Secure Data Query Framework for Cloud and Fog Computing

被引:72
|
作者
Gu, Ke [1 ]
Wu, Na [1 ]
Yin, Bo [1 ]
Jia, Weijia [2 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; Cloud computing; Servers; Cryptography; Data aggregation; Computational modeling; Fog computing; cloud computing; data query; security; PARADIGM; SCHEME;
D O I
10.1109/TNSM.2019.2941869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is mainly used to process a large amount of data produced by terminal devices. As fog nodes are the closest acquirers to the terminal devices, the processed data may be tampered with or illegally captured by some malicious nodes while the data is transferred or aggregated. When some applications need to require real-time process with high security, cloud service may sample some data from fog service to check final results. In this paper, we propose a secure data query framework for cloud and fog computing. We use cloud service to check queried data from fog network when fog network provides queried data to users. In the framework, cloud server pre-designates some data aggregation topology trees to fog network, and then fog network may acquire related data from fog nodes according to one of the pre-designated data aggregation trees. Additionally, some fog nodes are assigned as sampled nodes that can feed back related data to cloud server. Based on the security requirements of fog computing, we analyze the security of our proposed framework. Our framework not only guarantees the reliability of required data but also effectively protects data against man-in-the-middle attack, single node attack and collusion attack of malicious users. Also, the experiments show our framework is effective and efficient.
引用
收藏
页码:332 / 345
页数:14
相关论文
共 50 条
  • [31] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [32] A Framework to Secure the Virtual Machine Image in Cloud Computing
    Hussein, Raid Khalid
    Alenezi, Ahmed
    Wills, Gary B.
    Walters, Robert J.
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 35 - 40
  • [33] Secure and Privacy Enhanced Authentication Framework for Cloud Computing
    Patel, Subhash Chandra
    Singh, Ravi Shankar
    Jaiswal, Sumit
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1631 - 1634
  • [34] ADVANCED SECURE USER AUTHENTICATION FRAMEWORK FOR CLOUD COMPUTING
    Jiang, Rui
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (04): : 1700 - 1724
  • [35] Secure Framework Enhancing AES Algorithm in Cloud Computing
    Awan, Ijaz Ahmad
    Shiraz, Muhammad
    Hashmi, Muhammad Usman
    Shaheen, Qaisar
    Akhtar, Rizwan
    Ditta, Allah
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204
  • [37] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84
  • [38] DDoS attack Defense Framework for Cloud using Fog Computing
    Deepali
    Bhushan, Kriti
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 534 - 538
  • [39] Data storage with secure boundary in cloud computing
    Zhu, Shuaishuai
    Han, Yiliang
    ICIC Express Letters, 2014, 8 (09): : 2389 - 2394
  • [40] A Secure and Searchable Data Storage in Cloud Computing
    Gupta, Sarika
    Satapathy, Sangita Rani
    Mehta, Piyush
    Tripathy, Anupam
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 106 - 109