A Research Perspective on Security in Fog Computing Through Blockchain Technology

被引:2
作者
Garg, Disha [1 ]
Bhatia, Komal Kumar [1 ]
Gupta, Sonali [1 ]
机构
[1] JC Bose Inst Sci & Technol, YMCA, Faridabad, Haryana, India
来源
ARTIFICIAL INTELLIGENCE AND SUSTAINABLE COMPUTING FOR SMART CITY, AIS2C2 2021 | 2021年 / 1434卷
关键词
Cloud computing; Edge computing; Fog computing; Internet of Things (IoT); Blockchain technology; Authentication; PRESERVING ACCESS-CONTROL; HEALTH-CARE; AUTHENTICATION; SCHEME; MANAGEMENT; INTERNET; THINGS;
D O I
10.1007/978-3-030-82322-1_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most modernistic applications comprising of the Internet of Things are deployed on a cloud environment, which offers advantages like virtual infinite resources, massive elasticity of resources on a pay as per usage metric model. Additionally, IoT real-time applications, essentially self-driving cars, smart home security systems etc., require low latency and less response time. To achieve that, the computation and analysis of data needs to be deployed closer to the edge of the network. The extension of computing services to the edge nodes is termed as 'Fog Computing'. Since every technology comes with two-faced implications; fog computing also suffers with few security issues, majorly comprising user authentication, access control, and data protection from security attacks. Blockchain technology is a promising paradigm to address these security flaws. In this paper, an infrastructure based on blockchain technology coupled with fog computing is proposed as a measure to mitigate the security attacks.
引用
收藏
页码:91 / 104
页数:14
相关论文
共 41 条
[1]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[2]   A unified framework for data integrity protection in people-centric smart cities [J].
Altulyan, May ;
Yao, Lina ;
Kanhere, Salil S. ;
Wang, Xianzhi ;
Huang, Chaoran .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (7-8) :4989-5002
[3]  
[Anonymous], Cisco annual internet report (2018-2023) white paper," 2020
[4]  
[Anonymous], 2015, Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
[5]  
[Anonymous], 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, DOI DOI 10.1007/978-981-10-5861-5_5
[6]  
Bayer D., 1993, SEQUENCES 2, VII, P329
[7]   A Research Perspective on Fog Computing [J].
Bermbach, David ;
Pallas, Frank ;
Garcia Perez, David ;
Plebani, Pierluigi ;
Anderson, Maya ;
Kat, Ronen ;
Tai, Stefan .
SERVICE-ORIENTED COMPUTING - ICSOC 2017 WORKSHOPS, 2018, 10797 :198-210
[8]   A secure authenticated and key exchange scheme for fog computing [J].
Chen, Chien-Ming ;
Huang, Yanyu ;
Wang, King-Hang ;
Kumari, Saru ;
Wu, Mu-En .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) :1200-1215
[9]   Towards Cloud Computing and Blockchain Integrated Applications [J].
Coutinho, Emanuel F. ;
Paulo, Diogo Eliseu ;
Abreu, Antonio Welligton ;
Bezerra, Carla I. M. .
2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, :139-142
[10]  
Crosby M., 2016, Applied Innovation, V2, P71, DOI DOI 10.21626/INNOVA/2016.1/01