Skip to main content

Generic Access Control System for Ad Hoc MCC and Fog Computing

  • Conference paper
  • First Online:
Cryptology and Network Security (CANS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10052))

Included in the following conference series:

Abstract

The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MCC and Fog computing. We rely on Chord DHTs to create a scalable, generic and robust access control solution. We use simulations to evaluate the performances of the proposal. We focus on a set of metrics to measure the overhead of the system. We considered a variable network size, a variable responsible nodes percentage and different hash function as simulation parameter. The obtained results show acceptable overhead for relatively average networks sizes. Simulations show that all the metrics increase with the nodes number and the number of responsible nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aazam, M., Huh, E.N.: Fog computing and smart gateway based communication for cloud of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 464–470. IEEE (2014)

    Google Scholar 

  2. Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: a peer-to-peer framework for trust establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827–842 (2004)

    Article  Google Scholar 

  3. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)

    Google Scholar 

  4. Cirani, S., Veltri, L.: Implementation of a framework for a dht-based distributed location service. In: 16th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2008, pp. 279–283. IEEE (2008)

    Google Scholar 

  5. Dabek, F., Brunskill, E., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I., Balakrishnan, H.: Building peer-to-peer systems with chord, a distributed lookup service. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 81–86. IEEE (2001)

    Google Scholar 

  6. Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: preliminary framework and a case study. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 16–23. IEEE (2014)

    Google Scholar 

  7. Fenkam, P., Dustdar, S., Kirda, E., Reif, G., Gall, H.: Towards an access control system for mobile peer-to-peer collaborative environments. In: Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 95–100. IEEE (2002)

    Google Scholar 

  8. González, E.P.: Content authentication and access control in pure peer-to-peer networks. Universidad Carlos Iii De Madrid (2008)

    Google Scholar 

  9. Gupta, R., Bhide, M.: A generic XACML based declarative authorization scheme for Java. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 44–63. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Hajibaba, M., Gorgin, S.: A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing. CIT. J. Comput. Inf. Technol. 22(2), 69–84 (2014)

    Article  Google Scholar 

  11. Hasan, O., Pierson, J.M., Brunie, L.: Access control in ubiquitous environments based on subjectivity eliminated trust propagation. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, vol. 2, pp. 603–609. IEEE (2008)

    Google Scholar 

  12. Kahanwal, D., Singh, D.T., et al.: The distributed computing paradigms: P2P, grid, cluster, cloud, and jungle. arXiv preprint arXiv:1311.3070 (2013)

  13. Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun. Surv. Tutorials 7(2), 72–93 (2005)

    Article  Google Scholar 

  14. Lv, E., Duan, Z., Qi, J.J., Cao, Y., Peng, Z.: Incorporating clusters into hybrid P2P network. In: First International Conference on the Digital Society, ICDS 2007, p. 17. IEEE (2007)

    Google Scholar 

  15. Marinelli, E.E.: Hyrax: cloud computing on mobile devices using mapreduce. Technical report, DTIC Document (2009)

    Google Scholar 

  16. Park, J.S., Hwang, J.: Role-based access control for collaborative enterprise in peer-to-peer computing environments. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 93–99. ACM (2003)

    Google Scholar 

  17. Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 15–26. Springer, Heidelberg (2016). doi:10.1007/978-3-319-33331-1_2

    Chapter  Google Scholar 

  18. Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)

    Article  Google Scholar 

  19. Sibakov, S.: Simulating a Mobile Peer-to-Peer Network. Ph.D. thesis. Citeseer (2009)

    Google Scholar 

  20. Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1–8. IEEE (2014)

    Google Scholar 

  21. Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS 2005, p. 302c. IEEE (2005)

    Google Scholar 

  22. Winslett, M., Zhang, C.C., Bonatti, P.A.: Peeraccess: a logic for distributed authorization. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 168–179. ACM (2005)

    Google Scholar 

  23. Zhang, Y., Li, X., Huai, J., Liu, Y.: Access control in peer-to-peer collaborative systems. In: 25th IEEE International Conference on Distributed Computing Systems Workshops, pp. 835–840. IEEE (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bilel Zaghdoudi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Zaghdoudi, B., Kaffel-Ben Ayed, H., Harizi, W. (2016). Generic Access Control System for Ad Hoc MCC and Fog Computing. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. Lecture Notes in Computer Science(), vol 10052. Springer, Cham. https://doi.org/10.1007/978-3-319-48965-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48965-0_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48964-3

  • Online ISBN: 978-3-319-48965-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics