Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges

被引:89
作者
Chaudhary, Rajat [1 ]
Kumar, Neeraj [2 ]
Zeadally, Sherali [3 ]
机构
[1] Thapar Univ, Patiala, Punjab, India
[2] Thapar Univ, Dept CSED, Patiala, Punjab, India
[3] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
关键词
D O I
10.1109/MCOM.2017.1700102
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the last few years, we have seen an exponential increase in the number of Internet-enabled devices, which has resulted in popularity of fog and cloud computing among end users. End users expect high data rates coupled with secure data access for various applications executed either at the edge (fog computing) or in the core network (cloud computing). However, the bidirectional data flow between the end users and the devices located at either the edge or core may cause congestion at the cloud data centers, which are used mainly for data storage and data analytics. The high mobility of devices (e.g., vehicles) may also pose additional challenges with respect to data availability and processing at the core data centers. Hence, there is a need to have most of the resources available at the edge of the network to ensure the smooth execution of end-user applications. Considering the challenges of future user demands, we present an architecture that integrates cloud and fog computing in the 5G environment that works in collaboration with the advanced technologies such as SDN and NFV with the NSC model. The NSC service model helps to automate the virtual resources by chaining in a series for fast computing in both computing technologies. The proposed architecture also supports data analytics and management with respect to device mobility. Moreover, we also compare the core and edge computing with respect to the type of hypervisors, virtualization, security, and node heterogeneity. By focusing on nodes' heterogeneity at the edge or core in the 5G environment, we also present security challenges and possible types of attacks on the data shared between different devices in the 5G environment.
引用
收藏
页码:114 / 122
页数:9
相关论文
共 15 条
[1]  
[Anonymous], IEEE T CLOUD COMPUTI
[2]  
[Anonymous], IEEE T CLOUD COMPUTI
[3]  
[Anonymous], 2015, CISCO VISUAL NETWORK
[4]   Data Offloading in 5G-Enabled Software-Defined Vehicular Networks: A Stackelberg-Game-Based Approach [J].
Aujla, Gagangeet Singh ;
Chaudhary, Rajat ;
Kumar, Neeraj ;
Rodrigues, Joel J. P. C. ;
Vinel, Alexey .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (08) :100-108
[5]  
Chen M., 2016, IEEE T CLOUD COMPUTI, VPP, P1
[6]   Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures [J].
He, Debiao ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Wu, Wei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) :2052-2064
[7]  
John Wolfgang., 2013, Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, P1, DOI [DOI 10.1109/SDN-4FNS.2013.6702549, 10.1109/SDN4FNS.2013.6702549, DOI 10.1109/SDN4FNS.2013.6702549]
[8]   Credit-Based Runtime Placement of Virtual Machines on a Single NUMA System for QoS of Data Access Performance [J].
Kim, Chulmin ;
Park, Kyu Ho .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (06) :1633-1646
[9]   A survey on security issues and solutions at different layers of Cloud computing [J].
Modi, Chirag ;
Patel, Dhiren ;
Borisaniya, Bhavesh ;
Patel, Avi ;
Rajarajan, Muttukrishnan .
JOURNAL OF SUPERCOMPUTING, 2013, 63 (02) :561-592
[10]  
Peng MG, 2016, IEEE NETWORK, V30, P46, DOI 10.1109/MNET.2016.7513863