Authors:
Wided Ben Daoud
1
;
Amel Meddeb-Makhlouf
1
;
Faouzi Zarai
1
;
Mohammad. S. Obaidat
2
and
Kuei-Fang Hsiao
3
Affiliations:
1
NTS’Com Research Unit, ENET’COM, University of Sfax, Sfax and Tunisia
;
2
Department of ECE, Nazarbayev University, Astana, Kazakhstan, University of Jordan, Amman and Jordan
;
3
Ming-Chuan University and Taiwan
Keyword(s):
Fog Computing, Access Control, Risk, Trust, Resource Manager, Monitoring.
Related
Ontology
Subjects/Areas/Topics:
Ad Hoc Networks of Autonomous Intelligent Systems
;
Sensor, Mesh and Ad Hoc Communications and Networks
;
Telecommunications
;
Wireless Information Networks and Systems
Abstract:
Fog computing is a technology, which benefits from both Cloud Computing and Internet of Things paradigms. Instead of centralizing the information stored in the cloud, the idea in the fog environment is to use devices located at the edge of the network to prevent congestion during data exchanges. Since its development, the fog computing was integrated in numerous applications, including, connected vehicles (v2x), and smart cities, among others. Furthermore, the fog environment is highly variable within the resources as it varies dynamically. Therefore, a careful management of resources is essential for maximizing the efficiency of this distributed environment. That is why, the access control to resources is one of the challenging issues to be taken into account to enhance security in fog environments. In this paper, we develop a novel distributed fog-cloud computing mechanism for access control based on trust and risk estimation. We evaluate the performance of the novel approach throu
gh appropriate simulations, which improves system performance by minimizing the time spent to have permissions to access services and optimizing the overall system resource utilization.
(More)