Uncertainty-Aware Authentication Model for Fog Computing in IoT
Title | Uncertainty-Aware Authentication Model for Fog Computing in IoT |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Heydari, Mohammad, Mylonas, Alexios, Katos, Vasilios, Balaguer-Ballester, Emili, Tafreshi, Vahid Heydari Fami, Benkhelifa, Elhadj |
Conference Name | 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) |
Keywords | ABAC model, attribute based access control model, authentication, authorisation, Bayes methods, Cisco Systems, cloud computing, Decision Tree, Decision trees, Fog Computing, Fog Computing and Security, Internet of Things, IoT, logistic regression, Mobile Edge Computing, naive Bayes, pattern classification, prediction model, privacy issues, pubcrawl, regression analysis, Resiliency, Scalability, security, security issues, supervised classification algorithms, supervised learning, support vector machine, Support vector machines, Uncertainty, uncertainty handling, uncertainty-aware authentication model |
Abstract | Since the term "Fog Computing" has been coined by Cisco Systems in 2012, security and privacy issues of this promising paradigm are still open challenges. Among various security challenges, Access Control is a crucial concern for all cloud computing-like systems (e.g. Fog computing, Mobile edge computing) in the IoT era. Therefore, assigning the precise level of access in such an inherently scalable, heterogeneous and dynamic environment is not easy to perform. This work defines the uncertainty challenge for authentication phase of the access control in fog computing because on one hand fog has a number of characteristics that amplify uncertainty in authentication and on the other hand applying traditional access control models does not result in a flexible and resilient solution. Therefore, we have proposed a novel prediction model based on the extension of Attribute Based Access Control (ABAC) model. Our data-driven model is able to handle uncertainty in authentication. It is also able to consider the mobility of mobile edge devices in order to handle authentication. In doing so, we have built our model using and comparing four supervised classification algorithms namely as Decision Tree, Naive Bayes, Logistic Regression and Support Vector Machine. Our model can achieve authentication performance with 88.14% accuracy using Logistic Regression. |
DOI | 10.1109/FMEC.2019.8795332 |
Citation Key | heydari_uncertainty-aware_2019 |
- Naive Bayes
- uncertainty-aware authentication model
- uncertainty handling
- uncertainty
- Support vector machines
- support vector machine
- supervised learning
- supervised classification algorithms
- security issues
- Scalability
- Resiliency
- regression analysis
- pubcrawl
- privacy issues
- prediction model
- pattern classification
- Fog computing
- Mobile Edge Computing
- logistic regression
- IoT
- Internet of Things
- Fog Computing and Security
- Decision trees
- Decision Tree
- Cloud Computing
- Cisco Systems
- Bayes methods
- authorisation
- authentication
- attribute based access control model
- ABAC model
- security