Privacy Enhancing for Fog Computing based - IoT

Full Text (PDF, 876KB), PP.1-13

Views: 0 Downloads: 0

Author(s)

Samaa Y. Tarabay 1,* Ibrahim Yasser 1 Ahmed S. Samrah 1 Abeer T. Khalil 1

1. Mansoura University / Communication and Electronics Engineering Department, Mansoura, 35516, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2023.03.01

Received: 14 Nov. 2022 / Revised: 22 Dec. 2022 / Accepted: 3 Mar. 2023 / Published: 8 Jun. 2023

Index Terms

Fog computing, Internet of things (IOT), Data security & Privacy, Aggregation, DF

Abstract

With the massive inflation of newly developed technologies, recourse to data has become a necessity in light of the current inflation and excessive need dominating the world and developed societies. According to the control of millions of smart devices and sensors connected to an interconnected and controlled automated system within installed scales due to the services provided by IOT devices through the created fog layer that connects the cloud centers and those devices, in addition, very large amounts of that data including public and private are passed through the connection of Internet of Things devices to each other. Smart and advanced networks as one of the fog computing applications play a prominent and accurate role in the infrastructure for reliable and sound data transmission. Accordingly, the process of data aggregation is an important and common matter in the world of fog-enhancing Internet of Things, so preserving the privacy of that data is a matter of concern, and based on this principle, we propose in this paper a model for data aggregation that maintains privacy using a foggy computing environment called PPFDA (privacy preserving based- fog computing data aggregation). We use in our scheme DF homomorphic cryptosystem as it consider one of the aggregation models that ensures the privacy purpose. The theoretical results and analyzes show that our design is ensuring the privacy of data during collection using an algorithm of DF. The results confirm that the proposed scheme achieves security and privacy purposes in modern network systems for the Internet of things based in fog computing. In addition, it contributes significantly to the efficient performance of storage operations.

Cite This Paper

Samaa Y. Tarabay, Ibrahim Yasser, Ahmed S. Samra, Abeer T. Khalil, "Privacy Enhancing for Fog Computing based - IoT", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.13, No.3, pp. 1-13, 2023. DOI:10.5815/ijwmt.2023.03.01

