Security and Device Control Method for Fog Computer Using Blockchain
Title | Security and Device Control Method for Fog Computer Using Blockchain |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Jeong, Jun Woo, Kim, Bo Youn, Jang, Ju Wook |
Conference Name | Proceedings of the 2018 International Conference on Information Science and System |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-6421-8 |
Keywords | blockchain, composability, Data security, Fog Computing, Fog Computing and Security, Hash Function, Human Behavior, Internet of Things, Metrics, pubcrawl, Repudiation, resilience, Resiliency, Scalability |
Abstract | Fog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks. |
DOI | 10.1145/3209914.3209917 |
Citation Key | jeong_security_2018 |