Abstract
The fog computing paradigm presents an extension of the cloud computing in order to more ensure the requirements of Internet of things (IoT). Hence, the growth of fog-IoT system and their openness to their socioeconomic environment has led to new needs in terms of security. There are many damages resulting from security breaches and violations. In order to address these challenges, this article proposes a novel framework to further enhance the data security and privacy and the system performance, for the IoT users trying to connect to fog network. In fact, a trust-based monitoring strategy is suggested to avoid system’s damages and attacks, and also to maintain low latency, because it is easier to avoid damage resulting from security breaches than to wait for a violation and to try to restore and repair the damage caused. The findings of our evaluation indicate that the proposed monitoring process is an efficient solution for system supervision, and detection and prevention attacks, with a fast processing time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ben Daoud, W., Meddeb-Makhlouf, A., Zarai, F.: A model of role-risk based intrusion prevention for cloud environment. In: 2018 14th International Wireless Communications and Mobile Computing Conference, pp. 530–535 (2018)
Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing Fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutorials 20(1), 601–628 (2018)
Abbas, N., Zhang, Y., Taherkordi, A., Skeie, T.: Mobile edge computing: a survey. IEEE Internet Things J. 5(1), 450–465 (2018)
Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)
Gutierrez-Aguado, J., Alcaraz Calero, J.M., Diaz Villanueva, W.: IaaSMon: monitoring architecture for public cloud computing data centers. J. Grid Comput. 14(2), 283–297 (2016)
Ben Daoud, W., Meddeb-Makhlouf, A., Zarai, F., Obaidat, M.S., Hsiao, K.-F.: A distributed access control scheme based on risk and trust for fog-cloud environments. In: Proceedings of 15th International Conference on E-business Telecommunications, vol. 1, ICETE, pp. 296–302 (2018)
Abderrahim, M. et al.: A Holistic Monitoring Service for Fog/Edge Infrastructures: A Foresight Study (2017)
Giri, D., Maitra, T., Obaidat, M.S.: An efficient fog based secure data transmission of healthcare sensors for e-medical system. In: Proceedings of IEEE GlobeCom 2017, Singapore (Dec 2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Daoud, W.B., Meddeb-Makhlouf, A., Zarai, F., Obaidat, M.S. (2020). Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks. In: Venkata Krishna, P., Obaidat, M. (eds) Emerging Research in Data Engineering Systems and Computer Communications. Advances in Intelligent Systems and Computing, vol 1054. Springer, Singapore. https://doi.org/10.1007/978-981-15-0135-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-15-0135-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0134-0
Online ISBN: 978-981-15-0135-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)