nature of fog. In fact, for higher number of dispersed
services, the allocation results in a shorter delay.
Actually, if the user is trustable, he will have his
requested services, whether this latter is either locally
in fog nodes or far in foreign cloud data center.
Hence, compared to other traditional solution like in
(Dastjerdi and Buyya, 2016) the time spent for access
to remote resources is decreasing. The strong point
of our model is its ability to not overload the network
and this by setting up an architecture of access control
and monitoring taking place in a short time and
indicating that it is fast and efficient. Furthermore, we
can say that our model is secure. Thus, it is based on
the calculation of risk and trust. Besides, the
monitoring system is present to supervise and
discover if there are violations or malicious activities.
It intervenes to protect the system against destruction.
In the concept of the proposed solution, if the
requested resources are located in foreign cloud
services, the system is able to bring these services
without repeating the access control procedure from
the beginning. In fact, due to the monitoring system
and the resource manager, the time spent will
decrease towards half and that is a good result, which
proves that the proposed scheme is effective.
Moreover, the experimental results show higher
performance when using a distributed architecture for
controlling the access to the system.
4 CONCLUSIONS
The main characteristic of fog computing is its
effective management of resources. The distributed
nature of this environment and the deployment of an
access control strategy bring many challenges such as
deciding on the extension of collaborative work and
the limit of resources sharing. Therefore, it is
necessary to secure access to these resources. Hence,
there is a need to develop a new distributed trust-
based access control models that are adaptable to fog
computing. In fact, to decrease heavy computational
and communication overhead on service providers or
data owners, we propose a dynamic and distributed
access control strategy for fog computing based on
risk and trust evaluation in order to improve the
efficiency of fog resources’ deployment and satisfy
the users’ security requirements.
We began by describing the fog paradigm and
then identifying the need for a distributed strategy for
controlling access to fog-cloud systems. Simulation
was performed with an OpenStack platform in Linux.
Simulation results show that our proposed distributed
scheme can provide secure and efficient access
control management for users and then improve the
utilization of fog-cloud services.
REFERENCES
Almutairi, A., Sarfraz, M., Basalamah, S., 2012. A
distributed access control architecture for cloud
computing. IEEE software, vol. 29, no 2, p. 36-44.
Dos Santos D. R., Roberto M., Gustavo, R.S., Carla M. W.,
Carlos B. W., 2016. A Framework and Risk
Assessment Approaches for Risk-based Access Control
in the Cloud, Journal of Network and Computer
Applications, vol. 74, p. 86-97.
Dastjerdi, A. V., Buyya, R., 2016. Fog computing: Helping
the Internet of Things realize its potential. Computer,
vol. 49, no 8, p. 112-116.
Huang, Q., Yang, Y., Wang, L., 2017. Secure Data Access
Control With Ciphertext Update and Computation
Outsourcing in Fog Computing for Internet of
Things. IEEE Access, vol. 5, p. 12941-12950.
Hu P., Dhelim S., Ning, H., 2017. Survey on Fog
Computing: Architecture, Key Technologies,
Applications and Open Issues. Journal of Network and
Computer Applications, vol. 98, p. 27-42.
Shirazi, S. N., Ul H., Gouglidis, A., Farshad, A.,
2017. Review and Analysis of Mobile Edge Computing
and Fog from a Security and Resilience
Perspective. IEEE Journal on Selected Areas in
Communications, Issue: 99.
Xiao, M., Zhou, J., Liu, X., 2017. A Hybrid Scheme for
Fine-Grained Search and Access Authorization in Fog
Computing Environment. Sensors, vol. 17, no 6, p.
1423.