A Novel and Scalable Naming Strategy for IoT Scenarios

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 880)


Fog-to-Cloud (F2C) is a novel paradigm aimed at increasing the benefits brought by the growing Internet-of-Things (IoT) devices population at the edge of the network. F2C is intended to manage the available resources from the core to the edge of the network, allowing services to choose and use either a specific cloud or fog offer or a combination of both. Recognized the key benefits brought by F2C systems, such as low-latency for real-time services, location awareness services, mobility support and the possibility to process data close to where they are generated, research efforts are being made towards the creation of a widely accepted F2C architecture. However, in order to achieve the desired F2C control framework, many open challenges must be solved. In this paper, we address the identity management challenges and propose an Identity Management System (IDMS) that is based on the fragmentation of the network resource IDs. In our approach, we divide the IDs into smaller fragments and then, when two nodes connect, they use a portion of their full ID (n fragments) for mutual identification. The conducted experiments have shown that an important reduction in both, the query execution times and the space required to store IDs, can be achieved when our IDMS is applied.


IDMS Identity management Fog-to-Cloud Resource identity 



This work is supported by the H2020 mF2C project (730929) by the Spanish Ministry of Economy and Competitiveness and by the European Regional Development Fund both under contract TEC2015-66220-R (MINECO/FEDER), and for Alejandro Gómez-Cárdenas by the Consejo Nacional de Ciencia y Tecnología de los Estados Unidos Mexicanos (CONACyT) under Grant No. 411640.


  1. 1.
    Evans, D.: The Internet of Things: How the Next Evolution of the Internet is Changing Everything (2011) Google Scholar
  2. 2.
    Burkert, A.: Modern Cars’ Insatiable Appetite for Data (2017)CrossRefGoogle Scholar
  3. 3.
    Mehdipour, F., Javadi, B., Mahanti, A.: FOG-engine: towards big data analytics in the fog. In: 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), pp. 640–646 (2016)Google Scholar
  4. 4.
    Ferrer-Roca, O., Roca, D., Nemirovsky, M., Milito, R.: The health fog. Small data on health cloud. Presented at the International eHealth, Telemedicine and Health ICT Forum for Educational, Networking and Business, Luxembourg, 23 April 2015Google Scholar
  5. 5.
    Firdhous, M., Ghazali, O., Hassan, S.: Fog computing: will it be the future of cloud computing? Presented at the proceedings of the third international conference on informatics and applications, Kuala Terengganu, Malaysia (2014)Google Scholar
  6. 6.
    Masip-Bruin, X., Marín-Tordera, E., Jukan, A., Ren, G.-J., Tashakor, G.: Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud (F2C) computing systems (2016)Google Scholar
  7. 7.
    OpenFog Consortium: OpenFog Reference Architecture for Fog Computing, USA (2017)Google Scholar
  8. 8.
    mF2C Consortium: mF2C Project.
  9. 9.
    Sarkar, S., Misra, S.: Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw. 5, 23–29 (2016)CrossRefGoogle Scholar
  10. 10.
    Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3, 637–646 (2016)CrossRefGoogle Scholar
  11. 11.
    European Telecommunications Standards Institute: Corporate telecommunication Networks (CN); User Identification in a SIP/QSIG Environment (2004)Google Scholar
  12. 12.
    Cao, J., Xu, L., Abdallah, R., Shi, W.: EdgeOS_H: a home operating system for internet of everything. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1756–1764 (2017)Google Scholar
  13. 13.
    Nuñez, D., Agudo, I.: BlindIdM: a privacy-preserving approach for identity management as a service. Int. J. Inf. Secur. 13, 199–215 (2014)CrossRefGoogle Scholar
  14. 14.
    Chen, J., Liu, Y., Chai, Y.: An identity management framework for Internet of Things. In: 2015 IEEE 12th International Conference on e-Business Engineering, pp. 360–364 (2015)Google Scholar
  15. 15.
    Fu, Z., Jing, X., Sun, S.: Application-based identity management in M2M system. In: 2011 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2011), pp. 211–215 (2011)Google Scholar
  16. 16.
    Farrell, S., Kutscher, D., Dannewitz, C., Ohlman, B., Keranen, A., Hallam-Baker, P.: Naming Things with Hashes (2013)Google Scholar
  17. 17.
    Bouk, S.H., Ahmed, S.H., Kim, D.: Hierarchical and hash based naming with Compact Trie name management scheme for vehicular content centric networks. Comput. Commun. 71, 73–83 (2015)CrossRefGoogle Scholar
  18. 18.
    Savolainen, T., Soininen, J., Silverajan, B.: IPv6 addressing strategies for IoT. IEEE Sens. J. 13, 3511–3519 (2013)CrossRefGoogle Scholar
  19. 19.
    Gómez-Cárdenas, A., Masip-Bruin, X., Marín-Tordera, E., Kahvazadeh, S., Garcia, J.: A hash-based naming strategy for the fog-to-cloud computing paradigm. In: Heras, D.B., Bougé, L., Mencagli, G., Jeannot, E., Sakellariou, R., Badia, R.M., Barbosa, J.G., Ricci, L., Scott, S.L., Lankes, S., Weidendorfer, J. (eds.) Euro-Par 2017: Parallel Processing Workshops, pp. 316–324. Springer, Cham (2018)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Advanced Network Architectures Lab (CRAAX)Universitat Politècnica de Catalunya (UPC)BarcelonaSpain

Personalised recommendations