Blockchain Expansion to secure Assets with Fog Node on special Duty

被引:13
作者
Gul, M. Junaid [1 ]
Rehman, Abdul [1 ]
Paul, Anand [1 ]
Rho, Seungmin [3 ]
Riaz, Rabia [2 ]
Kim, Jeonghong [1 ]
机构
[1] Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu, South Korea
[2] Univ Azad Jammu & Kashmir, Muzaffarabad, Pakistan
[3] Sejong Univ, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Blockchain; Fog; Cloud; DDoS; FNOSD (fog node on special duty); IoT; BIG DATA ANALYTICS; IOT APPLICATIONS; INTERNET; DDOS; CHALLENGES; PRIVACY; THINGS;
D O I
10.1007/s00500-020-04857-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Blockchain expansion is the high priority necessity to improve security. Hacking and other attacks are headway from system innovation and security measures for the cloud architecture. That is why the countermeasure deployed for such attacks should act in an opportune way and ought to be situated as close as possible to attacking device. As an example, DDoS attacks were not that complex as they are getting now with the new technology known as IoT. Imagine the consequences if 25 billion of IoT devices generate a huge amount of data for DDoS attacks. That is why we propose a new framework that can expand blockchain in a manner where more companies can share their resources to enhance security. So, we proposed a new and complete framework with cloud, fog, to secure configuration files with blockchain technology. Our framework considers the configuration files from SDN or NFV as an asset to secure with blockchain. By saving configuration files into blockchain, we can detect illegal changes occurred to configuration files after hacking attack. This study also focuses on expanding blockchain between the multiple service providers with ease to prevent waste of resources. This paper mainly provides opportunities for different could or companies to secure their assets by employing the power of blockchain and smart contracts.
引用
收藏
页码:15209 / 15221
页数:13
相关论文
共 31 条
[1]  
Agiwal M., 2016, IEEE COMMUN SURV TUT
[2]   The role of big data analytics in Internet of Things [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Hashem, Ibrahim Abaker Targio ;
Khan, Imran ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Imran, Muhammad ;
Vasilakos, Athanasios V. .
COMPUTER NETWORKS, 2017, 129 :459-471
[3]  
Alavian SA, 2008, INT J FUTUR GENER CO, V1, P15
[4]  
[Anonymous], 2017, IEEE INTERNET THINGS
[5]  
Arasteh H, 2016, 2016 IEEE 16 INT C E, P2, DOI 10.1109/EEEIC.2016.7555867
[6]   Big Data Analytics for Security [J].
Cardenas, Alvaro A. ;
Manadhata, Pratyusa K. ;
Rajan, Sreeranga P. .
IEEE SECURITY & PRIVACY, 2013, 11 (06) :74-76
[7]   A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions [J].
Godor, Gyozo ;
Jako, Zoltan ;
Knapp, Adam ;
Imre, Sandor .
COMPUTER NETWORKS, 2015, 76 :17-41
[8]  
Gul J., 2012, J COMPUTING, V4, P87
[9]  
Gupta B., 2016, Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
[10]  
Gupta B. B., 2019, Handbook of computer networks and cyber security: Principles and paradigms