Reference

[1]Abou-Tair, D. E. D., Buechsenstein, S., & Khalifeh, A. (2020). A fog computing-based framework for privacy preserving IoT environments. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 17(3), 306-315.
[2]Butun, I., Sari, A., & Österberg, P. (2019, January). Security implications of fog computing on the internet of things. In 2019 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-6). IEEE.
[3]Wang, X., Wang, L., Li, Y., & Gai, K. (2018). Privacy-aware efficient fine-grained data access control in Internet of medical things based fog computing. IEEE Access, 6, 47657-47665.
[4]Zhou, W., Jia, Y., Peng, A., Zhang, Y., & Liu, P. (2018). The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of things Journal, 6(2), 1606-1616.
[5]Amin, R., Kunal, S., Saha, A., Das, D., & Alamri, A. (2020). CFSec: Password based secure communication protocol in cloud-fog environment. Journal of Parallel and Distributed Computing, 140, 52-62.
[6]Alzoubi, Y. I., Osmanaj, V. H., Jaradat, A., & Al‐Ahmad, A. (2021). Fog computing security and privacy for the Internet of Thing applications: State‐of‐the‐art. Security and Privacy, 4(2), e145.
[7]Razouk, W., Sgandurra, D., & Sakurai, K. (2017, October). A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. In Proceedings of the 1st international conference on internet of things and machine learning (pp. 1-8).
[8]Zhang, P., Zhou, M., & Fortino, G. (2018). Security and trust issues in fog computing: A survey. Future Generation Computer Systems, 88, 16-27.
[9]Guan, Y., Shao, J., Wei, G., & Xie, M. (2018). Data security and privacy in fog computing. IEEE Network, 32(5), 106-111.
[10]Dhiah El Diehn, I., Büchsenstein, S., & Khalifeh, A. (2018, June). A Privacy Preserving Framework for the Internet of Things. In 2018 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (pp. 27-31). IEEE.
[11]Khalid, T., Abbasi, M. A. K., Zuraiz, M., Khan, A. N., Ali, M., Ahmad, R. W. & Aslam, M. (2021). A survey on privacy and access control schemes in fog computing. International Journal of Communication Systems, 34(2), e4181.
[12]Lu, R., Heung, K., Lashkari, A. H., & Ghorbani, A. A. (2017). A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE access, 5, 3302-3312.
[13]Zhu, L., Li, M., Zhang, Z., Xu, C., Zhang, R., Du, X., & Guizani, N. (2019). Privacy-preserving authentication and data aggregation for fog-based smart grid. IEEE Communications Magazine, 57(6), 80-85.
[14]Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Ma, Y., & Hu, J. (2019). APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. Journal of Network and Computer Applications, 125, 82-92.
[15]Okay, F. Y., & Ozdemir, S. (2018, April). A secure data aggregation protocol for fog computing based smart grids. In 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power Engineering (CPE-POWERENG 2018) (pp. 1-6). IEEE.
[16]Alabdulatif, A., & Kaosar, M. (2016). Privacy preserving cloud computation using Domingo-Ferrer scheme. Journal of King Saud University-Computer and Information Sciences, 28(1), 27-36.
[17]Şimşek, M. U., Yıldırım Okay, F., Mert, D., & Özdemir, S. (2018). TPS3: A privacy preserving data collection protocol for smart grids. Information Security Journal: A Global Perspective, 27(2), 102-118.
[18]Shen, X., Zhu, L., Xu, C., Sharif, K., & Lu, R. (2020). A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Information Sciences, 514, 118-130.
[19]Lin, X., Ni, J., & Xuemin (Sherman) Shen. (2018). Privacy-enhancing fog computing and its applications. Basel: Springer International Publishing.
[20]Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., & Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 98, 289-330.
[21]Rahmani, A. M., Liljeberg, P., Preden, J. S., & Jantsch, A. (Eds.). (2017). Fog computing in the internet of things: Intelligence at the edge. Springer.
[22]Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.
[23]Alamer, A. (2021). Security and privacy-awareness in a software-defined Fog computing network for the Internet of Things. Optical Switching and Networking, 41, 100616.
[24]Sen, A. A. A., & Yamin, M. (2021). Advantages of using fog in IoT applications. International Journal of Information Technology, 13(3), 829-837.
[25]Ashi, Z., Al-Fawa’reh, M., & Al-Fayoumi, M. (2020). Fog computing: security challenges and countermeasures. Int. J. Comput. Appl, 175(15), 30-36.
[26]Sabireen, H., & Neelanarayanan, V. (2021). A review on fog computing: architecture, fog with IoT, algorithms and research challenges. Ict Express, 7(2), 162-176.
[27]Ali, A., Ahmed, M., Imran, M., & Khattak, H. A. (2020). Security and privacy issues in fog computing. Fog Computing: Theory and Practice, 105-137.
[28]Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34-42.
[29]Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012, August). Fog computing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing (pp. 13-16).
[30]Lu, R., Liang, X., Li, X., Lin, X., & Shen, X. (2012). EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Transactions on Parallel and Distributed Systems, 23(9), 1621-1631.
[31]Yan, Y., Qian, Y., Sharif, H., & Tipper, D. (2012). A survey on cyber security for smart grid communications. IEEE Communications Surveys & Tutorials, 14(4), 998-1010.
[32]Yang, L., Xue, H., & Li, F. (2014, November). Privacy-preserving data sharing in smart grid systems. In 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm) (pp. 878-883). IEEE.
[33]Bellavista, P., Berrocal, J., Corradi, A., Das, S. K., Foschini, L., & Zanni, A. (2019). A survey on fog computing for the Internet of Things. Pervasive and mobile computing, 52, 71-99.
[34]Liu, J., Li, J., Zhang, L., Dai, F., Zhang, Y., Meng, X., & Shen, J. (2018). Secure intelligent traffic light control using fog computing. Future Generation Computer Systems, 78, 817-824.
[35]Yildirim Okay, F., Ozdemir, S., & Xiao, Y. (2020). Fog computing‐based privacy preserving data aggregation protocols. Transactions on Emerging Telecommunications Technologies, 31(4), e3900.