首页> 外文期刊>Journal of Parallel and Distributed Computing >COMITMENT: A Fog Computing Trust Management Approach
【24h】

COMITMENT: A Fog Computing Trust Management Approach

机译:承诺:雾计算信任管理方法

获取原文
获取原文并翻译 | 示例
           

摘要

As an extension of cloud computing, fog computing is considered to be relatively more secure than cloud computing due to data being transiently maintained and analyzed on local fog nodes closer to data sources. However, there exist several security and privacy concerns when fog nodes collaborate and share data to execute certain tasks. For example, offloading data to a malicious fog node can result into an unauthorized collection or manipulation of users' private data. Cryptographic-based techniques can prevent external attacks, but are not useful when fog nodes are already authenticated and part of a networks using legitimate identities. We therefore resort to trust to identify and isolate malicious fog nodes and mitigate security, respectively. In this paper, we present a fog COMputIng Trust manageMENT (COMITMENT) approach that uses quality of service and quality of protection history measures from previous direct and indirect fog node interactions for assessing and managing the trust level of the nodes within the fog computing environment. Using COMITMENT approach, we were able to reduce/identify the malicious attacks/interactions among fog nodes by approximately 66%, while reducing the service response time by approximately 15 s.
机译:作为云计算的延伸,由于在较近数据源上的本地雾节点上瞬时维护和分析,雾计算被认为与云计算相对安全。但是,当FOG节点协作并共享数据以执行某些任务时,存在多种安全性和隐私问题。例如,将数据卸载到恶意迷雾节点可能导致未经授权的收集或操作用户的私有数据。基于加密的技术可以防止外部攻击,但是当雾节点已经经过身份验证和使用合法身份的一部分网络时都没有用。因此,我们可以信任识别和隔离恶意雾节点并分别减轻安全性。在本文中,我们提出了一种雾计算信任管理(分组)方法,它使用先前直接和间接雾节点交互的服务质量和保护历史质量,以评估和管理雾计算环境中节点的信任级别。使用复合方法,我们能够减少/识别雾节点之间的恶意攻击/相互作用约66%,同时将服务响应时间减少大约15秒。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号