Analysis of Security Access Control Systems in Fog Computing Environment

Authors

  • Junlin Zhang School of Information Technology, Guangdong Technology College, Zhaoqing, Guangdong, 526100, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1252

Keywords:

Fog computing, Cuckoo filter, Secure access, Control technology, Structure hiding

Abstract

Fog computing is a computing environment that can respond to user operational needs in real time. Aiming at the shortcomings of user privacy protection performance and structural performance, a method of completely hiding access structures is proposed under the framework of cloud and mist computing. The cuckoo filter is applied to the fog computing environment, and users are detected through fog nodes. If an attribute is detected to exist in the fully hidden access structure, the mapping function between the attribute and the access structure line number is returned. The research results show that with the increase of the number of attributes, the advantage of attribute confirmation time for fog servers is gradually obvious; The overall delay of fog computing is shorter, the Time To Live (TTL) is longer, the average delay is only 3 ms, and the delay is lower; The completely hidden access structure constructed by the cuckoo algorithm occupies only 1% of the total system steps, which can more effectively achieve user privacy protection without increasing overhead. The proposed scheme greatly reduces the amount of computation while fully protecting user privacy, and meets the needs of users for fast and secure access.

Downloads

Download data is not yet available.

Author Biography

Junlin Zhang, School of Information Technology, Guangdong Technology College, Zhaoqing, Guangdong, 526100, China

Junlin Zhang obtained his master’s degree in engineering from South China Agricultural University (2004). At present, he is working as an associate professor in the School of Information Technology of Guangdong Technology College. He is also a member of the Professional Committee of Teaching Quality Management of Guangdong Private Higher Education Institutions. He has published articles in more than 10 well-known peer-reviewed journals and conference minutes. His areas of interest include computer network security, Internet of Things technology, software technology and higher education management.

References

Sabireen H, Neelanarayanan V. A review on fog computing: Architecture, fog with IoT, algorithms and research challenges. Ict Express, 2021, 7(2): 162–176.

Rupa C, Patan R, Al-Turjman F, Mostarda L. Enhancing the access privacy of IDaaS system using SAML protocol in fog computing. IEEE Access, 2020, 8: 168793–168801.

Pallavi K N, Ravi Kumar V. Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment. Wireless Personal Communications, 2021, 116: 3039–3060.

Lei K, Du M, Huang J, et al. Groupchain: Towards a scalable public blockchain in fog computing of IoT services computing. IEEE Transactions on Services Computing, 2020, 13(2): 252–262.

Singh J, Singh P, Gill S S. Fog computing: A taxonomy, systematic review, current trends and research challenges. Journal of Parallel and Distributed Computing, 2021, 157: 56–85.

Wang H, Liu T, Kim BG, et al. Architectural design alternatives based on cloud/edge/fog computing for connected vehicles. IEEE Communications Surveys & Tutorials, 2020, 22(4): 2349–2377.

Patwary A A N, Fu A, Battula S K, Naha R K, Garg S, Mahanti A. FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Computer Communications, 2020, 162: 212–224.

Taylor PJ, Dargahi T, Dehghantanha A, et al. A systematic literature review of blockchain cyber security. Digital Communications and Networks, 2020, 6(2): 147–156.

Cheng R, Scott W, Masserova E, et al. Talek: Private group messaging with hidden access patterns//Annual Computer Security Applications Conference. 2020: 84–99.

Goudarzi M, Wu H, Palaniswami M, et al. An application placement technique for concurrent IoT applications in edge and fog computing environments. IEEE Transactions on Mobile Computing, 2020, 20(4): 1298–1311.

Abd Elaziz M, Abualigah L, Attiya I. Advanced optimization technique for scheduling IoT tasks in cloud-fog computing environments. Future Generation Computer Systems, 2021(124): 142–154.

Yousefpour A, Fung C, Nguyen T, et al. All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 2019, 98: 289–330.

Tange K, De Donno M, Fafoutis X, et al. A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities. IEEE Communications Surveys & Tutorials, 2020, 22(4): 2489–2520.

Mutlag A A, Abd Ghani M K, Arunkumar N, et al. Enabling technologies for fog computing in healthcare IoT systems. Future Generation Computer Systems, 2019, 90: 62–78.

Abdulqadir H R, Zeebaree S R M, Shukur H M, et al. A study of moving from cloud computing to fog computing. Qubahan Academic Journal, 2021, 1(2): 60–70.

Lakzaei M, Sattari-Naeini V, Sabbagh Molahosseini A, Amir Javadpour. A joint computational and resource allocation model for fast parallel data processing in fog computing[J]. The Journal of Supercomputing, 2022, 78(10): 12662–12685.

Rahman F H, Newaz S H S, Au T W, Wida Susanty Suhaili, M.A. Parvez Mahmud, Gyu Myoung Lee. ENergy and TRUst-aware Virtual Machine allocation in VEhicle fog computing for catering applications in 5G[J]. Future Generation Computer Systems, 2022, 126: 196–210.

Ranaweera P, Jurcut A D, Liyanage M. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials, 2021, 23(2): 1078–1124.

Bhatt S, Pham T K, Gupta M, et al. Attribute-based access control for AWS internet of things and secure Industries of the Future. IEEE Access, 2021, 9: 107200–107223.

Qiu J, Tian Z, Du C, et al. A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 2020, 7(6): 4682–4696.

Gope P, Das A K, Kumar N, et al. Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE transactions on industrial informatics, 2019, 15(9): 4957–4968.

Qiu M, Kung S Y, Gai K. Intelligent security and optimization in Edge/Fog Computing. Future generation computer systems, 2020, 107: 1140–1142.

AboDoma N, Shaaban E, Mostafa A. Adaptive time-bound access control for internet of things in fog computing architecture. International Journal of Computers and Applications, 2022, 44(8): 779–790.

Martinez I, Hafid AS, Jarray A. Design, resource management, and evaluation of fog computing systems: a survey. IEEE Internet of Things Journal, 2020, 8(4): 2494–2516.

Wang Z, Wang N, Su X, et al. An empirical study on business analytics affordances enhancing the management of cloud computing data security[J]. International Journal of Information Management, 2020, 50: 387–394.

Downloads

Published

2023-08-12

How to Cite

1.
Zhang J. Analysis of Security Access Control Systems in Fog Computing Environment. JCSANDM [Internet]. 2023 Aug. 12 [cited 2024 Nov. 22];12(05):653-74. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/20797

Issue

Section

EIC Select