Advertisement

Maintaining Fog Trust Through Continuous Assessment

  • Hasan Ali KhattakEmail author
  • Muhammad Imran
  • Assad Abbas
  • Samee U. Khan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11517)

Abstract

Cloud computing continues to provide flexible and efficient way for delivery of services, meeting user requirements and challenges of the time. Software, Infrastructures, and Platforms are provided as services in cloud and fog computing in a cost-effective manner. Migration towards fog instigate new aspects of research for security & privacy. Trust is dependent on measures taken for availability, security, and privacy of users’ services as well as data in fog as well as sharing of these statistics with stakeholders. Any type of lapses in measures for security & privacy shatter user’s trust. In order to provide a trust worthy security and privacy system, we have conducted a thorough survey of existing techniques. A generic model for trustworthiness is proposed in this paper. This model yields a comprehensive component-based architecture of a trust management system to aid fog service providers to preserve users’ Trust in a fog computing environment.

Keywords

Fog computing Security and privacy Trust management Trustworthiness 

Notes

Acknowledgements

This work has been partially supported through Startup Research Grant Projects No. (21 – 1122/SRGP/R&D/HEC/2016) by the Higher Education Commission (HEC) Pakistan. We also thankfully acknowledge the services from COMSATS University, Islamabad and would like to thank Dr. M. Ahmad, Dr. A Khan for supporting us in valuable technical and scientific aid.

The work of Samee U. Khan is based upon works supported by (while serving at) the National Science Foundation. Any opinions, findings, and conclusions or suggestions expressed in this manuscript are those of the authors and do not necessarily reflect the view of National Science Foundation.

References

  1. 1.
    Firdhous, M., Ghazali, O., Hassan, S.: Trust management in cloud computing: a critical review. arXiv Prepr. arXiv:1211.3979 (2012)
  2. 2.
    Cisco Systems. Fog computing and the internet of things: extend the cloud to where the things are, p. 6 (2016). Www.Cisco.Com
  3. 3.
    Arshad, H., Khattak, H.A., Shah, M.A., Abbas, A., Zoobia, A.: Evaluation and analysis of bio-inspired optimization techniques for bill estimation in fog computing. Int. J. Adv. Comput. Sci. Appl. 9(7), 191–198 (2018)Google Scholar
  4. 4.
    Salman, O., Elhajj, I., Kayssi, A., Chehab, A.: Edge computing enabling the Internet of Things. In: Proceedings of IEEE World Forum on Internet of Things, WF-IoT 2015, pp. 603–608 (2016)Google Scholar
  5. 5.
    Rabai, L.B.A., Jouini, M., Ben Aissa, A., Mili, A.: A cybersecurity model in cloud computing environments. J. King Saud Univ. Inf. Sci. 25(1), 63–75 (2013)CrossRefGoogle Scholar
  6. 6.
    Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2010 Second International Conference on Engineering Systems Management and Its Applications (ICESMA), pp. 1–7 (2010)Google Scholar
  7. 7.
    Nitti, M., Girau, R., Atzori, L., Iera, A., Morabito, G.: A subjective model for trustworthiness evaluation in the social internet of things. In: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 18–23 (2012)Google Scholar
  8. 8.
    Martucci, L.A., Zuccato, A., Smeets, B., Habib, S.M., Johansson, T., Shahmehri, N.: Privacy, security and trust in cloud computing: the perspective of the telecommunication industry. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 627–632 (2012)Google Scholar
  9. 9.
    Li, X., Du, J.: Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf. Secur. 7(1), 39–50 (2013)CrossRefGoogle Scholar
  10. 10.
    Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurrency Comput. Pract. Exp. 28(10), 2991–3005 (2015)CrossRefGoogle Scholar
  11. 11.
    Liang, G.: Automatic traffic accident detection based on the internet of things and support vector machine. Int. J. Smart Home 9(4), 97–106 (2015)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Proceedings of 2014 Federated Conference on Computer Science and Information Systems, vol. 2, pp. 1–8 (2014)Google Scholar
  13. 13.
    Khan, S.U., Khan, R.: Content-location based key management scheme for content centric networks. In: Proceedings of 6th International Conference on Security of Information and Networks - SIN 2013, pp. 376–379 (2013)Google Scholar
  14. 14.
    Muzammal, S.M., et al.: Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 6, 20722–20733 (2018)CrossRefGoogle Scholar
  15. 15.
    Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 185–210. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48749-2_8CrossRefGoogle Scholar
  16. 16.
    Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)CrossRefGoogle Scholar
  17. 17.
    Noor, T.H., Sheng, Q.Z.: Trust as a service: a framework for trust management in cloud environments. In: Bouguettaya, A., Hauswirth, M., Liu, L. (eds.) WISE 2011. LNCS, vol. 6997, pp. 314–321. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-24434-6_27CrossRefGoogle Scholar
  18. 18.
    Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)CrossRefGoogle Scholar
  19. 19.
    Kang, D., Jung, J., Mun, J., Lee, D., Choi, Y., Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)CrossRefGoogle Scholar
  20. 20.
    Aazam, M., St-Hilaire, M., Lung, C.-H., Lambadaris, I., Huh, E.-N.: IoT resource estimation challenges and modeling in fog. In: Rahmani, A.M., Liljeberg, P., Preden, J.-S., Jantsch, A. (eds.) Fog Computing in the Internet of Things, pp. 17–31. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-57639-8_2CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Hasan Ali Khattak
    • 1
    Email author
  • Muhammad Imran
    • 1
  • Assad Abbas
    • 1
  • Samee U. Khan
    • 2
  1. 1.Department of Computer ScienceCOMSATS University IslamabadIslamabadPakistan
  2. 2.Department of Electrical and Computer EngineeringNorth Dakota State UniversityFargoUSA

Personalised recommendations