Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm

被引:33
作者
Verma, Richa [1 ]
Chandra, Shalini [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Comp Sci, Lucknow 226025, Uttar Pradesh, India
关键词
Fog computing; IoT; Fog-IoT security; Interval-valued intuitionistic fuzzy; AHP; MULTICRITERIA DECISION-MAKING; ACCESS-CONTROL; TECHNOLOGIES; PRIVACY; ISSUES; SETS;
D O I
10.1016/j.comcom.2021.04.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) may be defined as a network of smart devices that are involved in data collection and exchange. This technology has automated the day-to-day jobs and thus made our lives easier. But, realtime analysis of data is not always possible in a typical cloud-IoT architecture, especially for latency-sensitive applications. This led to the introduction of fog computing. On one side, fog layer has the capability of data processing and computation at the network edge and thus provides faster results. But, on the other hand, it also brings the attack surface closer to the devices. This makes the sensitive data on the layer vulnerable to attacks. Thus, considering Fog-IoT security is of prime importance. The security of a system or platform depends upon multiple factors. The order of selection of these factors plays a vital role in efficient assessment of security. This makes the problem of assessment of Fog-IoT security a Multi-Criteria Decision-Making (MCDM) problem. Therefore, the authors have deployed an Interval-Valued Intuitionistic Fuzzy Set (IVIFS) based Analytical Hierarchy Process (AHP) for the said environment. Using this integrated approach, the Fog-IoT security factors and their sub-factors are prioritized and ranked. The results obtained using above hybrid approach are validated by comparing them with Fuzzy-AHP (F-AHP) and Classical-AHP (C-AHP) results and are found to statistically correlated. The ideology and results of this research will help the security practitioners in accessing the security of Fog-IoT environment effectively. Moreover, the outcome of this analysis will help in paving a path for researchers by shifting their focus towards the most prioritized factor thereby assuring security in the environment.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 57 条
[1]   A Mechanism for Securing IoT-enabled Applications at the Fog Layer [J].
Abbas, Nadeem ;
Asim, Muhammad ;
Tariq, Noshina ;
Baker, Thar ;
Abbas, Sohail .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
[2]   A neutrosophic theory based security approach for fog and mobile-edge computing [J].
Abdel-Basset, Mohamed ;
Manogaran, Gunasekaran ;
Mohamed, Mai .
COMPUTER NETWORKS, 2019, 157 :122-132
[3]  
Alazeb Abdulwahab, 2020, ARXIV PREPRINT ARXIV
[4]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[5]   An Architecture of IoT Service Delegation and Resource Allocation Based on Collaboration between Fog and Cloud Computing [J].
Alsaffar, Aymen Abdullah ;
Pham, Hung Phuoc ;
Hong, Choong-Seon ;
Huh, Eui-Nam ;
Aazam, Mohammad .
MOBILE INFORMATION SYSTEMS, 2016, 2016
[6]   Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system [J].
An, Xingshuo ;
Su, Jingtao ;
Lue, Xing ;
Lin, Fuhong .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[7]   MORE ON INTUITIONISTIC FUZZY-SETS [J].
ATANASSOV, KT .
FUZZY SETS AND SYSTEMS, 1989, 33 (01) :37-45
[8]   INTUITIONISTIC FUZZY-SETS [J].
ATANASSOV, KT .
FUZZY SETS AND SYSTEMS, 1986, 20 (01) :87-96
[9]   OPERATORS OVER INTERVAL VALUED INTUITIONISTIC FUZZY-SETS [J].
ATANASSOV, KT .
FUZZY SETS AND SYSTEMS, 1994, 64 (02) :159-174
[10]   Cyber Security Metrics Evaluation Using Multi-criteria Decision-Making Approach [J].
Bhol, Seema Gupta ;
Mohanty, J. R. ;
Pattnaik, Prasant Kumar .
SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 :665-675