Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Title | Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kahla, Mostafa, Azab, Mohamed, Mansour, Ahmed |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
Date Published | Aug. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4388-4 |
Keywords | Ad-hoc Cloud, cloud computing, compositionality, computational devices, Computer architecture, computer network security, Containers, edge computing, fog architecture, Fog Computing, Internet of Things, Intrusion detection, IoT, IoT devices, IoT networks, live migrations, manet privacy, MANETs, Metrics, mobile ad-hoc networks, pubcrawl, resilience, Resiliency, security, Task Analysis, untrustworthy IoT environments, VCC, Vehicular cloud, vehicular cloud computing, virtualization |
Abstract | The extensive increase in the number of IoT devices and the massive data generated and sent to the cloud hinder the cloud abilities to handle it. Further, some IoT devices are latency-sensitive. Such sensitivity makes it harder for far clouds to handle the IoT needs in a timely manner. A new technology named "Fog computing" has emerged as a solution to such problems. Fog computing relies on close by computational devices to handle the conventional cloud load. However, Fog computing introduced additional problems related to the trustworthiness and safety of such devices. Unfortunately, the suggested architectures did not consider such problem. In this paper we present a novel self-configuring fog architecture to support IoT networks with security and trust in mind. We realize the concept of Moving-target defense by mobilizing the applications inside the fog using live migrations. Performance evaluations using a benchmark for mobilized applications showed that the added overhead of live migrations is very small making it deployable in real scenarios. Finally, we presented a mathematical model to estimate the survival probabilities of both static and mobile applications within the fog. Moreover, this work can be extended to other systems such as mobile ad-hoc networks (MANETS) or in vehicular cloud computing (VCC). |
URL | https://ieeexplore.ieee.org/document/8455886 |
DOI | 10.1109/TrustCom/BigDataSE.2018.00018 |
Citation Key | kahla_secure_2018 |
- live migrations
- Virtualization
- vehicular cloud computing
- Vehicular cloud
- VCC
- untrustworthy IoT environments
- Task Analysis
- security
- Resiliency
- resilience
- pubcrawl
- mobile ad-hoc networks
- Metrics
- MANETs
- manet privacy
- Ad-hoc Cloud
- IoT networks
- IoT devices
- IoT
- Intrusion Detection
- Internet of Things
- Fog computing
- fog architecture
- edge computing
- Containers
- computer network security
- computer architecture
- computational devices
- Compositionality
- Cloud Computing