Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach

被引:5
作者
Ayed, Dhouha [1 ]
Dragan, Paul-Andrei [2 ]
Felix, Edith [1 ]
Mann, Zoltan Adam [3 ]
Salant, Eliot [4 ]
Seidl, Robert [5 ]
Sidiropoulos, Anestis [6 ]
Taylor, Steve [7 ]
Vitorino, Ricardo [8 ]
机构
[1] Thales, Palaiseau, France
[2] Univ Duisburg Essen, Essen, Germany
[3] Univ Amsterdam, Amsterdam, Netherlands
[4] IBM Res, Haifa, Israel
[5] Nokia Bell Labs, Munich, Germany
[6] Athens Technol Ctr, Athens, Greece
[7] Univ Southampton, Southampton, Hants, England
[8] Ubiwhere, Aveiro, Portugal
来源
2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022) | 2022年
关键词
fog computing; edge computing; data protection; security; privacy; SECURITY; FOG;
D O I
10.1109/CCGrid54584.2022.00037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data produced by end devices like smartphones, sensors or IoT devices can be stored and processed across a continuum of compute resources, from end devices via fog nodes to the cloud, enabling reduced latency, increased processing speed and energy savings. However, the data may be sensitive (e.g., personal data or confidential commercially sensitive information), with regulatory or other requirements for its protection. Protecting sensitive data in the dynamic, heterogeneous, and decentralized cloud-to-edge continuum is very challenging. This paper describes a solution: FogProtect, an integrated set of four technologies to protect data in the cloud-to-edge continuum. FogProtect addresses four concerns: (i) control and enforcement of distributed data access and usage; (ii) management of distributed data protection policies; (iii) risk assessment for data assets in the cloud-to-edge continuum; (iv) automated optimisation and adaptation to address identified risks. FogProtect operates dynamically, reacting to system changes or detected vulnerabilities to keep the data secure across the cloud-to-edge continuum. This paper describes an overview of the FogProtect concept, discusses each of the four approaches, and illustrates their usage for the protection of data in three real-world use cases.
引用
收藏
页码:279 / 288
页数:10
相关论文
共 29 条
  • [1] Alebrahim Azadeh, 2015, International Journal of Secure Software Engineering, V6, P24, DOI 10.4018/ijsse.2015010102
  • [2] A Security Architecture for 5G Networks
    Arfaoul, Ghada
    Bisson, Pascal
    Blom, Rolf
    Borgaonkar, Ravishankar
    Englund, Hakan
    Felix, Edith
    Klaedtke, Felix
    Nakarmi, Prajwol Kumar
    Naslund, Mats
    O'Hanlon, Piers
    Papay, Juri
    Suomalainen, Jani
    Surridge, Mike
    Wary, Jean-Philippe
    Zahariev, Alexander
    [J]. IEEE ACCESS, 2018, 6 : 22466 - 22479
  • [3] Ayed D., 2021, ADV SERVICE ORIENTED, P179
  • [4] Specification of cloud topologies and orchestration using TOSCA: a survey
    Bellendorf, Julian
    Mann, Zoltan Adam
    [J]. COMPUTING, 2020, 102 (08) : 1793 - 1815
  • [5] Models@run.time: a guided tour of the state of the art and research challenges
    Bencomo, Nelly
    Goetz, Sebastian
    Song, Hui
    [J]. SOFTWARE AND SYSTEMS MODELING, 2019, 18 (05) : 3049 - 3082
  • [6] ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-assuring, Hybrid Ecosystem for REsilient cloud computing
    Brasileiro, Francisco
    Brito, Andrey
    Blanquer, Ignacio
    [J]. 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 51 - 52
  • [7] Dsouza C, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P16, DOI 10.1109/IRI.2014.7051866
  • [8] Duflos S, 2002, LECT NOTES COMPUT SC, V2506, P157
  • [9] Gol N. Mohammadi, 2015, P CAISE FOR, P237
  • [10] Hagen E., 2008, PROC NORSK INFORMASJ