Skip to main content

Blockchain-Based Security Services for Fog Computing

  • Chapter
  • First Online:
Fog/Edge Computing For Security, Privacy, and Applications

Part of the book series: Advances in Information Security ((ADIS,volume 83))

Abstract

Fog computing is a paradigm for distributed computing that enables sharing of resources such as computing, storage and network services. Unlike cloud computing, fog computing platforms primarily support non-functional properties such as location awareness, mobility and reduced latency. This emerging paradigm has many potential applications in domains such as smart grids, smart cities, and transport management.

Most of these domains collect and monitor personal information through edge devices to offer personalized services. A centralized server either at the level of cloud or fog, has been found ineffective to provide a high degree of security and privacy-preserving services.

Blockchain technology supports the development of decentralized applications designed around the principles of immutability, cryptography, consistency preserving consensus protocols and smart contracts. Hence blockchain technology has emerged as a preferred technology in recent times to build trustworthy distributed applications.

The chapter describes the potential of blockchain technology to realize security services such as authentication, secured communication, availability, privacy and trust management to support the development of dependable fog services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmad, M., Amin, M.B., Hussain, S., Kang, B.H., Cheong, T., Lee, S.: Health fog: a novel framework for health and wellness applications. J. Supercomput. 72(10), 3677–3695 (2016)

    Article  Google Scholar 

  2. Al Omar, A., Rahman, M.S., Basu, A., Kiyomoto, S.: MediBchain: A blockchain based privacy preserving platform for healthcare data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 534–543. Springer, Berlin (2017)

    Google Scholar 

  3. Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of iot devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1–8. IEEE, Piscataway (2018)

    Google Scholar 

  4. Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M., El-Hajj, W.: Smart grid security: Threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012)

    Article  Google Scholar 

  5. Barik, R.K., Dubey, H., Samaddar, A.B., Gupta, R.D., Ray, P.K.: FogGIS: Fog computing for geospatial big data analytics. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), pp. 613–618. IEEE, Piscataway (2016)

    Google Scholar 

  6. Bertino, E., Thuraisingham, B., Gertz, M., Damiani, M.L.: Security and privacy for geospatial data: concepts and research directions. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 6–19 (2008)

    Google Scholar 

  7. Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013)

    Article  Google Scholar 

  8. Brennand, C.A.R.L., da Cunha, F.D., Maia, G., Cerqueira, E., Loureiro, A.A.F., Villas, L.A.: Fox: A traffic management system of computer-based vehicles fog. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 982–987. IEEE, Piscataway (2016)

    Google Scholar 

  9. Cui, J., Liew, L.S., Sabaliauskaite, G., Zhou, F.: A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Netw. 90, 101823 (2019)

    Article  Google Scholar 

  10. Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)

    Article  Google Scholar 

  11. Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623. IEEE, Piscataway (2017)

    Google Scholar 

  12. Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: Safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)

    Article  Google Scholar 

  13. Goutas, L., Sutanto, J., Aldarbesti, H.: The building blocks of a cloud strategy: evidence from three SaaS providers. Commun. ACM 59(1), 9097 (2015)

    Article  Google Scholar 

  14. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Security 78, 126–142 (2018)

    Article  Google Scholar 

  15. He, D., Chan, S., Guizani, M.: Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 24(4), 134–139 (2016)

    Article  Google Scholar 

  16. Iqbal, R., Butt, T.A., Afzaal, M., Salah, K.: Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sensor Netw. 15(1), 1550147719825820 (2019)

    Article  Google Scholar 

  17. Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585–590. IEEE, Piscataway (2012)

    Google Scholar 

  18. Lee, J.-G., Kang, M.: Geospatial big data: challenges and opportunities. Big Data Res. 2(2), 74–81 (2015)

    Article  Google Scholar 

  19. Lee, J., Bagheri, B., Kao, H.-A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufact. Lett. 3, 18–23 (2015)

    Google Scholar 

  20. Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.: Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204–2220 (2018)

    Article  Google Scholar 

  21. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468–477. IEEE, Piscataway (2017)

    Google Scholar 

  22. Liserre, M., Sauter, T., Hung, J.Y.: Future energy systems: integrating renewable energy sources into the smart power grid through industrial electronics. IEEE Ind. Electr. Mag. 4(1), 18–37 (2010)

