A novel trust mechanism based on Fog Computing in Sensor-Cloud System

被引:118
作者
Wang, Tian [1 ,2 ]
Zhang, Guangxue [1 ]
Bhuiyan, Md Zakirul Alam [3 ]
Liu, Anfeng [4 ]
Jia, Weijia [5 ]
Xie, Mande [6 ]
机构
[1] Huaqiao Univ, Coll Comp Sci & Technol, Xiamen, Fujian, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou, Guangdong, Peoples R China
[3] Fordham Univ, Dept Comp & Informat Sci, Bronx, NY 10458 USA
[4] Cent South Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
[5] Univ Macau, Data Sci Ctr, Macau, Peoples R China
[6] Zhejiang Gongshang Univ, Sch Comp Sci & Informat Engn, Hangzhou, Zhejiang, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 109卷
基金
中国国家自然科学基金;
关键词
Sensor-Cloud; Fog Computing; Trust mechanism; Misjudgment node; Edge node; NETWORKS;
D O I
10.1016/j.future.2018.05.049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Sensor-Cloud System (SCS) has become a hot research issue. In this system, there are some cyber security problems that can be well solved by the trust mechanism. However, there are still some deficiencies in existing trust mechanisms, especially for the SCS underlying structure. We proposed a fog-based hierarchical trust mechanism for these cyber security deficiencies. This hierarchical mechanism consists of two parts, trust in the underlying structure and trust between cloud service providers (CSPs) and sensor service providers (SSPs). For trust in the underlying structure, the behavior monitoring part is established and implemented in Wireless Sensor Networks (WSNs), and the fine-grained and complicated data analysis part is moved to the fog layer. For trust between CSPs and SSPs, it focuses more on the real-time comparison of service parameters, the gathering of exception information in WSNs, the targeted quantitative evaluation of entities and so on. The experimental results indicate that this fog-based hierarchical structure performs well in saving network energy, detecting malicious nodes rapidly and recovering misjudgment nodes in an acceptable delay. Furthermore, the reliability of edge nodes is well guaranteed by data analyses in the fog layer and an evaluation strategy based on similar service records is put forward. (C) 2018 Published by Elsevier B.V.
引用
收藏
页码:573 / 582
页数:10
相关论文
共 33 条
[1]   A trust aware routing protocol for energy constrained wireless sensor network [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
TELECOMMUNICATION SYSTEMS, 2016, 61 (01) :123-140
[2]   A Survey on Sensor-Cloud: Architecture, Applications, and Approaches [J].
Alamri, Atif ;
Ansari, Wasai Shadab ;
Hassan, Mohammad Mehedi ;
Hossain, M. Shamim ;
Alelaiwi, Abdulhameed ;
Hossain, M. Anwar .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[3]  
[Anonymous], INDIAN J SCI TECHNOL
[4]  
[Anonymous], 2018, IEEE T BIG DATA, DOI DOI 10.1109/TBDATA.2018.2811501
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], 2014, IEEE T INF FORENSICS
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], 2014, Big Data and Internet of Things
[9]   Dependable Structural Health Monitoring Using Wireless Sensor Networks [J].
Bhuiyan, Md Zakirul Alam ;
Wang, Guojun ;
Wu, Jie ;
Cao, Jiannong ;
Liu, Xuefeng ;
Wang, Tian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) :363-376
[10]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, P13, DOI DOI 10.1145/2342509.2342513