Visible to the public Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments

TitleSecure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments
Publication TypeConference Paper
Year of Publication2018
AuthorsKahla, Mostafa, Azab, Mohamed, Mansour, Ahmed
Conference Name2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Date PublishedAug. 2018
ISBN Number978-1-5386-4388-4
KeywordsAd-hoc Cloud, cloud computing, compositionality, computational devices, Computer architecture, computer network security, Containers, edge computing, fog architecture, Fog Computing, Internet of Things, Intrusion detection, IoT, IoT devices, IoT networks, live migrations, manet privacy, MANETs, Metrics, mobile ad-hoc networks, pubcrawl, resilience, Resiliency, security, Task Analysis, untrustworthy IoT environments, VCC, Vehicular cloud, vehicular cloud computing, virtualization

The extensive increase in the number of IoT devices and the massive data generated and sent to the cloud hinder the cloud abilities to handle it. Further, some IoT devices are latency-sensitive. Such sensitivity makes it harder for far clouds to handle the IoT needs in a timely manner. A new technology named "Fog computing" has emerged as a solution to such problems. Fog computing relies on close by computational devices to handle the conventional cloud load. However, Fog computing introduced additional problems related to the trustworthiness and safety of such devices. Unfortunately, the suggested architectures did not consider such problem. In this paper we present a novel self-configuring fog architecture to support IoT networks with security and trust in mind. We realize the concept of Moving-target defense by mobilizing the applications inside the fog using live migrations. Performance evaluations using a benchmark for mobilized applications showed that the added overhead of live migrations is very small making it deployable in real scenarios. Finally, we presented a mathematical model to estimate the survival probabilities of both static and mobile applications within the fog. Moreover, this work can be extended to other systems such as mobile ad-hoc networks (MANETS) or in vehicular cloud computing (VCC).

Citation Keykahla_secure_2018