PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS

被引:0
作者
Bharathi, C. R. [1 ]
Ramesh, L. V. [2 ]
Priya, L. Vamsi [3 ]
机构
[1] Vel Tech Rangarajan Dr Sagunthala R&D Inst Sci &, Sch Elect & Commun, Dept ECE, Chennai, Tamil Nadu, India
[2] Andhra Loyola Inst Engn & technol, Dept Comp Sci & Engn, Vijayawada, India
[3] Andhra Loyola Coll, Dept Comp Sci, Vijayawada, India
关键词
IoT environment; security analysis; Fog Computing; smart home; Access Control; INTERNET; THINGS;
D O I
10.9756/INT-JECSE/V14I2.123
中图分类号
G76 [特殊教育];
学科分类号
040109 ;
摘要
As the Internet of Things (IOT) has grown in popularity it will be the Internet of the future, as seen a significant increase in smart homes/cities, smart connected vehicles, wearable technology and smart grid. This paper proposes a new approach for securing IOT systems. Cloud models may or may not maintain a consistent level of security in line with increasing data traffic. Fog computing can be used to extend cloud computing services to the network's edge and connect to the Internet of Things to provide computing services to these devices. In this context, Proposed access control and security architecture has proposed for an IOT environment based on fog computing. This paper provides secure smart home architecture and firewall-aware cloud and security fog. To protect against unauthorized data access and internet threats, a firewall system connects the internet to the fog layers. Data logging, device communication, and data transfers are all logged and alerts are generated if any misuse or suspicious communication patterns between the nodes are detected. In a Fog Cloud, IoT access control issues can be solved using the XACML language (eXtensible Access Control Markup Language). Privacy Level compared among the normal IoT environments, Cloud based IoT environments and Fog based IoT environments, which results the privacy of Fog based IoT environments is having high privacy and security. As a result, this security system will enhance customer confidence in smart home technology.
引用
收藏
页码:1398 / 1404
页数:7
相关论文
共 50 条
[41]   A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications [J].
Karnatak, Vijay ;
Mishra, Amit Kumar ;
Tripathi, Neha ;
Wazid, Mohammad ;
Singh, Jaskaran ;
Das, Ashok Kumar .
SECURITY AND PRIVACY, 2024, 7 (02)
[42]   Access Control Method using Electrocardiogram Signal for Fog Computing Security [J].
Kim, Jin Su ;
Kim, Min Gu ;
Lee, Myung-Won ;
Pan, Sung Bum .
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, :1772-1777
[43]   A Fog Computing-based IoT Framework for Precision Agriculture [J].
Guardo, Ermanno ;
Di Stefano, Alessandro ;
La Corte, Aurelio ;
Sapienza, Marco ;
Scata, Marialisa .
JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (05) :1401-1411
[44]   S-HIDRA: A blockchain and SDN domain-based architecture to orchestrate fog computing environments [J].
Nunez-Gomez, Carlos ;
Carrion, Carmen ;
Caminero, Blanca ;
Delicado, Francisco M. .
COMPUTER NETWORKS, 2023, 221
[45]   Optimized Module Placement in IoT Applications Based on Fog Computing [J].
Rezazadeh, Zahra ;
Rahbari, Dadmehr ;
Nickray, Mohsen .
26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, :1553-1558
[46]   Topology Control in Fog Computing Enabled IoT Networks for Smart Cities [J].
Desikan, K. E. Srinivasa ;
Kotagi, Vijeth J. ;
Murthy, C. Siva Ram .
COMPUTER NETWORKS, 2020, 176
[47]   Trustworthy fog: A reputation-based consensus method for IoT with blockchain and fog computing [J].
Feng, Pan ;
Ma, Yongli ;
Li, Bing ;
Han, Baofu ;
Fang, Tian .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 120
[48]   Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks [J].
Gupta, Sejal ;
Garg, Ritu ;
Gupta, Nitin ;
Alnumay, Waleed S. ;
Ghosh, Uttam ;
Sharma, Pradip Kumar .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[49]   Utilizing technologies of fog computing in educational IoT systems: privacy, security, and agility perspective [J].
Adel, Amr .
JOURNAL OF BIG DATA, 2020, 7 (01)
[50]   Pervasive-Based Access Control Model for IoT Environments [J].
El Bouanani, Salim ;
El Kiram, My Ahmed ;
Achbarou, Omar ;
Outchakoucht, Aissam .
IEEE ACCESS, 2019, 7 :54575-54585