Abstract
The goal of this paper is to propose an approach based on DHT toward access control for ad hoc MCC and Fog computing. We rely on Chord DHTs to create a scalable, generic and robust access control solution. We use simulations to evaluate the performances of the proposal. We focus on a set of metrics to measure the overhead of the system. We considered a variable network size, a variable responsible nodes percentage and different hash function as simulation parameter. The obtained results show acceptable overhead for relatively average networks sizes. Simulations show that all the metrics increase with the nodes number and the number of responsible nodes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Aazam, M., Huh, E.N.: Fog computing and smart gateway based communication for cloud of things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 464–470. IEEE (2014)
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: a peer-to-peer framework for trust establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827–842 (2004)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)
Cirani, S., Veltri, L.: Implementation of a framework for a dht-based distributed location service. In: 16th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2008, pp. 279–283. IEEE (2008)
Dabek, F., Brunskill, E., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I., Balakrishnan, H.: Building peer-to-peer systems with chord, a distributed lookup service. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 81–86. IEEE (2001)
Dsouza, C., Ahn, G.J., Taguinod, M.: Policy-driven security management for fog computing: preliminary framework and a case study. In: 2014 IEEE 15th International Conference on Information Reuse and Integration (IRI), pp. 16–23. IEEE (2014)
Fenkam, P., Dustdar, S., Kirda, E., Reif, G., Gall, H.: Towards an access control system for mobile peer-to-peer collaborative environments. In: Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 95–100. IEEE (2002)
González, E.P.: Content authentication and access control in pure peer-to-peer networks. Universidad Carlos Iii De Madrid (2008)
Gupta, R., Bhide, M.: A generic XACML based declarative authorization scheme for Java. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 44–63. Springer, Heidelberg (2005)
Hajibaba, M., Gorgin, S.: A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing. CIT. J. Comput. Inf. Technol. 22(2), 69–84 (2014)
Hasan, O., Pierson, J.M., Brunie, L.: Access control in ubiquitous environments based on subjectivity eliminated trust propagation. In: IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2008, vol. 2, pp. 603–609. IEEE (2008)
Kahanwal, D., Singh, D.T., et al.: The distributed computing paradigms: P2P, grid, cluster, cloud, and jungle. arXiv preprint arXiv:1311.3070 (2013)
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun. Surv. Tutorials 7(2), 72–93 (2005)
Lv, E., Duan, Z., Qi, J.J., Cao, Y., Peng, Z.: Incorporating clusters into hybrid P2P network. In: First International Conference on the Digital Society, ICDS 2007, p. 17. IEEE (2007)
Marinelli, E.E.: Hyrax: cloud computing on mobile devices using mapreduce. Technical report, DTIC Document (2009)
Park, J.S., Hwang, J.: Role-based access control for collaborative enterprise in peer-to-peer computing environments. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 93–99. ACM (2003)
Salonikias, S., Mavridis, I., Gritzalis, D.: Access control issues in utilizing fog computing for transport infrastructure. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds.) CRITIS 2015. LNCS, vol. 9578, pp. 15–26. Springer, Heidelberg (2016). doi:10.1007/978-3-319-33331-1_2
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)
Sibakov, S.: Simulating a Mobile Peer-to-Peer Network. Ph.D. thesis. Citeseer (2009)
Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 1–8. IEEE (2014)
Tran, H., Hitchens, M., Varadharajan, V., Watters, P.: A trust based access control framework for P2P file-sharing systems. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS 2005, p. 302c. IEEE (2005)
Winslett, M., Zhang, C.C., Bonatti, P.A.: Peeraccess: a logic for distributed authorization. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 168–179. ACM (2005)
Zhang, Y., Li, X., Huai, J., Liu, Y.: Access control in peer-to-peer collaborative systems. In: 25th IEEE International Conference on Distributed Computing Systems Workshops, pp. 835–840. IEEE (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Zaghdoudi, B., Kaffel-Ben Ayed, H., Harizi, W. (2016). Generic Access Control System for Ad Hoc MCC and Fog Computing. In: Foresti, S., Persiano, G. (eds) Cryptology and Network Security. CANS 2016. Lecture Notes in Computer Science(), vol 10052. Springer, Cham. https://doi.org/10.1007/978-3-319-48965-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-48965-0_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48964-3
Online ISBN: 978-3-319-48965-0
eBook Packages: Computer ScienceComputer Science (R0)