Resource identification in fog-to-cloud systems: toward an identity management strategy

  • Alejandro Gómez-CárdenasEmail author
  • Xavi Masip-Bruin
  • Eva Marín-Tordera
  • Sarang Kahvazadeh
Original Article


Fog-to-Cloud (F2C) is a novel paradigm aiming at extending the cloud computing capabilities to the edge of the network through the hierarchical and coordinated management of both, centralized cloud datacenters and distributed fog resources. It will allow all kinds of devices that are capable to connect to the F2C network to share its idle resources and access both, service provider and third parties’ resources to expand its own capabilities. However, despite the numerous advantages offered by the F2C model, such as the possibility of offloading delay-sensitive tasks to a nearby device and using the cloud infrastructure in the execution of resource-intensive tasks, the list of open challenges that needs to be addressed to have a deployable F2C system is pretty long. In this paper we focus on the resource identification challenge, proposing an identity management system (IDMS) solution that starts assigning identifiers (IDs) to the devices in the F2C network in a decentralized fashion using hashes and afterwards, manages the usage of those IDs applying a fragmentation technique. The obtained results during the validation phase show that our proposal not only meets the desired IDMS characteristics, but also that the fragmentation strategy is aligned with the constrained nature of the devices in the lowest tier of the network hierarchy.


Identity management Identification Idms Resource identity Fog-to-cloud resource identification 



This work is supported by the H2020 mF2C project (730929), by the Spanish Ministry of Economy and Competitiveness and by the European Regional Development Fund both under contract TEC2015-66220-R (MINECO/FEDER), and for Alejandro Gómez-Cárdenas by the Consejo Nacional de Ciencia y Tecnología de los Estados Unidos Mexicanos (CONACyT), under Grant No. 411640.


  1. 1.
    Evans D (2011) The Internet of Things: how the next evolution of the internet is changing everything. CISCO White Paper. Cisco Internet Business Solutions Group (IBSG).
  2. 2.
    Datta SK, Da Costa RPF, Bonnet C (2015) Resource discovery in Internet of Things: current trends and future standardization aspects. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). pp 542–547Google Scholar
  3. 3.
    Zhou Y, Zhang D, Xiong N (2017) Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol 22:714–732CrossRefzbMATHGoogle Scholar
  4. 4.
    Firdhous M, Ghazali O, Hassan S (2014) Fog computing: will it be the future of cloud computing? Presented at the proceedings of the third international conference on informatics and applications, Kuala Terengganu, MalaysiaGoogle Scholar
  5. 5.
    Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on mobile cloud computing. pp 15–20. ACM, New York, NY, USAGoogle Scholar
  6. 6.
    Hong H (2017) From cloud computing to fog computing: unleash the power of edge and end devices. In: 2017 IEEE international conference on cloud computing technology and science (CloudCom). pp 331–334Google Scholar
  7. 7.
    OpenFog Consortium: OpenFog reference architecture for fog computing (2017)Google Scholar
  8. 8.
    mF2C Consortium: mF2C project overview.
  9. 9.
    Masip-Bruin X, Marín-Tordera E, Tashakor G, Jukan A, Ren GJ (2016) Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel Commun 23:120–128CrossRefGoogle Scholar
  10. 10.
    Ramirez W, Masip-Bruin X, Marin-Tordera E, Souza VBC, Jukan A, Ren G-J, de Dios OG (2017) Evaluating the benefits of combined and continuous Fog-to-Cloud architectures. Comput Commun 113:43–52CrossRefGoogle Scholar
  11. 11.
    Liu Y, Fieldsend JE, Min G (2017) A framework of fog computing: architecture, challenges, and optimization. IEEE Access 5:25445–25454CrossRefGoogle Scholar
  12. 12.
    Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3:637–646CrossRefGoogle Scholar
  13. 13.
    Leskinen J (2012) Evaluation criteria for future identity management. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. pp 801–806Google Scholar
  14. 14.
    Cao J, Xu L, Abdallah R, Shi W (2017) EdgeOS_H: a home operating system for internet of everything. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). pp 1756–1764Google Scholar
  15. 15.
    Feng W, Yan Z, Zhang H, Zeng K, Xiao Y, Hou YT (2018) A survey on security, privacy, and trust in mobile crowdsourcing. IEEE Internet Things J 5:2971–2992CrossRefGoogle Scholar
  16. 16.
    Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things. IEEE Internet Things J 1:372–383CrossRefGoogle Scholar
  17. 17.
    ETSI: human factors (HF): user identification solutions in converging networks (2001)Google Scholar
  18. 18.
    Craig Webster: WebNS: model for a peer-to-peer name service (2011).
  19. 19.
    Unify Solutions Community (2016) Identity and access: about—identity and access.
  20. 20.
    Balasubramaniam S, Lewis GA, Morris E, Simanta S, Smith DB (2009) Identity management and its impact on federation in a system-of-systems context. In: 2009 3rd annual IEEE systems conference. pp 179–182Google Scholar
  21. 21.
    Kaffel-Ben Ayed H, Boujezza H, Riabi I (2017) An IDMS approach towards privacy and new requirements in IoT. In: 2017 13th international wireless communications and mobile computing conference (IWCMC). pp 429–434Google Scholar
  22. 22.
    OpenID: What is OpenID?
  23. 23.
    Tapiador A, Mendo A (2011) A survey on OpenID identifiers. In: 2011 7th international conference on next generation web services practices. pp 357–362Google Scholar
  24. 24.
    Jain A, Prasad MVNK (2016) A novel fingerprint indexing scheme using dynamic clustering. J Reliab Intell Environ 2:159–171CrossRefGoogle Scholar
  25. 25.
    Jaafar F (2017) An integrated architecture for IoT fingerprinting. In: 2017 IEEE international conference on software quality, reliability and security companion (QRS-C). pp 601–602Google Scholar
  26. 26.
    Banda G, Bommakanti CK, Mohan H (2016) One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible. J Reliab Intell Environ 2:131–144CrossRefGoogle Scholar
  27. 27.
    Balakrichenan S (2016) Why DNS should be the naming service for Internet of Things?Google Scholar
  28. 28.
    Sharma G, Kalra S (2017) A secure remote user authentication scheme for smart cities e-governance applications. J Reliab Intell Environ 3:177–188CrossRefGoogle Scholar
  29. 29.
    Suguna M, Anusia R, Shalinie SM, Deepti S (2017) Secure identity management in mobile cloud computing. In: 2017 international conference on nextgen electronic technologies: silicon to software (ICNETS2). pp 42–45Google Scholar
  30. 30.
    Moskowitz R, Heer T, Jokela P, Henderson T (2015) Host identity protocol version 2 (HIPv2).
  31. 31.
    Yang X, Ji X (2008) Host identity protocol—realizing the separation of the location and host identity. In: 2008 international conference on information and automation. pp 749–752Google Scholar
  32. 32.
    Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing. pp 506–509. ACM, Marrakech, MoroccoGoogle Scholar
  33. 33.
    Zhang P, Sun H, Yan Z (2011) Building up trusted identity management in mobile heterogeneous environment. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. pp 873–877Google Scholar
  34. 34.
    Trnka M, Cerny T (2016) Identity management of devices in internet of things environment. In: 2016 6th international conference on it convergence and security (ICITCS). pp 1–4Google Scholar
  35. 35.
    Gómez-Cárdenas A, Masip-Bruin X, Marín-Tordera E, Kahvazadeh S, Garcia J (2018) A hash-based naming strategy for the fog-to-cloud computing paradigm. In: Heras DB, Bougé L, Mencagli G, Jeannot E, Sakellariou R, Badia RM, Barbosa JG, Ricci L, Scott SL, Lankes S, Weidendorfer J (eds) Euro-Par 2017: parallel processing workshops. Springer International Publishing, New York, pp 316–324CrossRefGoogle Scholar
  36. 36.
    (2015) National Institute of Standards and Technology: SHA-3 standard: permutation-based hash and extendable-output functions.
  37. 37.
    Gomez-Cárdenas A, Masip-Bruin X, Marin-Tordera E, Kahvazadeh S, Garcia J (2018) A resource identity management strategy for combined fog-to-cloud systems. In: 2018 IEEE 19th international symposium on “a world of wireless, mobile and multimedia networks” (WoWMoM). pp 01–06Google Scholar
  38. 38.
    Sarkar S, Misra S (2016) Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw 5:23–29CrossRefGoogle Scholar
  39. 39.
    Farrell, S., Dannewitz, C., Ohlman, B., Kutscher, D., Hallam-Baker, P., Keränen, A.: Naming Things with Hashes. RFC Editor (2013)Google Scholar
  40. 40.
    Bouk SH, Ahmed SH, Kim D (2015) Hierarchical and hash based naming with compact trie name management scheme for vehicular content centric networks. Comput Commun 71:73–83CrossRefGoogle Scholar
  41. 41.
    Savolainen T, Soininen J, Silverajan B (2013) IPv6 addressing strategies for IoT. IEEE Sens J 13:3511–3519CrossRefGoogle Scholar
  42. 42.
    Arduino: Arduino UNO WiFi Rev2.
  43. 43.
    (2016) Raspberry Pi foundation: raspberry Pi 3 model B,

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Advanced Network Architectures Lab (CRAAX)Universitat Politècnica de CatalunyaBarcelonaSpain

Personalised recommendations