Fog computing network security based on resources management
Abstract
Fog computing paradigm is designed as an extension of cloud computing due
to the need for a supporting platform that is capable of providing the requirements
of the Internet of Things (IoT). However, due to its features, fog obviously confronts
numerous security and privacy risks, such as huge scale geolocation, heterogeneity, and mobility. Indeed, there are many problems resulting from security violations
and breaches. Thus, to exceed these problems, we propose an efcient access control system, ameliorated with appropriate monitoring function and risk estimation
to detect abnormal user’s behavior and then deactivating illegitimate anomaly actions.
Indeed, based on the risk value, we compute the trust level that will then be made
into an access certifcate, which would be provided to the user. This security certifcate
is used to authenticate and authorize users in case of re-connection in another time,
without repeating the whole access control process from the beginning. Moreover,
a comprehensive resource management mechanism is proposed to ameliorate the system performance and so to maintain low latency. Our aim is to further enhance data
security, privacy and resource management for IoT users. To demonstrate the efciency,
feasibility, and security of our proposed scheme, we perform an extensive simulation
using Network Security Simulator (Nessi2).