    Article  Google Scholar 

  23. Lu, N., Cheng, N., Zhang, N., Shen, X., Mark, J.W.: Connected vehicles: solutions and challenges. IEEE Internet Things J. 1(4), 289–299 (2014)

    Article  Google Scholar 

  24. Lu, Z., Wang, Q., Qu, G., Liu, Z.: Bars: A blockchain-based anonymous reputation system for trust management in vanets. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 98–103. IEEE, Piscataway (2018)

    Google Scholar 

  25. Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Trans. Smart Grid 1(1), 99–107 (2010)

    Article  Google Scholar 

  26. Moinet, A., Darties, B., Baril, J.-L.: Blockchain based trust & authentication for decentralized sensor networks (2017). Preprint. arXiv:1706.01730

    Google Scholar 

  27. O’donovan, P., Gallagher, C., Bruton, K., O’Sullivan, D.T.J.: A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manufact. Lett. 15, 139–142 (2018)

    Google Scholar 

  28. Okay, F.Y., Ozdemir, S.: A fog computing based smart grid model. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE, Piscataway (2016)

    Google Scholar 

  29. Perallos, A., Hernandez-Jayo, U., Onieva, E., Zuazola, I.J.G.: Intelligent Transport Systems: Technologies and Applications. Wiley, Hoboken (2015)

    Book  Google Scholar 

  30. Pereira, T., Barreto, L., Amaral, A.: Network and information security challenges within industry 4.0 paradigm. Procedia Manufact. 13, 1253–1260 (2017)

    Google Scholar 

  31. Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A., Rana, O.: Fog computing for the internet of things: a survey. ACM Trans. Internet Technol. 19(2), 1–41 (2019)

    Article  Google Scholar 

  32. Rodday, N.M., Schmidt, R. de O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994. IEEE, Piscataway (2016)

    Google Scholar 

  33. Saini, S.L., Saini, D.K., Yousif, J.H., Khandage, S.V.: Cloud computing and enterprise resource planning systems. In: Proceedings of the World Congress on Engineering, vol. 1, pp. 681–684 (2011)

    Google Scholar 

  34. Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)

    Article  Google Scholar 

  35. Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digital Content Technol. Appl. 3(3), 178–184 (2009)

    Google Scholar 

  36. Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for VM-based cloudlets in mobile computing. IEEE Pervas. Comput. 8(4), 14–23 (2009)

    Article  Google Scholar 

  37. Siegel, J.E., Erb, D.C., Sarma, S.E.: A survey of the connected vehicle landscape—architectures, enabling technologies, applications, and development areas. IEEE Trans. Intell. Transp. Syst. 19(8), 2391–2406 (2017)

    Article  Google Scholar 

  38. Tuli, S., Mahmud, R., Tuli, S., Buyya, R.: FogBus: a blockchain-based lightweight framework for edge and fog computing. J. Syst. Softw. 154, 22–36 (2019)

    Article  Google Scholar 

  39. Van Brakel, R., De Hert, P.: Policing, surveillance and law in a pre-crime society: understanding the consequences of technology based strategies. Technol.-led Policing 20, 165–92 (2011)

    Google Scholar 

  40. Varshney, P., Simmhan, Y.: Demystifying fog computing: Characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 115–124. IEEE, Piscataway (2017)

    Google Scholar 

  41. Xu, R., Nikouei, S.Y., Chen, Y., Blasch, E., Aved, A.: BlendMAS: A blockchain-enabled decentralized microservices architecture for smart public safety. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 564–571. IEEE, Piscataway (2019)

    Google Scholar 

  42. Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. 52(3), 1–34 (2019)

    Article  Google Scholar 

  43. Ziyad, S., Rehman, S.: Critical review of authentication mechanisms in cloud computing. Int. J. Comput. Sci. Issues 11(3), 145 (2014)

    Google Scholar 

  44. Zyskind, G., Nathan, O., et al.: Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE, Piscataway (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arvind W. Kiwelekar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kiwelekar, A.W., Patil, P., Netak, L.D., Waikar, S.U. (2021). Blockchain-Based Security Services for Fog Computing. In: Chang, W., Wu, J. (eds) Fog/Edge Computing For Security, Privacy, and Applications. Advances in Information Security, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-030-57328-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-57328-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-57327-0

  • Online ISBN: 978-3-030-57328-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics