Security Embedded Offloading Requirements for IoT-Fog Paradigm
Title | Security Embedded Offloading Requirements for IoT-Fog Paradigm |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Jamil, Syed Usman, Khan, M. Arif, Ali, Mumtaz |
Conference Name | 2019 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW) |
Keywords | cloud computing, computer network security, data management, data protection, delay tolerant networks, edge computing, embedded security requirements, Fog Computing, Fog Computing and Security, future smart networks, information processing, Internet, Internet of Things, Internet of Things (IoT), IoT-Fog based future communication networks, IoT-Fog based systems, IoT-Fog paradigm, Middle-ware, middleware, middleware technologies, offloading security, propagation latencies, pubcrawl, Resiliency, resource allocation, Scalability, security embedded offloading requirements, security embedded task offloading requirements, security provision, Task Offloading |
Abstract | The paper presents a conceptual framework for security embedded task offloading requirements for IoT-Fog based future communication networks. The focus of the paper is to enumerate the need of embedded security requirements in this IoT-Fog paradigm including the middleware technologies in the overall architecture. Task offloading plays a significant role in the load balancing, energy and data management, security, reducing information processing and propagation latencies. The motivation behind introducing the embedded security is to meet the challenges of future smart networks including two main reasons namely; to improve the data protection and to minimize the internet disturbance and intrusiveness. We further discuss the middleware technologies such as cloudlets, mobile edge computing, micro datacenters, self-healing infrastructures and delay tolerant networks for security provision, optimized energy consumption and to reduce the latency. The paper introduces concepts of system virtualization and parallelism in IoT-Fog based systems and highlight the security features of the system. Some research opportunities and challenges are discussed to improve secure offloading from IoT into fog. |
DOI | 10.1109/MTTW.2019.8897219 |
Citation Key | jamil_security_2019 |
- IoT-Fog based systems
- Task Offloading
- security provision
- security embedded task offloading requirements
- security embedded offloading requirements
- Scalability
- resource allocation
- Resiliency
- pubcrawl
- propagation latencies
- offloading security
- middleware technologies
- middleware
- Middle-ware
- IoT-Fog paradigm
- Cloud Computing
- IoT-Fog based future communication networks
- Internet of Things (IoT)
- Internet of Things
- internet
- information processing
- future smart networks
- Fog Computing and Security
- Fog computing
- embedded security requirements
- edge computing
- delay tolerant networks
- Data protection
- data management
- computer network security