Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach

被引:5
作者
Ayed, Dhouha [1 ]
Dragan, Paul-Andrei [2 ]
Felix, Edith [1 ]
Mann, Zoltan Adam [3 ]
Salant, Eliot [4 ]
Seidl, Robert [5 ]
Sidiropoulos, Anestis [6 ]
Taylor, Steve [7 ]
Vitorino, Ricardo [8 ]
机构
[1] Thales, Palaiseau, France
[2] Univ Duisburg Essen, Essen, Germany
[3] Univ Amsterdam, Amsterdam, Netherlands
[4] IBM Res, Haifa, Israel
[5] Nokia Bell Labs, Munich, Germany
[6] Athens Technol Ctr, Athens, Greece
[7] Univ Southampton, Southampton, Hants, England
[8] Ubiwhere, Aveiro, Portugal
来源
2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022) | 2022年
关键词
fog computing; edge computing; data protection; security; privacy; SECURITY; FOG;
D O I
10.1109/CCGrid54584.2022.00037
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data produced by end devices like smartphones, sensors or IoT devices can be stored and processed across a continuum of compute resources, from end devices via fog nodes to the cloud, enabling reduced latency, increased processing speed and energy savings. However, the data may be sensitive (e.g., personal data or confidential commercially sensitive information), with regulatory or other requirements for its protection. Protecting sensitive data in the dynamic, heterogeneous, and decentralized cloud-to-edge continuum is very challenging. This paper describes a solution: FogProtect, an integrated set of four technologies to protect data in the cloud-to-edge continuum. FogProtect addresses four concerns: (i) control and enforcement of distributed data access and usage; (ii) management of distributed data protection policies; (iii) risk assessment for data assets in the cloud-to-edge continuum; (iv) automated optimisation and adaptation to address identified risks. FogProtect operates dynamically, reacting to system changes or detected vulnerabilities to keep the data secure across the cloud-to-edge continuum. This paper describes an overview of the FogProtect concept, discusses each of the four approaches, and illustrates their usage for the protection of data in three real-world use cases.
引用
收藏
页码:279 / 288
页数:10
相关论文
共 29 条
[1]  
Alebrahim Azadeh, 2015, International Journal of Secure Software Engineering, V6, P24, DOI 10.4018/ijsse.2015010102
[2]   A Security Architecture for 5G Networks [J].
Arfaoul, Ghada ;
Bisson, Pascal ;
Blom, Rolf ;
Borgaonkar, Ravishankar ;
Englund, Hakan ;
Felix, Edith ;
Klaedtke, Felix ;
Nakarmi, Prajwol Kumar ;
Naslund, Mats ;
O'Hanlon, Piers ;
Papay, Juri ;
Suomalainen, Jani ;
Surridge, Mike ;
Wary, Jean-Philippe ;
Zahariev, Alexander .
IEEE ACCESS, 2018, 6 :22466-22479
[3]  
Ayed Dhouha, 2021, Advances in Service-Oriented and Cloud Computing: International Workshops of ESOCC 2020. Communications in Computer and Information Science (1360), P179, DOI 10.1007/978-3-030-71906-7_17
[4]   Specification of cloud topologies and orchestration using TOSCA: a survey [J].
Bellendorf, Julian ;
Mann, Zoltan Adam .
COMPUTING, 2020, 102 (08) :1793-1815
[5]   Models@run.time: a guided tour of the state of the art and research challenges [J].
Bencomo, Nelly ;
Goetz, Sebastian ;
Song, Hui .
SOFTWARE AND SYSTEMS MODELING, 2019, 18 (05) :3049-3082
[6]   ATMOSPHERE: Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-assuring, Hybrid Ecosystem for REsilient cloud computing [J].
Brasileiro, Francisco ;
Brito, Andrey ;
Blanquer, Ignacio .
2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, :51-52
[7]  
Dsouza C, 2014, 2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), P16, DOI 10.1109/IRI.2014.7051866
[8]  
Duflos S, 2002, LECT NOTES COMPUT SC, V2506, P157
[9]  
Gol N. Mohammadi, 2015, P CAISE FOR, P237
[10]  
Hagen E., 2008, PROC NORSK INFORMASJ