Analysis of Security Access Control Systems in Fog Computing Environment

被引:0
作者
Zhang J. [1 ]
机构
[1] School of Information Technology, Guangdong Technology College, Guangdong, Zhaoqing
来源
Journal of Cyber Security and Mobility | 2023年 / 12卷 / 05期
关键词
control technology; cuckoo filter; Fog computing; secure access; structure hiding;
D O I
10.13052/jcsm2245-1439.1252
中图分类号
学科分类号
摘要
Fog computing is a computing environment that can respond to user operational needs in real time. Aiming at the shortcomings of user privacy protection performance and structural performance, a method of completely hiding access structures is proposed under the framework of cloud and mist computing. The cuckoo filter is applied to the fog computing environment, and users are detected through fog nodes. If an attribute is detected to exist in the fully hidden access structure, the mapping function between the attribute and the access structure line number is returned. The research results show that with the increase of the number of attributes, the advantage of attribute confirmation time for fog servers is gradually obvious; The overall delay of fog computing is shorter, the Time To Live (TTL) is longer, the average delay is only 3 ms, and the delay is lower; The completely hidden access structure constructed by the cuckoo algorithm occupies only 1% of the total system steps, which can more effectively achieve user privacy protection without increasing overhead. The proposed scheme greatly reduces the amount of computation while fully protecting user privacy, and meets the needs of users for fast and secure access. © 2023 River Publishers.
引用
收藏
页码:653 / 674
页数:21
相关论文
共 25 条
[1]  
Sabireen H, Neelanarayanan V., A review on fog computing: Architecture, fog with IoT, algorithms and research challenges, Ict Express, 7, 2, pp. 162-176, (2021)
[2]  
Rupa C, Patan R, Al-Turjman F, Mostarda L., Enhancing the access privacy of IDaaS system using SAML protocol in fog computing, IEEE Access, 8, pp. 168793-168801, (2020)
[3]  
Pallavi K N, Ravi Kumar V., Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment, Wireless Personal Communications, 116, pp. 3039-3060, (2021)
[4]  
Lei K, Du M, Huang J, Et al., Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing, IEEE Transactions on Services Computing, 13, 2, pp. 252-262, (2020)
[5]  
Singh J, Singh P, Gill S S., Fog computing: A taxonomy, systematic review, current trends and research challenges, Journal of Parallel and Distributed Computing, 157, pp. 56-85, (2021)
[6]  
Wang H, Liu T, Kim BG, Et al., Architectural design alternatives based on cloud/edge/fog computing for connected vehicles, IEEE Communications Surveys & Tutorials, 22, 4, pp. 2349-2377, (2020)
[7]  
Patwary A A N, Fu A, Battula S K, Naha R K, Garg S, Mahanti A., FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain, Computer Communications, 162, pp. 212-224, (2020)
[8]  
Taylor PJ, Dargahi T, Dehghantanha A, Et al., A systematic literature review of blockchain cyber security, Digital Communications and Networks, 6, 2, pp. 147-156, (2020)
[9]  
Cheng R, Scott W, Masserova E, Et al., Talek: Private group messaging with hidden access patterns, Annual Computer Security Applications Conference, pp. 84-99, (2020)
[10]  
Goudarzi M, Wu H, Palaniswami M, Et al., An application placement technique for concurrent IoT applications in edge and fog computing environments, IEEE Transactions on Mobile Computing, 20, 4, pp. 1298-1311, (2020)