A Hash-Based Naming Strategy for the Fog-to-Cloud Computing Paradigm
The growth of the Internet connected devices population has fuelled the emergence of new distributed computer paradigms; one of these paradigms is the so-called Fog-to-Cloud (F2C) computing, where resources (compute, storage, data) are distributed in a hierarchical fashion between the edge and the core of the network. This new paradigm has brought new research challenges, such as the need for a novel framework intended to controlling and, more in general, facilitating the interaction among the heterogeneous devices conforming the environment at the edge of the network and the available resources at cloud. A key feature that this framework should meet is the capability of uniquely and unequivocally identify the connected devices. In this paper a hash-based naming strategy suitable to be used in the F2C environment is presented. The proposed naming method is based on three main components: certification, hashing and identification. This research is an ongoing work, thus, the steps to follow since a device connects to the F2C network until it receives a name are described and the major challenges that must be solved are analyzed.
KeywordsNaming Identification Fog-to-Cloud Internet of Things
This work is supported by the H2020 mF2C project (730929), as well as by the Spanish Ministry of Economy and Competitiveness and by the European Regional Development Fund under contract TEC2015-66220-R (MINECO/FEDER).
- 1.Datta, S.K., Da Costa, R.P.F., Bonnet, C.: Resource discovery in Internet of Things: current trends and future standardization aspects. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 542–547 (2015)Google Scholar
- 3.OpenFog Consortium: OpenFog Reference Architecture for Fog Computing (2017)Google Scholar
- 4.European Research Cluster on the Internet of Things: EU-China Joint White Paper on Internet-of-Things Identification (2014)Google Scholar
- 5.Li, Y., Jain, R.: Naming in the Internet of Things (2013)Google Scholar
- 6.Webster, C.: WebNS: model for a peer-to-peer name service. Monash University (2011)Google Scholar
- 7.Easttom, C.: Modern Cryptography: Applied Mathematics for Encryption and Information Security. McGraw-Hill Education, New York (2015)Google Scholar
- 8.Kumar Raghuvanshi, K., Khurana, P., Bindal, P.: Study and comparative analysis of different hash algorithm. JECAS 3 (2014)Google Scholar
- 9.Farrell, S., Dannewitz., C, Ohlman, B., et al.: Naming Things with Hashes (2013). https://doi.org/10.17487/rfc6920
- 11.Yan, Z., Kong, N., Tian, Y., Park, Y.J.: A universal object name resolution scheme for IoT. In: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1120–1124 (2013)Google Scholar
- 12.Balakrichenan, S.: Why DNS should be the naming service for Internet of Things? (2016)Google Scholar