Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments

##plugins.themes.academic_pro.article.main##

Roshan G. Belsare
Dr. P. B. Ambhore

Abstract

Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.

##plugins.themes.academic_pro.article.details##

Author Biography

Dr. P. B. Ambhore, Government College of Engineering, Amravati

Assistant Professor

Government College of Engineering, Amravati

How to Cite
Roshan Gunwantrao Belsare, & Premchand B. Ambhore. (2022). Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments. International Journal of Next-Generation Computing, 13(5). https://doi.org/10.47164/ijngc.v13i5.935

References

  1. J. Guo and Y. Du, "Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges," in IEEE Access, vol. 8, pp. 11104-11115, 2020, doi: 10.1109/ACCESS.2020.2964804. DOI: https://doi.org/10.1109/ACCESS.2020.2964804
  2. K. Tange, M. De Donno, X. Fafoutis and N. Dragoni, "A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities," in IEEE Communications Surveys & Tutorials, vol. 22, no. 4, pp. 2489-2520, Fourthquarter 2020, doi: 10.1109/COMST.2020.3011208. DOI: https://doi.org/10.1109/COMST.2020.3011208
  3. S. Tu et al., "Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack," in IEEE Access, vol. 6, pp. 74993-75001, 2018, doi: 10.1109/ACCESS.2018.2884672. DOI: https://doi.org/10.1109/ACCESS.2018.2884672
  4. M. Ma, D. He, H. Wang, N. Kumar and K. -K. R. Choo, "An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8065-8075, Oct. 2019, doi: 10.1109/JIOT.2019.2902840. DOI: https://doi.org/10.1109/JIOT.2019.2902840
  5. J. Wu, M. Dong, K. Ota, J. Li and Z. Guan, "FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks," in IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 4, pp. 553-564, 1 Oct.-Dec. 2019, doi: 10.1109/TETC.2017.2747158. DOI: https://doi.org/10.1109/TETC.2017.2747158
  6. Gupta, A. and Prabhat, P., 2022. Towards a resource efficient and privacy-preserving framework for campus-wide video analytics-based applications. Complex & Intelligent Systems, pp.1-16. DOI: https://doi.org/10.1007/s40747-022-00783-w
  7. A. Mourad, H. Tout, O. A. Wahab, H. Otrok and T. Dbouk, "Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection," in IEEE Internet of Things Journal, vol. 8, no. 2, pp. 829-843, 15 Jan.15, 2021, doi: 10.1109/JIOT.2020.3008488. DOI: https://doi.org/10.1109/JIOT.2020.3008488
  8. M. S. Pardeshi and S. -M. Yuan, "SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge," in IEEE Access, vol. 7, pp. 101327-101335, 2019, doi: 10.1109/ACCESS.2019.2930814.
  9. J. Ni, K. Zhang, X. Lin and X. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, Firstquarter 2018, doi: 10.1109/COMST.2017.2762345.
  10. A. K. Junejo, N. Komninos and J. A. McCann, "A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems," in IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6840-6852, 15 April15, 2021, doi: 10.1109/JIOT.2020.3035474. DOI: https://doi.org/10.1109/JIOT.2020.3035474
  11. T. Wang, Y. Liang, Y. Tian, M. Z. A. Bhuiyan, A. Liu and A. T. Asyhari, "Solving Coupling Security Problem for Sustainable Sensor-Cloud Systems Based on Fog Computing," in IEEE Transactions on Sustainable Computing, vol. 6, no. 1, pp. 43-53, 1 Jan.-March 2021, doi: 10.1109/TSUSC.2019.2904651. DOI: https://doi.org/10.1109/TSUSC.2019.2904651
  12. M. Wazid, P. Bagga, A. K. Das, S. Shetty, J. J. P. C. Rodrigues and Y. Park, "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment," in IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8804-8817, Oct. 2019, doi: 10.1109/JIOT.2019.2923611. DOI: https://doi.org/10.1109/JIOT.2019.2923611
  13. X. Liu, W. Chen, Y. Xia and C. Yang, "SE-VFC: Secure and Efficient Outsourcing Computing in Vehicular Fog Computing," in IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3389-3399, Sept. 2021, doi: 10.1109/TNSM.2021.3080138. DOI: https://doi.org/10.1109/TNSM.2021.3080138
  14. J. Zhao, P. Zeng and K. -K. R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health," in IEEE Access, vol. 9, pp. 13789-13799, 2021, doi: 10.1109/ACCESS.2021.3052247.
  15. M. A. Saleem, K. Mahmood and S. Kumari, "Comments on “AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment”," in IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4671-4675, May 2020, doi: 10.1109/JIOT.2020.2975207. DOI: https://doi.org/10.1109/JIOT.2020.2975207
  16. M. Du, K. Wang, X. Liu, S. Guo and Y. Zhang, "A Differential Privacy-Based Query Model for Sustainable Fog Data Centers," in IEEE Transactions on Sustainable Computing, vol. 4, no. 2, pp. 145-155, 1 April-June 2019, doi: 10.1109/TSUSC.2017.2715038. DOI: https://doi.org/10.1109/TSUSC.2017.2715038
  17. L. Lyu, K. Nandakumar, B. Rubinstein, J. Jin, J. Bedo and M. Palaniswami, "PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid," in IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3733-3744, Aug. 2018, doi: 10.1109/TII.2018.2803782. DOI: https://doi.org/10.1109/TII.2018.2803782
  18. J. Zhang, Q. Zhang and S. Ji, "A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8331-8342, Sept. 2020, doi: 10.1109/JIOT.2020.2989578. DOI: https://doi.org/10.1109/JIOT.2020.2989578
  19. J. Kang, R. Yu, X. Huang and Y. Zhang, "Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 8, pp. 2627-2637, Aug. 2018, doi: 10.1109/TITS.2017.2764095. DOI: https://doi.org/10.1109/TITS.2017.2764095
  20. S. Chen, X. Zhu, H. Zhang, C. Zhao, G. Yang and K. Wang, "Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT," in IEEE Transactions on Sustainable Computing, vol. 5, no. 4, pp. 526-540, 1 Oct.-Dec. 2020, doi: 10.1109/TSUSC.2020.2968589. DOI: https://doi.org/10.1109/TSUSC.2020.2968589
  21. J. Ni, K. Zhang, X. Lin and X. Shen, "Securing Fog Computing for Internet of Things Applications: Challenges and Solutions," in IEEE Communications Surveys & Tutorials, vol. 20, no. 1, pp. 601-628, Firstquarter 2018, doi: 10.1109/COMST.2017.2762345. DOI: https://doi.org/10.1109/COMST.2017.2762345
  22. R. Lu, "A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2497-2505, April 2019, doi: 10.1109/JIOT.2018.2871204. DOI: https://doi.org/10.1109/JIOT.2018.2871204
  23. T. Wang, J. Zhou, X. Chen, G. Wang, A. Liu and Y. Liu, "A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing," in IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 3-12, Feb. 2018, doi: 10.1109/TETCI.2017.2764109. DOI: https://doi.org/10.1109/TETCI.2017.2764109
  24. X. Yan et al., "Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing," in IEEE Internet of Things Journal, vol. 8, no. 18, pp. 14127-14140, 15 Sept.15, 2021, doi: 10.1109/JIOT.2021.3068490. DOI: https://doi.org/10.1109/JIOT.2021.3068490
  25. K. Gu, L. Tang, J. Jiang and W. Jia, "Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism," in IEEE Transactions on Computational Social Systems, vol. 7, no. 5, pp. 1246-1263, Oct. 2020, doi: 10.1109/TCSS.2020.3005761. DOI: https://doi.org/10.1109/TCSS.2020.3005761
  26. M. S. Pardeshi and S. -M. Yuan, "SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge," in IEEE Access, vol. 7, pp. 101327-101335, 2019, doi: 10.1109/ACCESS.2019.2930814. DOI: https://doi.org/10.1109/ACCESS.2019.2930814
  27. J. Zhao, P. Zeng and K. -K. R. Choo, "An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health," in IEEE Access, vol. 9, pp. 13789-13799, 2021, doi: 10.1109/ACCESS.2021.3052247. DOI: https://doi.org/10.1109/ACCESS.2021.3052247
