Visible to the public Security-based service broker policy for FOG computing environment

TitleSecurity-based service broker policy for FOG computing environment
Publication TypeConference Paper
Year of Publication2017
AuthorsArya, D., Dave, M.
Conference Name2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
Keywordsavailable service providers, cloud computing, Computational modeling, computer centres, computing servers, decision making, decision-making process, edge computing, enhanced heterogeneity, Fog Computing, FOG computing environment, Heuristic algorithms, Indexes, Internet of Things, load balancing, online Internet of Things services, optimal datacenter, personal computers, pubcrawl, quantized security, Resiliency, resource allocation, SbSBP, Scalability, security, security of data, security risks, security strength, security-based service broker policy, Service Broker, Time factors, trust models
Abstract

With the evolution of computing from using personal computers to use of online Internet of Things (IoT) services and applications, security risks have also evolved as a major concern. The use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust models have been proposed to measure the security strength of available service providers. We utilize the quantized security of Datacenters and propose a new security-based service broker policy(SbSBP) for Fog computing environment to allocate the optimal Datacenter(s) to serve users' requests based on users' requirements of cost, time and security. Further, considering the dynamic nature of Fog computing, the concept of dynamic reconfiguration has been added. Comparative analysis of simulation results shows the effectiveness of proposed policy to incorporate users' requirements in the decision-making process.

URLhttps://ieeexplore.ieee.org/document/8204036
DOI10.1109/ICCCNT.2017.8204036
Citation Keyarya_security-based_2017