1. Fog computing network security based on resources management.
- Author
-
Daoud, Wided Ben, Othmen, Salwa, Hamdi, Monia, Khdhir, Radhia, and Hamam, Habib
- Subjects
- *
RESOURCE management , *DATA security , *TRUST , *ACCESS control , *COMPUTER network security , *INTERNET of things , *CLOUD computing - Abstract
Fog computing paradigm is designed as an extension of cloud computing due to the need for a supporting platform that is capable of providing the requirements of the Internet of Things (IoT). However, due to its features, fog obviously confronts numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations and breaches. Thus, to exceed these problems, we propose an efficient access control system, ameliorated with appropriate monitoring function and risk estimation to detect abnormal user's behavior and then deactivating illegitimate anomaly actions. Indeed, based on the risk value, we compute the trust level that will then be made into an access certificate, which would be provided to the user. This security certificate is used to authenticate and authorize users in case of re-connection in another time, without repeating the whole access control process from the beginning. Moreover, a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data security, privacy and resource management for IoT users. To demonstrate the efficiency, feasibility, and security of our proposed scheme, we perform an extensive simulation using Network Security Simulator (Nessi2). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF