Secure Data Query Framework for Cloud and Fog Computing

被引:72
|
作者
Gu, Ke [1 ]
Wu, Na [1 ]
Yin, Bo [1 ]
Jia, Weijia [2 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2020年 / 17卷 / 01期
基金
中国国家自然科学基金;
关键词
Edge computing; Cloud computing; Servers; Cryptography; Data aggregation; Computational modeling; Fog computing; cloud computing; data query; security; PARADIGM; SCHEME;
D O I
10.1109/TNSM.2019.2941869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is mainly used to process a large amount of data produced by terminal devices. As fog nodes are the closest acquirers to the terminal devices, the processed data may be tampered with or illegally captured by some malicious nodes while the data is transferred or aggregated. When some applications need to require real-time process with high security, cloud service may sample some data from fog service to check final results. In this paper, we propose a secure data query framework for cloud and fog computing. We use cloud service to check queried data from fog network when fog network provides queried data to users. In the framework, cloud server pre-designates some data aggregation topology trees to fog network, and then fog network may acquire related data from fog nodes according to one of the pre-designated data aggregation trees. Additionally, some fog nodes are assigned as sampled nodes that can feed back related data to cloud server. Based on the security requirements of fog computing, we analyze the security of our proposed framework. Our framework not only guarantees the reliability of required data but also effectively protects data against man-in-the-middle attack, single node attack and collusion attack of malicious users. Also, the experiments show our framework is effective and efficient.
引用
收藏
页码:332 / 345
页数:14
相关论文
共 50 条
  • [21] Resource Management Techniques for Cloud/Fog and Edge Computing: An Evaluation Framework and Classification
    Mijuskovic, Adriana
    Chiumento, Alessandro
    Bemthuis, Rob
    Aldea, Adina
    Havinga, Paul
    SENSORS, 2021, 21 (05) : 1 - 23
  • [22] A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
    Lapmoon, Jakkarin
    Fugkeaw, Somchart
    IEEE ACCESS, 2025, 13 : 11969 - 11988
  • [23] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [24] Optimizing Structural Health Monitoring Systems Through Integrated Fog and Cloud Computing Within IoT Framework
    Hassan, Muhammad
    Hussein, Ali
    Nassr, Amr A.
    Karoumi, Raid
    Sayed, Usama M.
    Abdelraheem, Mohamed
    IEEE ACCESS, 2024, 12 : 89628 - 89646
  • [25] Security and Privacy Issues in Cloud, Fog and Edge Computing
    Parikh, Shalin
    Dave, Dharmin
    Patel, Reema
    Doshi, Nishant
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 734 - 739
  • [26] Provable Secure Group Key Establishment Scheme for Fog Computing
    Chen, Wen-Chin
    Huang, Yin-Tzu
    Wang, Sheng-De
    IEEE ACCESS, 2021, 9 : 158682 - 158694
  • [27] DDoS attack Defense Framework for Cloud using Fog Computing
    Deepali
    Bhushan, Kriti
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 534 - 538
  • [28] AdaptiveFog: A Modelling and Optimization Framework for Fog Computing in Intelligent Transportation Systems
    Xiao, Yong
    Krunz, Marwan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4187 - 4200
  • [29] Architectural Design Alternatives Based on Cloud/Edge/Fog Computing for Connected Vehicles
    Wang, Haoxin
    Liu, Tingting
    Kim, BaekGyu
    Lin, Chung-Wei
    Shiraishi, Shinichi
    Xie, Jiang
    Han, Zhu
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (04): : 2349 - 2377
  • [30] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634