Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3069383.3069385acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Securing combined Fog-to-Cloud system Through SDN Approach

Published: 23 April 2017 Publication History

Abstract

Future IoT services execution may benefit from combining resources at cloud and at the edge. To that end, new architectures should be proposed to handle IoT services in a coordinated way at either the edge of the network, the cloud, or both. Reacting to that need, the Fog-to-Cloud concept has been recently proposed. A key aspect in the F2C design refers to security, since F2C raises security issues besides those yet unsolved in fog and cloud. Thus, we envision the need for new security strategies to handle all components in the F2C architecture. In this paper we propose an SDN-based (mater/slave) security architecture leveraging a centralized controller on the cloud, and distributed controllers at the edge of the network. We argue that the proposed architecture brings more security and privacy to the cloud users by reducing the distance between them and, therefore, reducing the risks of the so called man-in-the-middle attacks. The proposed security architecture is analyzed in some critical infrastructure scenarios in order to illustrate their potential benefits.

References

[1]
J.Gonzalez-Martnez, et al., Cloud computing and education: A state-ofthe-art survey, Computers & Education 80 (2015) 132--151, 2014.
[2]
S.Singh, Y. Jeong, J. H. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications 75 (2016) 200222, 2016 Elsevier.
[3]
F. Bonomi, et al., Fog Computing: A Platform for Internet of Things and Analytics, Big Data and Internet of Things: A Roadmap for Smart Environments Vol. 546 of Studies in Computational Intelligence 2014.
[4]
X. Masip-Bruin, et al., Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud (F2C) computing systems, IEEE Wireless Communication Magazine, October 2016.
[5]
Hongwei Li1, Yuanshun Dai1, Ling Tian1, and Haomiao Yang, Identity-based Authentication for Cloud Computing, Springer-Verlag Berlin Heidelberg, 2009.
[6]
Dr.N. Venakatesan, M. Rathan Kumar, Finger Print Authentication F or Improved Cloud Security,International Conference on Computational Systems and Information Systems for Sustainable Solutions, 2016
[7]
Sin-Fu Lai, Hui-Kai Su, Wen-Hsu Hsiao, Kim-Joan Chen, Design and Implementation of Cloud Security Defense System with Software
[8]
N.Jayapandian, Dr.A.M.J.Md.Zubair Rahman, M.Koushikaa, S.Radhikadev, A Novel Approach to Enhance Multi Level Security System Using Encryption with Fingerprint in Cloud, World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR16)
[9]
Bhale Pradeepkumar Gajendra, Vinay Kumar Singh, More Sujeet, Achieving Cloud Security using Third Party Auditor, MD5 and Identity Based Encryption, International Conference on Computing, Communication and Automation (ICCCA2016).
[10]
Akashdeep Bhardwaj, GVB Subrahmanyam, Vinay Avasthi, Hanumat Sastry, Security Algorithms for Cloud Computing, International Conference on Computational Modeling and Security (CMS 2016).
[11]
Y. Li, et al., A SDN-based Architecture for Horizontal Internet of Things Services, Communications (ICC), 2016.
[12]
C. Gonzlez, et al., A Novel Distributed SDN-Secured Architecture for the IoT, 2016 Int. Conf. on Distributed Computing in Sensor Systems.
[13]
Vandana C.P, Security improvement in IoT based on Software Defined Networking (SDN), International Journal of Science, Engineering and Technology Research (IJSETR), Volume 5, Issue 1, January 2016
[14]
F. Hu, Q. Hao, K. Bao, A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation, IEEE Communications
[15]
V. Souza, et al., Insights into the Service Execution in a Combined Fogto-Cloud (F2C) Computing System. 2016, Technical report. http://www.ac.upc.edu/app/research-reports/html/RR/2016/10.pdf
[16]
CIPSEC project at www.cipsec.eu
[17]
H. Li, et al., Identity-based authentication for cloud computing. In IEEE International Conference on Cloud Computing. Springer, 2009. 157--1
[18]
C. Dsouza, et al, Policy-driven security management for fog computing: Preliminary framework and a case study. IEEE 15th International Conference on Information Reuse and Integration (IRI). 2014.

Cited By

View all
  • (2024)The universal federator: A third-party authentication solution to federated cloud, edge, and fogJournal of Network and Computer Applications10.1016/j.jnca.2024.103922229(103922)Online publication date: Sep-2024
  • (2024)3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobilityComputer Communications10.1016/j.comcom.2024.05.002222(220-229)Online publication date: Jun-2024
  • (2023)An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptographyInnovations in Systems and Software Engineering10.1007/s11334-023-00532-319:3(231-246)Online publication date: 2-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Crosscloud'17: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms
April 2017
44 pages
ISBN:9781450349345
DOI:10.1145/3069383
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fog-to-Cloud computing
  2. IoT
  3. SDN
  4. cloud computing
  5. critical infrastructures
  6. fog computing
  7. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

EuroSys '17
Sponsor:
EuroSys '17: Twelfth EuroSys Conference 2017
April 23 - 26, 2017
Belgrade, Serbia

Acceptance Rates

Crosscloud'17 Paper Acceptance Rate 8 of 17 submissions, 47%;
Overall Acceptance Rate 16 of 30 submissions, 53%

Upcoming Conference

EuroSys '25
Twentieth European Conference on Computer Systems
March 30 - April 3, 2025
Rotterdam , Netherlands

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The universal federator: A third-party authentication solution to federated cloud, edge, and fogJournal of Network and Computer Applications10.1016/j.jnca.2024.103922229(103922)Online publication date: Sep-2024
  • (2024)3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobilityComputer Communications10.1016/j.comcom.2024.05.002222(220-229)Online publication date: Jun-2024
  • (2023)An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptographyInnovations in Systems and Software Engineering10.1007/s11334-023-00532-319:3(231-246)Online publication date: 2-Aug-2023
  • (2022)A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoTApplied Sciences10.3390/app1214717312:14(7173)Online publication date: 16-Jul-2022
  • (2022)Security Enhancement of Fog Nodes in IoT Networks Using the IBF SchemeThird International Conference on Image Processing and Capsule Networks10.1007/978-3-031-12413-6_10(119-129)Online publication date: 29-Jul-2022
  • (2021)Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant ArchitectureSensors10.3390/s2118605721:18(6057)Online publication date: 9-Sep-2021
  • (2021)Managing the Cloud Continuum: Lessons Learnt from a Real Fog-to-Cloud DeploymentSensors10.3390/s2109297421:9(2974)Online publication date: 23-Apr-2021
  • (2021)HIBAF: A data security scheme for fog computingJournal of High Speed Networks10.3233/JHS-210673(1-22)Online publication date: 25-Oct-2021
  • (2021)Scalability analysis of a blockchain-based security strategy for complex IoT systems2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)10.1109/HPSR52026.2021.9481865(1-6)Online publication date: 7-Jun-2021
  • (2021)Authentication mechanisms for IoT system based on distributed MQTT brokers: review and challengesProcedia Computer Science10.1016/j.procs.2021.10.066194(132-139)Online publication date: 2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media