Visible to the public Security and Device Control Method for Fog Computer Using Blockchain

TitleSecurity and Device Control Method for Fog Computer Using Blockchain
Publication TypeConference Paper
Year of Publication2018
AuthorsJeong, Jun Woo, Kim, Bo Youn, Jang, Ju Wook
Conference NameProceedings of the 2018 International Conference on Information Science and System
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6421-8
Keywords"Blockchain", "Data Security", "Fog Computing", "Hash function", "Internet of Things", composability, Human Behavior, Metrics, pubcrawl, Repudiation, resilience, Resiliency
AbstractFog computing has emerged due to the problem that it becomes difficult to store every data to the cloud system as the number of Internet of Things increases. In this fog computing, a vast amount of data generated from the Internet of Things is transmitted to the cloud system located at a remote place, and is processed by a fog computer such as a sensor or a router located nearby, so that only the necessary data is transmitted to the cloud system. However, the above-mentioned fog computer has some drawbacks like being shut down due to an attack by a malicious user in advance, and a method of processing when a fog computer is down or restored. In this paper we describe a fog computing with blockchain that enables fog computers to share transaction generated by processing transaction information of a device controlled by a blockchain method to a security and device control method of a fog computer utilizing the technology. Furthemore by using security properties of blockchain such as authentication, non-repudiation and data integrity, fog computing using blockchain has advantage of security comparing to previous Cloud and fog computing system using centralized database or P2P networks.
DOI10.1145/3209914.3209917
Citation Keyjeong_security_2018