  28. Q. Li, Y. Tian, Q. Wu, Q. Cao, H. Shen and H. Long, "A Cloud-Fog-Edge Closed-Loop Feedback Security Risk Prediction Method," in IEEE Access, vol. 8, pp. 29004-29020, 2020, doi: 10.1109/ACCESS.2020.2972032. DOI: https://doi.org/10.1109/ACCESS.2020.2972032
  29. J. Wei, X. Wang, N. Li, G. Yang and Y. Mu, "A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks," in IEEE Access, vol. 6, pp. 43776-43784, 2018, doi: 10.1109/ACCESS.2018.2861430.
  30. G. Li, J. Wu, J. Li, Z. Guan and L. Guo, "Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE," in IEEE Access, vol. 6, pp. 11278-11288, 2018, doi: 10.1109/ACCESS.2018.2799543. DOI: https://doi.org/10.1109/ACCESS.2018.2799543
  31. S. Rathore, P. K. Sharma, A. K. Sangaiah and J. J. Park, "A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing," in IEEE Access, vol. 6, pp. 688-701, 2018, doi: 10.1109/ACCESS.2017.2774837. DOI: https://doi.org/10.1109/ACCESS.2017.2774837
  32. T. Sultana and K. A. Wahid, "IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management," in IEEE Access, vol. 7, pp. 134881-134894, 2019, doi: 10.1109/ACCESS.2019.2941978. DOI: https://doi.org/10.1109/ACCESS.2019.2941978
  33. U. U. Rehman, S. -B. Park and S. Lee, "Secure Health Fog: A Novel Framework for Personalized Recommendations Based on Adaptive Model Tuning," in IEEE Access, vol. 9, pp. 108373-108391, 2021, doi: 10.1109/ACCESS.2021.3101308. DOI: https://doi.org/10.1109/ACCESS.2021.3101308
  34. M. Whaiduzzaman, M. J. N. Mahi, A. Barros, M. I. Khalil, C. Fidge and R. Buyya, "BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture," in IEEE Access, vol. 9, pp. 106655-106674, 2021, doi: 10.1109/ACCESS.2021.3100072. DOI: https://doi.org/10.1109/ACCESS.2021.3100072
  35. M. Wen, S. Chen, R. Lu, B. Li and S. Chen, "Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System," in IEEE Access, vol. 7, pp. 137968-137981, 2019, doi: 10.1109/ACCESS.2019.2942414. DOI: https://doi.org/10.1109/ACCESS.2019.2942414
  36. P. K. Sharma, M. -Y. Chen and J. H. Park, "A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT," in IEEE Access, vol. 6, pp. 115-124, 2018, doi: 10.1109/ACCESS.2017.2757955. DOI: https://doi.org/10.1109/ACCESS.2017.2757955
  37. X. An, X. Lü, L. Yang, X. Zhou and F. Lin, "Node State Monitoring Scheme in Fog Radio Access Networks for Intrusion Detection," in IEEE Access, vol. 7, pp. 21879-21888, 2019, doi: 10.1109/ACCESS.2019.2899017. DOI: https://doi.org/10.1109/ACCESS.2019.2899017
  38. J. Wei, X. Wang, N. Li, G. Yang and Y. Mu, "A Privacy-Preserving Fog Computing Framework for Vehicular Crowdsensing Networks," in IEEE Access, vol. 6, pp. 43776-43784, 2018, doi: 10.1109/ACCESS.2018.2861430. DOI: https://doi.org/10.1109/ACCESS.2018.2861430
  39. M. Whaiduzzaman et al., "A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission," in IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 12, pp. 3564-3575, Dec. 2020, doi: 10.1109/JBHI.2020.3026060. DOI: https://doi.org/10.1109/JBHI.2020.3026060
  40. X. Wang, L. Wang, Y. Li and K. Gai, "Privacy-Aware Efficient Fine-Grained Data Access Control in Internet of Medical Things Based Fog Computing," in IEEE Access, vol. 6, pp. 47657-47665, 2018, doi: 10.1109/ACCESS.2018.2856896. DOI: https://doi.org/10.1109/ACCESS.2018.2856896
  41. R. Saha, G. Kumar, M. K. Rai, R. Thomas and S. -J. Lim, "Privacy Ensured e{e} -Healthcare for Fog-Enhanced IoT Based Applications," in IEEE Access, vol. 7, pp. 44536-44543, 2019, doi: 10.1109/ACCESS.2019.2908664. DOI: https://doi.org/10.1109/ACCESS.2019.2908664