Secure Data Query Framework for Cloud and Fog Computing

被引:72
|
作者
Gu, Ke [1 ]
Wu, Na [1 ]
Yin, Bo [1 ]
Jia, Weijia [2 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; Cloud computing; Servers; Cryptography; Data aggregation; Computational modeling; Fog computing; cloud computing; data query; security; PARADIGM; SCHEME;
D O I
10.1109/TNSM.2019.2941869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is mainly used to process a large amount of data produced by terminal devices. As fog nodes are the closest acquirers to the terminal devices, the processed data may be tampered with or illegally captured by some malicious nodes while the data is transferred or aggregated. When some applications need to require real-time process with high security, cloud service may sample some data from fog service to check final results. In this paper, we propose a secure data query framework for cloud and fog computing. We use cloud service to check queried data from fog network when fog network provides queried data to users. In the framework, cloud server pre-designates some data aggregation topology trees to fog network, and then fog network may acquire related data from fog nodes according to one of the pre-designated data aggregation trees. Additionally, some fog nodes are assigned as sampled nodes that can feed back related data to cloud server. Based on the security requirements of fog computing, we analyze the security of our proposed framework. Our framework not only guarantees the reliability of required data but also effectively protects data against man-in-the-middle attack, single node attack and collusion attack of malicious users. Also, the experiments show our framework is effective and efficient.
引用
收藏
页码:332 / 345
页数:14
相关论文
共 50 条
  • [21] New Governance Framework to Secure Cloud Computing
    Saidah, Ahmed Shaker
    Abdelbaki, Nashwa
    CLOUD COMPUTING AND SERVICES SCIENCES, CLOSER 2014, 2015, 512 : 187 - 199
  • [22] Secure cloud computing for genomic data
    Datta, Somalee
    Bettinger, Keith
    Snyder, Michael
    NATURE BIOTECHNOLOGY, 2016, 34 (06) : 588 - 591
  • [23] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    Nature Biotechnology, 2016, 34 : 588 - 591
  • [24] A query privacy-enhanced and secure search scheme over encrypted data in cloud computing
    Yin, Hui
    Qin, Zheng
    Ou, Lu
    Li, Keqin
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 14 - 27
  • [25] Secure and efficient big data deduplication in fog computing
    Yan, Jiajun
    Wang, Xiaoming
    Gan, Qingqing
    Li, Suyu
    Huang, Daxin
    SOFT COMPUTING, 2020, 24 (08) : 5671 - 5682
  • [26] Secure and efficient big data deduplication in fog computing
    Jiajun Yan
    Xiaoming Wang
    Qingqing Gan
    Suyu Li
    Daxin Huang
    Soft Computing, 2020, 24 : 5671 - 5682
  • [27] An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud
    Chen, Peng
    Xu, Baochao
    Li, Hui
    Wang, Weiguo
    Peng, Yanguo
    Bhowmick, Sourav S.
    Chen, Xiaofeng
    Cui, Jiangtao
    DATA SCIENCE AND ENGINEERING, 2025, 10 (01) : 54 - 74
  • [28] Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream
    Ranjan, Aditya Kaushal
    Kumar, Prabhat
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 380 - 388
  • [29] Secure and Efficient Key Delivery in VANET using Cloud and Fog Computing
    Chaba, Sanya
    Kumar, Rahul
    Pant, Rohan
    Dave, Mayank
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 27 - 31
  • [30] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)