Abstract
Fog computing is a paradigm for distributed computing that enables sharing of resources such as computing, storage and network services. Unlike cloud computing, fog computing platforms primarily support non-functional properties such as location awareness, mobility and reduced latency. This emerging paradigm has many potential applications in domains such as smart grids, smart cities, and transport management.
Most of these domains collect and monitor personal information through edge devices to offer personalized services. A centralized server either at the level of cloud or fog, has been found ineffective to provide a high degree of security and privacy-preserving services.
Blockchain technology supports the development of decentralized applications designed around the principles of immutability, cryptography, consistency preserving consensus protocols and smart contracts. Hence blockchain technology has emerged as a preferred technology in recent times to build trustworthy distributed applications.
The chapter describes the potential of blockchain technology to realize security services such as authentication, secured communication, availability, privacy and trust management to support the development of dependable fog services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmad, M., Amin, M.B., Hussain, S., Kang, B.H., Cheong, T., Lee, S.: Health fog: a novel framework for health and wellness applications. J. Supercomput. 72(10), 3677–3695 (2016)
Al Omar, A., Rahman, M.S., Basu, A., Kiyomoto, S.: MediBchain: A blockchain based privacy preserving platform for healthcare data. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 534–543. Springer, Berlin (2017)
Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., Salah, K.: A user authentication scheme of iot devices using blockchain-enabled fog nodes. In: 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1–8. IEEE, Piscataway (2018)
Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M., El-Hajj, W.: Smart grid security: Threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012)
Barik, R.K., Dubey, H., Samaddar, A.B., Gupta, R.D., Ray, P.K.: FogGIS: Fog computing for geospatial big data analytics. In: 2016 IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics Engineering (UPCON), pp. 613–618. IEEE, Piscataway (2016)
Bertino, E., Thuraisingham, B., Gertz, M., Damiani, M.L.: Security and privacy for geospatial data: concepts and research directions. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 6–19 (2008)
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., Assi, C.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013)
Brennand, C.A.R.L., da Cunha, F.D., Maia, G., Cerqueira, E., Loureiro, A.A.F., Villas, L.A.: Fox: A traffic management system of computer-based vehicles fog. In: 2016 IEEE Symposium on Computers and Communication (ISCC), pp. 982–987. IEEE, Piscataway (2016)
Cui, J., Liew, L.S., Sabaliauskaite, G., Zhou, F.: A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Netw. 90, 101823 (2019)
Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623. IEEE, Piscataway (2017)
Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: Safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)
Goutas, L., Sutanto, J., Aldarbesti, H.: The building blocks of a cloud strategy: evidence from three SaaS providers. Commun. ACM 59(1), 9097 (2015)
Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput. Security 78, 126–142 (2018)
He, D., Chan, S., Guizani, M.: Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 24(4), 134–139 (2016)
Iqbal, R., Butt, T.A., Afzaal, M., Salah, K.: Trust management in social internet of vehicles: factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sensor Netw. 15(1), 1550147719825820 (2019)
Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), pp. 585–590. IEEE, Piscataway (2012)
Lee, J.-G., Kang, M.: Geospatial big data: challenges and opportunities. Big Data Res. 2(2), 74–81 (2015)
Lee, J., Bagheri, B., Kao, H.-A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufact. Lett. 3, 18–23 (2015)
Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.: Creditcoin: a privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transp. Syst. 19(7), 2204–2220 (2018)
Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp. 468–477. IEEE, Piscataway (2017)
Liserre, M., Sauter, T., Hung, J.Y.: Future energy systems: integrating renewable energy sources into the smart power grid through industrial electronics. IEEE Ind. Electr. Mag. 4(1), 18–37 (2010)
Lu, N., Cheng, N., Zhang, N., Shen, X., Mark, J.W.: Connected vehicles: solutions and challenges. IEEE Internet Things J. 1(4), 289–299 (2014)
Lu, Z., Wang, Q., Qu, G., Liu, Z.: Bars: A blockchain-based anonymous reputation system for trust management in vanets. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 98–103. IEEE, Piscataway (2018)
Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Trans. Smart Grid 1(1), 99–107 (2010)
Moinet, A., Darties, B., Baril, J.-L.: Blockchain based trust & authentication for decentralized sensor networks (2017). Preprint. arXiv:1706.01730
O’donovan, P., Gallagher, C., Bruton, K., O’Sullivan, D.T.J.: A fog computing industrial cyber-physical system for embedded low-latency machine learning industry 4.0 applications. Manufact. Lett. 15, 139–142 (2018)
Okay, F.Y., Ozdemir, S.: A fog computing based smart grid model. In: 2016 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE, Piscataway (2016)
Perallos, A., Hernandez-Jayo, U., Onieva, E., Zuazola, I.J.G.: Intelligent Transport Systems: Technologies and Applications. Wiley, Hoboken (2015)
Pereira, T., Barreto, L., Amaral, A.: Network and information security challenges within industry 4.0 paradigm. Procedia Manufact. 13, 1253–1260 (2017)
Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A., Rana, O.: Fog computing for the internet of things: a survey. ACM Trans. Internet Technol. 19(2), 1–41 (2019)
Rodday, N.M., Schmidt, R. de O., Pras, A.: Exploring security vulnerabilities of unmanned aerial vehicles. In: NOMS 2016–2016 IEEE/IFIP Network Operations and Management Symposium, pp. 993–994. IEEE, Piscataway (2016)
Saini, S.L., Saini, D.K., Yousif, J.H., Khandage, S.V.: Cloud computing and enterprise resource planning systems. In: Proceedings of the World Congress on Engineering, vol. 1, pp. 681–684 (2011)
Sakiz, F., Sen, S.: A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw. 61, 33–50 (2017)
Saleem, S., Ullah, S., Yoo, H.S.: On the security issues in wireless body area networks. Int. J. Digital Content Technol. Appl. 3(3), 178–184 (2009)
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for VM-based cloudlets in mobile computing. IEEE Pervas. Comput. 8(4), 14–23 (2009)
Siegel, J.E., Erb, D.C., Sarma, S.E.: A survey of the connected vehicle landscape—architectures, enabling technologies, applications, and development areas. IEEE Trans. Intell. Transp. Syst. 19(8), 2391–2406 (2017)
Tuli, S., Mahmud, R., Tuli, S., Buyya, R.: FogBus: a blockchain-based lightweight framework for edge and fog computing. J. Syst. Softw. 154, 22–36 (2019)
Van Brakel, R., De Hert, P.: Policing, surveillance and law in a pre-crime society: understanding the consequences of technology based strategies. Technol.-led Policing 20, 165–92 (2011)
Varshney, P., Simmhan, Y.: Demystifying fog computing: Characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 115–124. IEEE, Piscataway (2017)
Xu, R., Nikouei, S.Y., Chen, Y., Blasch, E., Aved, A.: BlendMAS: A blockchain-enabled decentralized microservices architecture for smart public safety. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 564–571. IEEE, Piscataway (2019)
Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. 52(3), 1–34 (2019)
Ziyad, S., Rehman, S.: Critical review of authentication mechanisms in cloud computing. Int. J. Comput. Sci. Issues 11(3), 145 (2014)
Zyskind, G., Nathan, O., et al.: Decentralizing privacy: Using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE, Piscataway (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kiwelekar, A.W., Patil, P., Netak, L.D., Waikar, S.U. (2021). Blockchain-Based Security Services for Fog Computing. In: Chang, W., Wu, J. (eds) Fog/Edge Computing For Security, Privacy, and Applications. Advances in Information Security, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-030-57328-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-57328-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57327-0
Online ISBN: 978-3-030-57328-7
eBook Packages: Computer ScienceComputer Science (R0)