Skip to main content

Advertisement

Log in

Hybrid Secure Equivalent Computing Model for Distributed Computing Applications

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Distributed computing applications provide concurrent processing and services executed from different systems through a common cloud platform. However, without modifications or adaptable security measures, such concurrency presents a great challenge to the proper administration of security. This paper introduces a hybrid secure equivalent computing model to address this security issue. The proposed security model was designed using a genetic algorithm for equivalent measure distribution over the processing systems. Via this model, variations in security management owing to differences in the processing times of various services can be mitigated using the probabilistic annealing method. This method helps to preserve the stability of the security method without decreasing its robustness. For robust processing, the model exploits parallel security as a service feature from the cloud with a non-tokenized key sharing method. The key sharing and revocation processes are determined using the probabilistic outcomes of the annealing method. The genetic process verifies the distribution of security measures in the key sequence of any possible processing combination without compromise. The performance of the proposed model was verified using the metrics of process failure, computational complexity, time delay, false rate, and computing level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Availability of Data

No data, models, or code were generated.

References

  1. Bruschi, R., Davoli, F., Lago, P., & Pajo, J. F. (2019). A multi-clustering approach to scale distributed tenant networks for mobile edge computing. IEEE Journal on Selected Areas in Communications, 37(3), 499–514.

    Article  Google Scholar 

  2. Jia, Y. H., Chen, W. N., Gu, T., Zhang, H., Yuan, H. Q., Kwong, S., et al. (2018). Distributed cooperative co-evolution with adaptive computing resource allocation for large scale optimization. IEEE Transactions on Evolutionary Computation, 23(2), 188–202.

    Article  Google Scholar 

  3. Alarifi, A., & Tolba, A. (2019). Optimizing the network energy of cloud assisted internet of things by using the adaptive neural learning approach in wireless sensor networks. Computers in Industry, 106, 133–141.

    Article  Google Scholar 

  4. Al-Makhadmeh, Z., & Tolba, A. (2020). An intelligence-based recurrent learning scheme for optimal channel allocation and selection in device-to-device communications. Circuits, Systems, and Signal Processing, 39(2), 997–1018.

    Article  Google Scholar 

  5. Gu, F., Niu, J., Jin, X., & Yu, S. (2020). FDFA: A fog computing assisted distributed analytics and detecting system for family activities. Peer-to-Peer Networking and Applications, 13(1), 38–52.

    Article  Google Scholar 

  6. Win, T. Y., Tianfield, H., & Mair, Q. (2017). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data, 4(1), 11–25.

    Article  Google Scholar 

  7. Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., & Lv, W. (2019). Edge computing security: State of the art and challenges. Proceedings of the IEEE, 107(8), 1608–1631.

    Article  Google Scholar 

  8. Shahid, F., Ashraf, H., Ghani, A., Ghayyur, S. A. K., Shamshirband, S., & Salwana, E. (2020). PSDS—proficient security over distributed storage: A method for data transmission in cloud. IEEE Access, 8, 118285–118298.

    Article  Google Scholar 

  9. Li, Z., Hu, H., Huang, B., Chen, J., Li, C., Hu, H., et al. (2020). Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing. Multimedia Tools and Applications, 79, 10751–10780.

    Article  Google Scholar 

  10. Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C. Z., Li, H., et al. (2019). Secure multi-party computation: Theory, practice and applications. Information Sciences, 476, 357–372.

    Article  Google Scholar 

  11. Wang, J., Zhu, Y., & Maqbool, S. (2020). An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2020.05.001. (in press).

  12. ulHaq, I., Wang, J., Zhu, Y., & Maqbool, S. (2020). A survey of authenticated key agreement protocols for multi-server architecture. Journal of Information Security and Applications, 55, 102639.

    Article  Google Scholar 

  13. Hsu, C. L., Le, T. V., Lu, C. F., Lin, T. W., & Chuang, T. H. (2020). A privacy-preserved E2E authenticated key exchange protocol for multi-server architecture in edge computing networks. IEEE Access, 8, 40791–40808.

    Article  Google Scholar 

  14. Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., & Bentaleb, A. (2019). Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks, 94, 101948.

    Article  Google Scholar 

  15. Zhang, Y., Shen, Y., Wang, H., Zhang, Y., & Jiang, X. (2015). On secure wireless communications for service oriented computing. IEEE Transactions on Services Computing, 11(2), 318–328.

    Article  Google Scholar 

  16. Jiang, Q., Ma, J., & Wei, F. (2016). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 12(2), 2039–2042.

    Article  Google Scholar 

  17. Fawcett, L., Scott-Hayward, S., Broadbent, M., Wright, A., & Race, N. (2018). Tennison: a distributed SDN framework for scalable network security. IEEE Journal on Selected Areas in Communications, 36(12), 2805–2818.

    Article  Google Scholar 

  18. Liang, J., Zhang, M., & Leung, V. C. (2020). A reliable trust computing mechanism based on multi-source feedback and fog computing in social sensor cloud. IEEE Internet of Things Journal, 7(6), 5481–5490.

    Article  Google Scholar 

  19. Hasan, M. M., & Mouftah, H. T. (2017). Cloud-centric collaborative security service placement for advanced metering infrastructures. IEEE Transactions on Smart Grid, 10(2), 1339–1348.

    Article  Google Scholar 

  20. Medhane, D. V., Sangaiah, A. K., Hossain, M. S., Muhammad, G., & Wang, J. (2020). Blockchain-enabled distributed security framework for next generation IoT: An edge-cloud and software defined network integrated approach. IEEE Internet of Things Journal, 7(7), 6143–6149.

    Article  Google Scholar 

  21. Pešić, S., Ivanović, M., Radovanović, M., & Bădică, C. (2020). CAAVI-RICS model for observing the security of distributed IoT and edge computing systems. Simulation Modelling Practice and Theory, 105, 102125.

    Article  Google Scholar 

  22. Noura, H., Salman, O., Chehab, A., & Couturier, R. (2019). Preserving data security in distributed fog computing. Ad Hoc Networks, 94, 101937.

    Article  Google Scholar 

  23. Bonnah, E., & Shiguang, J. (2020). DecChain: A decentralized security approach in edge computing based on blockchain. Future Generation Computer Systems, 113, 363–379.

    Article  Google Scholar 

  24. Mohamed, M. I. B., Hassan, M. F., Safdar, S., & Saleem, M. Q. (2019). Adaptive security architectural model for protecting identity federation in service oriented computing. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2019.03.004. (in press).

  25. Kayes, A. S. M., Rahayu, W., Watters, P., Alazab, M., Dillon, T., & Chang, E. (2020). Achieving security scalability and flexibility using fog-based context-aware access control. Future Generation Computer Systems, 107, 307–323.

    Article  Google Scholar 

  26. Zhong, H., Sheng, J., Xu, Y., & Cui, J. (2019). SCPLBS: A smart cooperative platform for load balancing and security on SDN distributed controllers. Peer-to-Peer Networking and Applications, 12(2), 440–451.

    Article  Google Scholar 

  27. Yuan, X., Cai, C., Wang, C., & Wang, Q. (2020). A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Transactions on Networking, 3, 97–111.

    Article  Google Scholar 

  28. Ramadan, Q., Strüber, D., Salnitri, M., Jürjens, J., Riediger, V., & Staab, S. (2020). A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Software and Systems Modeling, 19, 1191–1227.

    Article  Google Scholar 

  29. Chaudhry, S. A., Kim, I. L., Rho, S., Farash, M. S., & Shon, T. (2019). An improved anonymous authentication scheme for distributed mobile cloud computing services. Cluster Computing, 22(1), 1595–1609.

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to extend their gratitude to King Saud University (Riyadh, Saudi Arabia) for funding this research through the Researchers Supporting Project number (RSP-2020/260).

Funding

King Saud University (Riyadh, Saudi Arabia): Researchers Supporting Project number (RSP-2020/260).

Author information

Authors and Affiliations

Authors

Contributions

Aldosary Saad- Writing an original paper.

Corresponding author

Correspondence to Aldosary Saad.

Ethics declarations

Conflict of interest

None.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors. All medical imaging data used in this work were anonymized before provision.

Informed Consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saad, A. Hybrid Secure Equivalent Computing Model for Distributed Computing Applications. Wireless Pers Commun 127, 319–339 (2022). https://doi.org/10.1007/s11277-021-08265-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08265-x

Keywords

Navigation