Interval-Valued Intuitionistic Fuzzy-Analytic Hierarchy Process for evaluating the impact of security attributes in Fog based Internet of Things paradigm

被引:35
作者
Verma, Richa [1 ]
Chandra, Shalini [1 ]
机构
[1] Babasaheb Bhimrao Ambedkar Univ, Dept Comp Sci, Lucknow 226025, Uttar Pradesh, India
关键词
Fog computing; IoT; Fog-IoT security; Interval-valued intuitionistic fuzzy; AHP; MULTICRITERIA DECISION-MAKING; ACCESS-CONTROL; TECHNOLOGIES; PRIVACY; ISSUES; SETS;
D O I
10.1016/j.comcom.2021.04.019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) may be defined as a network of smart devices that are involved in data collection and exchange. This technology has automated the day-to-day jobs and thus made our lives easier. But, realtime analysis of data is not always possible in a typical cloud-IoT architecture, especially for latency-sensitive applications. This led to the introduction of fog computing. On one side, fog layer has the capability of data processing and computation at the network edge and thus provides faster results. But, on the other hand, it also brings the attack surface closer to the devices. This makes the sensitive data on the layer vulnerable to attacks. Thus, considering Fog-IoT security is of prime importance. The security of a system or platform depends upon multiple factors. The order of selection of these factors plays a vital role in efficient assessment of security. This makes the problem of assessment of Fog-IoT security a Multi-Criteria Decision-Making (MCDM) problem. Therefore, the authors have deployed an Interval-Valued Intuitionistic Fuzzy Set (IVIFS) based Analytical Hierarchy Process (AHP) for the said environment. Using this integrated approach, the Fog-IoT security factors and their sub-factors are prioritized and ranked. The results obtained using above hybrid approach are validated by comparing them with Fuzzy-AHP (F-AHP) and Classical-AHP (C-AHP) results and are found to statistically correlated. The ideology and results of this research will help the security practitioners in accessing the security of Fog-IoT environment effectively. Moreover, the outcome of this analysis will help in paving a path for researchers by shifting their focus towards the most prioritized factor thereby assuring security in the environment.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 57 条
[11]  
Bonomi F., 2012, P 1 ED MCC WORKSH MO, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[12]  
Ganguli S., 2017, IOT TECHNOLOGY DISRU
[13]   IIVIFS-WASPAS: An integrated Multi-Criteria Decision-Making perspective for cloud service provider selection [J].
Gireesha, Obulaporam ;
Somu, Nivethitha ;
Krithivasan, Kannan ;
Sriram, V. S. Shankar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 103 :91-110
[15]   Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks [J].
Gope, Prosanta ;
Das, Ashok Kumar ;
Kumar, Neeraj ;
Cheng, Yongqiang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (09) :4957-4968
[16]  
Hosseinpour F., 2016, INT J DIGIT CONTENT, P10
[17]   Survey on fog computing: architecture, key technologies, applications and open issues [J].
Hu, Pengfei ;
Dhelim, Sahraoui ;
Ning, Huansheng ;
Qiu, Tie .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 98 :27-42
[18]   Correlation of intuitionistic fuzzy sets by centroid method [J].
Hung, WL ;
Wu, JW .
INFORMATION SCIENCES, 2002, 144 (1-4) :219-225
[19]   Fuzzy Multicriteria Decision-Making: A Literature Review [J].
Kahraman, Cengiz ;
Onar, Sezi Cevik ;
Oztaysi, Basar .
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2015, 8 (04) :637-666
[20]   Security Issues in Fog Environment: A Systematic Literature Review [J].
Kaur, Jasleen ;
Agrawal, Alka ;
Khan, Raees Ahmad .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) :467-483