loading
Papers

Research.Publish.Connect.

Paper

Authors: Wided Ben Daoud 1 ; Amel Meddeb-Makhlouf 1 ; Faouzi Zarai 1 ; Mohammad. S. Obaidat 2 and Kuei-Fang Hsiao 3

Affiliations: 1 NTS’Com Research Unit, ENET’COM, University of Sfax, Sfax and Tunisia ; 2 Department of ECE, Nazarbayev University, Astana, Kazakhstan, University of Jordan, Amman and Jordan ; 3 Ming-Chuan University and Taiwan

ISBN: 978-989-758-319-3

Keyword(s): Fog Computing, Access Control, Risk, Trust, Resource Manager, Monitoring.

Related Ontology Subjects/Areas/Topics: Ad Hoc Networks of Autonomous Intelligent Systems ; Sensor, Mesh and Ad Hoc Communications and Networks ; Telecommunications ; Wireless Information Networks and Systems

Abstract: Fog computing is a technology, which benefits from both Cloud Computing and Internet of Things paradigms. Instead of centralizing the information stored in the cloud, the idea in the fog environment is to use devices located at the edge of the network to prevent congestion during data exchanges. Since its development, the fog computing was integrated in numerous applications, including, connected vehicles (v2x), and smart cities, among others. Furthermore, the fog environment is highly variable within the resources as it varies dynamically. Therefore, a careful management of resources is essential for maximizing the efficiency of this distributed environment. That is why, the access control to resources is one of the challenging issues to be taken into account to enhance security in fog environments. In this paper, we develop a novel distributed fog-cloud computing mechanism for access control based on trust and risk estimation. We evaluate the performance of the novel approach throug h appropriate simulations, which improves system performance by minimizing the time spent to have permissions to access services and optimizing the overall system resource utilization. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.85.245.126

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Ben Daoud, W.; Meddeb-Makhlouf, A.; Zarai, F.; S. Obaidat, M. and Hsiao, K. (2018). A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2: ICETE, ISBN 978-989-758-319-3, pages 296-302. DOI: 10.5220/0006848504620468

@conference{icete18,
author={Wided Ben Daoud. and Amel Meddeb{-}Makhlouf. and Faouzi Zarai. and Mohammad S. Obaidat. and Kuei{-}Fang Hsiao.},
title={A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2: ICETE,},
year={2018},
pages={296-302},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006848504620468},
isbn={978-989-758-319-3},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2: ICETE,
TI - A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments
SN - 978-989-758-319-3
AU - Ben Daoud, W.
AU - Meddeb-Makhlouf, A.
AU - Zarai, F.
AU - S. Obaidat, M.
AU - Hsiao, K.
PY - 2018
SP - 296
EP - 302
DO - 10.5220/0006848504620468

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.