DSpace Repository

TACRM: trust access control and resource management mechanism in fog computing

Show simple item record

dc.contributor.author Ben Daoud, Wided
dc.contributor.author Obaidat, Mohammad S.
dc.contributor.author Meddeb-Makhlouf, Amel
dc.contributor.author Zarai, Faouzi
dc.contributor.author Hsiao, Kuei-Fang
dc.date.accessioned 2019-12-11T09:01:24Z
dc.date.available 2019-12-11T09:01:24Z
dc.date.issued 2019-07
dc.identifier.citation Daoud, W. B., Obaidat, M. S., Meddeb-Makhlouf, A., Zarai, F., & Hsiao, K.-F. (2019). TACRM: trust access control and resource management mechanism in fog computing. Human-Centric Computing and Information Sciences, 9(1). https://doi.org/10.1186/s13673-019-0188-3 en_US
dc.identifier.other 10.1186/s13673-019-0188-3
dc.identifier.uri http://nur.nu.edu.kz/handle/123456789/4385
dc.description https://hcis-journal.springeropen.com/articles/10.1186/s13673-019-0188-3#Abs1 en_US
dc.description.abstract Fog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog based fifth generation mobile communication (5G) system is challenged by the need for data sharing security. In fact, without properly securing access to Fog node resources in IoT network, services providers may not be able to achieve the desired performance. Indeed, fog computing obviously confront numerous security and privacy risks, due to its features, such as huge scale geolocation, heterogeneity and mobility. Thus, we propose a security model that is based on cooperation between IoT and fog. This model integrates an efficient access control process associated with a monitoring scheme to ensure secure cooperation between diverse resources and different operational parts. Indeed, a comprehensive scheduling process and resource allocation mechanism using our security model is proposed to improve the intended performance of the system. In fact, our main contribution is to introduce a distributed access control based on security resource management framework for fog-IoT networks, and proactive security scheme under ultra-trustworthiness and low-latency constraints. After evaluation based on iFogSim, we have proved that our scheme not only provides low latency with high security and privacy, but also reduces the complexity of administration and management of security and resources mechanisms. en_US
dc.language.iso en en_US
dc.publisher SpringerOpen en_US
dc.rights Attribution-NonCommercial-ShareAlike 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-sa/3.0/us/ *
dc.subject TACRM en_US
dc.subject trust access control and resource management en_US
dc.subject fifth generation mobile communication en_US
dc.subject 5G en_US
dc.subject Fog node resources en_US
dc.subject IoT network en_US
dc.title TACRM: trust access control and resource management mechanism in fog computing en_US
dc.type Article en_US
workflow.import.source science


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-ShareAlike 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 3.0 United States