Abstract
Critical infrastructures are bringing security, and safety for people in terms of healthcare, water, electricity, industry, transportation, etc. The huge amount of data produced by CIs need to be aggregated, filtered, and stored. Cloud computing was merged into the CIs for utilizing cloud data centers as a pay-as-you-go online computing system for outsourcing services for data storage, filtering and aggregating. On the other hand, CIs need real-time processing for providing sophisticated services to people. Consequently, fog computing is merged into CIs aimed at providing services closer to the users, turning into a smooth real-time decision making and processing. When considering both, that is fog and cloud (for example, deploying the recently coined hierarchical fog-to-cloud F2C concept), new enriched features may be applied to the CIs. Security in CIs is one of the most essential challenges since any failure or attack can turn into a national wise disaster. Moreover, CIs also need to support quality of service (QoS) guarantees for users. Thus, bringing balanced QoS vs security is one of the main challenges for any CI infrastructure. In this paper, we illustrate the benefits of deploying an F2C system in CIs, particularly identifying specific F2C security requirements to be applied to CIs. Finally, we also introduce a decoupled security architecture specifically tailored to CIs that can bring security with reasonable QoS in terms of authentication and key distribution time delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Simon, T.: Critical infrastructure and the internet of things. Cyber Security in a Volatile World (2017)
González-Martínez, J.A., et al.: Cloud computing and education: a state-of-the-art survey. Comput. Educ. 80, 132–151 (2015)
Yi, S., et al.: A survey of fog computing: concepts, applications and issues. In: Workshop on Mobile Big Data (2015)
Masip-Bruin, X., et al.: Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel. Commun. 23, 120–128 (2016)
Kahvazadeh, S., et al.: Securing combined fog-to-cloud system through SDN approach. In: Crosscloud (2017)
Kahvazadeh, S., et al.: Balancing security guarantees vs QoS provisioning in combined fog-to-cloud systems. In: 10th IFIP International Conference on New Technologies, Mobility & Security (NTMS) (2019)
mF2C project. http://www.mf2c-project.eu. Accessed Apr 2018
Barbosa, V., et al.: Towards a fog-to-cloud control topology for QoS aware end-to-end communications. In: IEEE/ACM International Symposium on Quality of Service, (IWQoS 2017), Vilanova i la Geltrú, Spain, June 2017
Cipsec project. http://www.cipsec.eu/
Ni, J., et al.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20, 601–628 (2017)
Martin, B.A., et al.: OpenFog security requirements and approaches. In: Fog World Congress (2017)
Kahvazadeh, S., Masip-Bruin, X., Marín-Tordera, E., Cárdenas, A.G.: Securing combined fog-to-cloud systems: challenges and directions. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) FTC 2019. AISC, vol. 1069, pp. 877–892. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-32520-6_63
Acknowledgment
This work has been supported by the Spanish Ministry of Science, Innovation and Universities and the European Regional Development Fund (FEDER) under contract RTI2018-094532-B-I00, and by the H2020 European Union mF2C project with reference 730929.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kahvazadeh, S., Masip-Bruin, X., Marcer, P., Marín-Tordera, E. (2020). Deploying Fog-to-Cloud Towards a Security Architecture for Critical Infrastructure Scenarios. In: Fournaris, A., et al. Computer Security. IOSEC MSTEC FINSEC 2019 2019 2019. Lecture Notes in Computer Science(), vol 11981. Springer, Cham. https://doi.org/10.1007/978-3-030-42051-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-42051-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42050-5
Online ISBN: 978-3-030-42051-2
eBook Packages: Computer ScienceComputer Science (R0)