An approach for the secure management of hybrid cloud-edge environments

被引:40
作者
Celesti, Antonio [1 ]
Fazio, Maria [1 ]
Galletta, Antonino [1 ]
Carnevale, Lorenzo [1 ]
Wan, Jiafu [2 ]
Villari, Massimo [1 ]
机构
[1] Univ Messina, Dept Engn, Messina, Italy
[2] South China Univ Technol, Sch Mech & Automot Engn, Guangzhou, Guangdong, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 90卷
关键词
Cloud computing; Edge computing; Management; Communication; Security; PERSPECTIVE; SYSTEMS; FOG;
D O I
10.1016/j.future.2018.06.043
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Cloud-of-Things (CoT) paradigm is a challenging approach to manage loT applications exploiting Cloud resources and services. In order to avoid latency in Cloud-IoT communications, the management of time-sensitive services has to be moved to the edge of the CoT. To this aim, a secure Cloud-to-Edge environment for seamless management of IoT applications is necessary. The realization of a performing and secure Cloud-to-Edge middleware solution is a very strategic goal for future business CoT services. Thus, it needs to be deeply investigated, as highlighted by the Cloud Security Alliance (CSA). A valuable approach to develop an efficient Cloud-to-Edge system is based on an instant-message communication solution. In current Cloud environments, a Message Oriented Middleware (MOM) based on an Instant Message Protocol (IMP) provides good performance, but overlook security requirements. In this paper, we aim at overcoming such a gap following the CSA guidelines. In particular, we discuss the involved issues for improving such a kind of Cloud-to-Edge system in order to achieve data confidentiality, integrity, authenticity and non-repudiation. Moreover, we analyze a real case of study considering a MOM architectural model. Experimental results performed on a real testbed show how the introduced secure capabilities do not affect the overall performances of the whole middleware. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 22 条
[1]   Biometric Security Through Visual Encryption for Fog Edge Computing [J].
Abdul, Wadood ;
Ali, Zulfiqar ;
Ghouzali, Sanaa ;
Alfawaz, Budour ;
Muhammad, Ghulam ;
Hossain, M. Shamim .
IEEE ACCESS, 2017, 5 :5531-5538
[2]  
[Anonymous], 2016, XEP 0373 CURRENT JAB
[3]  
[Anonymous], SEC GUID CRIT AR FOC
[4]  
[Anonymous], 2007, OPENPGP MESSAGE FORM
[5]  
[Anonymous], 1321 RFC, P5
[6]  
[Anonymous], IEEE ACCESS
[7]  
Bertino E., 2009, IEEE DATA ENG B, V32, P21
[8]  
Celesti A., 2013, P 18 IEEE S COMP COM, P35
[9]  
Celesti A., 2017, SENSORS SWITZERLAND, V17, P1
[10]  
Celesti A, 2012, 2012 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), P827, DOI 10.1109/ISCC.2012.6249403