TACRM: trust access control and resource management mechanism in fog computing

dc.contributor.authorBen Daoud, Wided
dc.contributor.authorObaidat, Mohammad S.
dc.contributor.authorMeddeb-Makhlouf, Amel
dc.contributor.authorZarai, Faouzi
dc.contributor.authorHsiao, Kuei-Fang
dc.date.accessioned2019-12-11T09:01:24Z
dc.date.available2019-12-11T09:01:24Z
dc.date.issued2019-07
dc.descriptionhttps://hcis-journal.springeropen.com/articles/10.1186/s13673-019-0188-3#Abs1en_US
dc.description.abstractFog computing network is designed as an extension of the cloud due to the need for a supporting platform capable of ensuring the requirements of Internet of Thing (IoT). The growth of fog based fifth generation mobile communication (5G) system is challenged by the need for data sharing security. In fact, without properly securing access to Fog node resources in IoT network, services providers may not be able to achieve the desired performance. Indeed, fog computing obviously confront numerous security and privacy risks, due to its features, such as huge scale geolocation, heterogeneity and mobility. Thus, we propose a security model that is based on cooperation between IoT and fog. This model integrates an efficient access control process associated with a monitoring scheme to ensure secure cooperation between diverse resources and different operational parts. Indeed, a comprehensive scheduling process and resource allocation mechanism using our security model is proposed to improve the intended performance of the system. In fact, our main contribution is to introduce a distributed access control based on security resource management framework for fog-IoT networks, and proactive security scheme under ultra-trustworthiness and low-latency constraints. After evaluation based on iFogSim, we have proved that our scheme not only provides low latency with high security and privacy, but also reduces the complexity of administration and management of security and resources mechanisms.en_US
dc.identifier.citationDaoud, W. B., Obaidat, M. S., Meddeb-Makhlouf, A., Zarai, F., & Hsiao, K.-F. (2019). TACRM: trust access control and resource management mechanism in fog computing. Human-Centric Computing and Information Sciences, 9(1). https://doi.org/10.1186/s13673-019-0188-3en_US
dc.identifier.other10.1186/s13673-019-0188-3
dc.identifier.urihttp://nur.nu.edu.kz/handle/123456789/4385
dc.language.isoenen_US
dc.publisherSpringerOpenen_US
dc.rightsAttribution-NonCommercial-ShareAlike 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/us/*
dc.subjectTACRMen_US
dc.subjecttrust access control and resource managementen_US
dc.subjectfifth generation mobile communicationen_US
dc.subject5Gen_US
dc.subjectFog node resourcesen_US
dc.subjectIoT networken_US
dc.titleTACRM: trust access control and resource management mechanism in fog computingen_US
dc.typeArticleen_US
workflow.import.sourcescience

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TACRM trust access control and resource management mechanism in fog computing.pdf
Size:
1.49 MB
Format:
Adobe Portable Document Format
Description:
Article

Collections