A Fog Computing-based Framework for Privacy Preserving IoT Environments

被引:9
作者
Abou-Tair, Dhiah el Diehn, I [1 ]
Buechsenstein, Simon [2 ]
Khalifeh, Ala [1 ]
机构
[1] German Jordanian Univ, Sch Elect Engn & Informat Technol, Madaba, Jordan
[2] Univ Freiburg, Embedded Syst Engn, Freiburg, Germany
关键词
Internet of thing; cloud computing; fog computing; privacy; security; INTERNET;
D O I
10.34028/iajit/17/3/4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is becoming an indispensable component in the emerging Internet of Things (IoT) context. However, the IoT based devices and tools are exposed to several security and privacy threats, especially that these devices are mainly used to gather data about users' habits, vital signs, surround environment, etc., which makes them a lucrative target to intruders. Up to date, conventional security and privacy mechanisms are not well optimized for IoT devices due to their limited energy, storage capacity, communication functionality and computing power, which influenced researchers to propose new solutions and algorithms to handle these limitations. Fog and cloud computing have been recently integrated in IoT environment to solve their resources' limitations, thus facilitating new life scenarios-oriented applications. In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users' data and protecting their privacy. The framework has been implemented and tested using available technologies. Furthermore, a security analysis has been verified by simulating several hypothetical attack scenarios, which showed the effectiveness of the proposed framework and its capability of protecting the users' information.
引用
收藏
页码:306 / 315
页数:10
相关论文
共 22 条
[1]  
Abou-Tair DEI, 2018, 2018 19TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), P27, DOI 10.1109/SNPD.2018.8441162
[2]  
AbouTair D., 2017, ADV COMPUTER SCI UBI, P427
[3]   Off-chip/On-chip Gateway Architecture for Mixed-Criticality Systems based on Networked Multi-Core Chips [J].
Abuteir, Mohammed ;
Obermaisser, Romn ;
Owda, Zaher ;
Moudouthe, Thierry .
2015 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2015, :120-128
[4]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[5]  
[Anonymous], 2017, IOT SECURITY PROTECT
[6]   The Last Mile for IoT Privacy [J].
Chow, Richard .
IEEE SECURITY & PRIVACY, 2017, 15 (06) :73-76
[7]   EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security [J].
Errabelly, Ranadheer ;
Sha, Kewei ;
Wei, Wei ;
Yang, T. Andrew ;
Wang, Zhiwei .
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON FOG AND EDGE COMPUTING (ICFEC), 2017, :81-88
[8]   An IoT-Based Virtual Addressing Framework for Intelligent Delivery Logistics [J].
Hiari, Omar ;
Abou-Tair, Dhiah el Diehn I. ;
Abushaikha, Ismail .
INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 :698-705
[9]  
Khalifeh Ala F., 2016, Proceedings of the 4th Workshop on ICTs for Improving Patients Rehabilitation Research Techniques (REHAB'16), P97, DOI DOI 10.1145/3051488.3051513
[10]  
Kiblawi Tarek, 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), P1, DOI 10.1109/ICRITO.2015.7359326