunming Rong
2020 Computers  
The smart grid, which ensures reliable, secure, and cost-effective power supply to the smart neighborhoods, effectively needs Fog Computing architecture to achieve its purpose.  ...  The challenges in the integration of Fog Computing and smart grids are also discussed.  ...  The smart home within smart grids promises energy-efficient controllable appliances and real-time access to energy usage data.  ... 
doi:10.3390/computers9030076 doaj:56a1bb6fa6584ded977208dc1be1f513 fatcat:tbs4p5paczam3bfoqkcpi7zwyy

Fog Computing for Smart Grids: Challenges and Solutions [article]

Linna Ruan, Shaoyong Guo, Xuesong Qiu, Rajkumar Buyya
2020 arXiv   pre-print
The use of Fog computing to empower the edge-side processing capability of Smart grid systems is considered as a potential solution to address the problem.  ...  In this chapter, we aim to offer a comprehensive analysis of application of Fog computing in Smart grids. We begin with an overview of Smart grids and Fog computing.  ...  [30] proposed an SDN-based data forwarding scheme for Fog-enabled Smart grids.  ... 
arXiv:2006.00812v3 fatcat:crujhzi3ebb47dleabpdtazxgq

Fog Computing: Security Challenges and Countermeasures

Zain Ashi, Mohammad Al-Fawa'reh, Mustafa Al-Fayoumi
2020 International Journal of Computer Applications  
solutions to reduce the security risks related to fog computing systems.  ...  Innovative technologies such as cloud computing systems provide global cooperative services for end users and medium-large companies.  ...  For instance, attackers can access sensitive information through smart TV remote controls if data is sent to the FN without encryption [14] .  ... 
doi:10.5120/ijca2020920648 fatcat:44hkdrgeivcnhlroorrl34zcbe

Digital Certificate Verification Scheme for Smart Grid Using Fog Computing (FONICA)

Shahid Mahmood, Moneeb Gohar, Jin-Ghoo Choi, Seok-Joo Koh, Hani Alquhayz, Murad Khan
2021 Sustainability  
The fog node can be used for this purpose with much better resources closer to the edge. Keeping the resources closer to the edge strengthen the security aspect of smart grid networks.  ...  Smart Grid (SG) infrastructure is an energy network connected with computer networks for communication over the internet and intranets.  ...  Various key management systems are discussed in [27] , which tells importance of key management system in achieving security services.  ... 
doi:10.3390/su13052549 fatcat:wj5s4i52ibbhpouuomewgljvru

IEEE Access Special Section Editorial: Communication and Fog/Edge Computing Toward Intelligent Connected Vehicles (ICVS)

Lei Shu, Junhui Zhao, Yi Gong, Changqing Luo, Tim Gordon
2021 IEEE Access  
Intelligent connected vehicles (ICVs) are usually expected to run a huge number of emerging smart applications (e.g., autonomous driving, safety early warning, natural language processing, etc.) for assisting  ...  This Special Section in IEEE Access focuses on innovative technologies and solutions enabled communication and edge computing toward ICVs.  ...  This article uses machine learning to achieve intelligent control of vehicles.  ... 
doi:10.1109/access.2021.3071260 doaj:3c15b73f232c41a199e81c178ee3a34d fatcat:c5xvpfeh3zf5fgyzkpzmdkw3jy

Access Control in Fog Computing: Challenges and Research Agenda

Mohammed Aleisa, Abdullah Abuhussein, Frederick T. Sheldon
2020 IEEE Access  
Access control (AC) is one of the essential prevention measures to protect data and services in computing environments.  ...  The selection of AC models for cloud-based IoT environments is highly dependent on the application requirements and how the AC models can impact the computation overhead.  ...  Smart cities and smart grids are examples of systems in which fog computing can be found between the smart devices and the cloud [2] , [3] .  ... 
doi:10.1109/access.2020.2992460 fatcat:ksl7yrz3anac7kyjyv3s7hvwiq

BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 Computers  
A robust identity-based capability token management strategy is proposed, which takes advantage of the smart contract for registration, propagation, and revocation of the access authorization.  ...  Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient  ...  Although a rule-based framework for role-based delegation and revocation was proposed [34] , the proposal cannot support Capability-based Access Control systems.  ... 
doi:10.3390/computers7030039 fatcat:gs5bc3ojmbexpb2lkhigisphza

A Lightweight Attribute-Based Security Scheme for Fog-Enabled Cyber Physical Systems

Aisha Kanwal Junejo, Nikos Komninos
2020 Wireless Communications and Mobile Computing  
In this paper, a lightweight attribute-based security scheme based on elliptic curve cryptography (ECC) is proposed for fog-enabled cyber physical systems (Fog-CPS).  ...  This is achieved by dividing the attributes into two sets, namely, secret and shared, and subsequently generating two key pairs, referred to as the partial and final key pairs, for each entity of the Fog-CPS  ...  In a smart grid system, there are several heterogeneous devices at different layers, so including access control mechanisms is crucial. Kocabas et al.  ... 
doi:10.1155/2020/2145829 doaj:64cc5e1f3b3746bd95efd91358cf751b fatcat:fj65myzoafa43jrdsmlkfevfju

Blockchain-Based Access Control Techniques for IoT Applications

Sarra Namane, Imed Ben Dhaou
2022 Electronics  
Additionally, it has great potential for managing access control requests.  ...  This paper proposed a blockchain-based access control taxonomy according to the access control nature: partially decentralized and fully decentralized.  ...  Some others combined smart contract technology with transactions to achieve an effective blockchain-based access control system.  ... 
doi:10.3390/electronics11142225 fatcat:gyubv3cxobepraatqtivh3j2pe

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
Different from traditional applications, IoT applications such as environmental monitoring, smart navigation and smart healthcare come with new requirements such as mobility, real-time response, and location  ...  Based on our literature survey, we highlight current open issues and propose future research directions.  ...  [42] also presented a privacy-preserving fog-assisted data aggregation scheme for smart grid by using differential privacy and secret sharing.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review

Neelam Saleem Khan, Mohammad Ahsan Chishti
2020 Scalable Computing : Practice and Experience  
Fog provides a platform for IoT along with other services like networking, storage and computing. With the tremendous expansion of IoT, security threats also arise.  ...  Furthermore this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT.  ...  Access control is enforced by rules in Blockchain. Accessibility The system allows the accessibility of control rules at any time.  ... 
doi:10.12694/scpe.v21i3.1782 fatcat:y76owz4t2ja3hgj6mka6scrzsa

Recent Security Trends in Internet of Things: a Comprehensive Survey

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous
2021 IEEE Access  
To provide a secure access control to IoT devices and data, Dorri et al. [78] proposed a blockchain-based architecture for IoT smart home system.  ...  [62] introduced the edge computing to achieve an effective access control for IoT networks.  ... 
doi:10.1109/access.2021.3103725 fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy
« Previous Showing results 1 — 15 out of 193 results