Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing

被引:12
作者
Wang, Tian [1 ]
Liang, Yuzhu [1 ]
Tian, Yujie [1 ]
Bhuiyan, Md Zakirul Alam [2 ]
Liu, Anfeng [3 ]
Asyhari, A. Taufiq [4 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Fujian, Peoples R China
[2] Fordham Univ, Dept Comp & Informat Sci, New York, NY 10458 USA
[3] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[4] Cranfield Univ, Ctr Elect Warfare Informat & Cyber, Def Acad UK, Shrivenham SN6 8LA, England
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2021年 / 6卷 / 01期
基金
中国国家自然科学基金;
关键词
Couplings; Resource management; Cloud computing; Edge computing; Wireless sensor networks; Task analysis; Security; Sensor-cloud; sustainable resource management; coupling problem; security problem; fog computing; SCHEDULING ALGORITHM; HUNGARIAN METHOD; ASSIGNMENT;
D O I
10.1109/TSUSC.2019.2904651
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modern societies are becoming increasingly reliance on inter-connected digital systems. Despite numerous benefits, it is important to overcome existing security problems in a highly inter-connected system, like Sensor-Cloud systems. Sensor-Cloud is the product of the integration of wireless sensor networks and cloud computing. However, when a physical sensor node receives multiple service commands simultaneously, there will be some service collisions, namely, coupling security problem. This coupling security problem may lead to the failure of sustainable services and the system security threat. In order to solve the problem, sustainable resource management and maximum resource utilization are important. In this paper, we extend the Kuhn-Munkres algorithm based on fog computing to achieve sustainability. To begin with, we design a buffer queue in fog computing layer which will return the result to the cloud layer directly to increase the resource utilization. Then, we extend the Kuhn-Munkres algorithm to get the initial assignments of resources. The last step is to determine whether the initial assigned resources can be further scheduled, which means that we further improve the resource utilization to realize sustainable resource management. The results demonstrate that our method outperforms the traditional scheduling methods, which decreases both of the rounds and computational costs of scheduling by 24.04-57.78 percent and 9.88-31.51 percent, respectively. The experimental evaluations proved that the performance of the proposed fog-based scheme can effectively solve coupling security problem for sustainable Sensor-Cloud systems.
引用
收藏
页码:43 / 53
页数:11
相关论文
共 50 条
  • [41] A Survey on Intrusion Detection Systems for Fog and Cloud Computing
    Chang, Victor
    Golightly, Lewis
    Modesti, Paolo
    Xu, Qianwen Ariel
    Doan, Le Minh Thao
    Hall, Karl
    Boddu, Sreeja
    FUTURE INTERNET, 2022, 14 (03):
  • [42] MODELING OF CYBER-PHYSICAL SYSTEMS AND DIGITAL TWIN BASED ON EDGE COMPUTING, FOG COMPUTING AND CLOUD COMPUTING TOWARDS SMART MANUFACTURING
    Qi, Qinglin
    Zhao, Dongming
    Liao, T. Warren
    Tao, Fei
    PROCEEDINGS OF THE ASME 13TH INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE, 2018, VOL 1, 2018,
  • [43] Reliablity and Security for Fog Computing Systems
    Shiriaev, Egor
    Ermakova, Tatiana
    Bezuglova, Ekaterina
    Lapina, Maria A.
    Babenko, Mikhail
    INFORMATION, 2024, 15 (06)
  • [44] A RISING COMPUTING PATTERN-CLOUD COMPUTING AND SECURITY PROBLEM
    Wang Yu-fen
    Guo Xiao-juan
    Cheng Ji-fu
    DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS, 2009, : 425 - 428
  • [45] An overview of cloud-fog computing: Architectures, applications with security challenges
    Kunal, Sourav
    Saha, Arijit
    Amin, Ruhul
    SECURITY AND PRIVACY, 2019, 2 (04)
  • [46] Functionality, privacy, security and rewarding based on fog assisted cloud computing techniques in Internet of Vehicles
    Alam, Intyaz
    Kumar, Sushil
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03) : 763 - 775
  • [47] Security Issues in Fog Computing using Vehicular Cloud
    Tiwari, Vipul
    Chaurasia, Brijesh Kumar
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [48] The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective
    Shirazi, Syed Noorulhassan
    Gouglidis, Antonios
    Farshad, Arsham
    Hutchison, David
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (11) : 2586 - 2595
  • [49] A Brief Review on Security in IoT Environments Based on Fog Computing Architecture
    Damerdji, Djennet Oudjedi
    Lehsaini, Mohamed
    Benmahdi, Meryem Bochra
    PROGRAM OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND AUTOMATIC CONTROL, ICEEAC 2024, 2024,
  • [50] Shuffled frog-leaping algorithm SFLA for solving Load Balancing Problem through Fog Computing in Cloud Servers
    Asvany, T.
    Amudhavel, J.
    Pothula, Sujatha
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 44 - 47