PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A fog computing architecture for security and quality of service

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
Federated Conference on Computer Science and Information Systems (14 ; 01-04.09.2019 ; Leipzig, Germany)
Języki publikacji
EN
Abstrakty
EN
The Fog Computing paradigm is an emerging architecture and focuses on optimizing resources for the Internet of Things environment, bringing to the Edge, Cloud's characteristics. The demand generated by the number of possible devices in this network attracts problems related to quality of service, security, among others, attracting researchers from the most diverse areas. In our work, in addition to performing a study on selected works in a mapping process, detecting trends in the use of Fog architectures. The main contribution is presented by a security-based Fog Computing architecture using QoS for scalable environments with Docker containers for orchestration and deployment of security with SDN.
Rocznik
Tom
Strony
69--73
Opis fizyczny
Bibliogr. 28 poz., il.
Twórcy
  • Federal University of Sergipe, Av. Marechal Rondon, s/n, Sao Cristovao, Sergipe, Brazil
  • Federal University of Sergipe, Av. Marechal Rondon, s/n, Sao Cristovao, Sergipe, Brazil
  • Federal University of Sergipe, Av. Marechal Rondon, s/n, Sao Cristovao, Sergipe, Brazil
Bibliografia
  • 1. L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010. http://dx.doi.org/10.1016/j.comnet.2010.05.010. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2010.05.010
  • 2. P. P. Ray, “A survey on Internet of Things architectures,” Journal of King Saud University - Computer and Information Sciences, vol. 30, no. 3, pp. 291–319, 2016. http://dx.doi.org/10.1016/j.jksuci.2016.10.003. [Online]. Available: https://doi.org/10.1016/j.jksuci.2016.10.003
  • 3. S. Yi, C. Li, and Q. Li, “A Survey of Fog Computing,” Proceedings of the 2015 Workshop on Mobile Big Data - Mobidata ’15, no. June 2015, pp. 37–42, 2015. http://dx.doi.org/10.1145/2757384.2757397. [Online]. Available: http://dl.acm.org/citation.cfm?doid=2757384.2757397
  • 4. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, “Fog Computing and Its Role in the Internet of Things,” pp. 13–15, 2012.
  • 5. R. Mahmud, R. Kotagiri, and R. Buyya, “Fog Computing: A Taxonomy, Survey and Future Directions,” pp. 1–28, 2016. http://dx.doi.org/10.1007/978-981-10-5861-5_5. [Online]. Available: http://arxiv.org/abs/1611.05539%0Ahttp://dx.doi.org/10.1007/978-981-10-5861-5_5
  • 6. P. K. Sharma, M. Y. Chen, and J. H. Park, “A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT,” IEEE Access, vol. 6, pp. 115–124, 2018. http://dx.doi.org/10.1109/ACCESS.2017.2757955
  • 7. Y. Ai, M. Peng, and K. Zhang, “Edge computing technologies for Internet of Things: a primer,” Digital Communications and Networks, vol. 4, no. 2, pp. 77–86, 2018. http://dx.doi.org/10.1016/j.dcan.2017.07.001. [Online]. Available: https://doi.org/10.1016/j.dcan.2017.07.001
  • 8. K. Vohra and M. Dave, “Multi-Authority Attribute Based Data Access Control in Fog Computing,” Procedia Computer Science, vol. 132, pp. 1449–1457, 2018. http://dx.doi.org/10.1016/j.procs.2018.05.078. [Online]. Available: https://doi.org/10.1016/j.procs.2018.05.078
  • 9. F. Al-Doghman, Z. Chaczko, A. R. Ajayan, and R. Klempous, “A review on Fog Computing technology,” 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 001 525–001 530, 2016. http://dx.doi.org/10.1109/SMC.2016.7844455. [Online]. Available: http://ieeexplore.ieee.org/document/7844455/
  • 10. K. Yasumoto, H. Yamaguchi, and H. Shigeno, “Survey of Real-time Processing Technologies of IoT Data Streams,” Journal of Information Processing, vol. 24, no. 2, pp. 195–202, 2016. http://dx.doi.org/10.2197/ipsjjip.24.195
  • 11. C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges,” IEEE Communications Surveys and Tutorials, vol. 20, no. 1, pp. 416–464, 2018. http://dx.doi.org/10.1109/COMST.2017.2771153
  • 12. L. Li, S. Li, and S. Zhao, “QoS-Aware scheduling of services-oriented internet of things,” IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1497–1507, 2014. http://dx.doi.org/10.1109/TII.2014.2306782
  • 13. R. Prodan and S. Ostermann, “A survey and taxonomy of infrastructure as a service and web hosting cloud providers,” Proceedings - IEEE/ACM International Workshop on Grid Computing, pp. 17–25, 2009. http://dx.doi.org/10.1109/GRID.2009.5353074
  • 14. C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow, and P. A. Polakos, “A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges,” IEEE Communications Surveys and Tutorials, vol. 20, no. 1, pp. 416–464, 2018. http://dx.doi.org/10.1109/COMST.2017.2771153
  • 15. A. Aljumah and T. A. Ahanger, “Fog computing and security issues: A review,” in 2018 7th International Conference on Computers Communications and Control (ICCCC), May 2018. http://dx.doi.org/10.1109/IC-CCC.2018.8390464 pp. 237–239.
  • 16. Y. Gu, K. Li, Z. Guo, and Y. Wang, “Semi-supervised k-means ddos detection method using hybrid feature selection algorithm,” IEEE Access, vol. PP, pp. 1–1, 05 2019. http://dx.doi.org/10.1109/ACCESS.2019.2917532
  • 17. M. I. W. Pramana, Y. Purwanto, and F. Y. Suratman, “Ddos detection using modified k-means clustering with chain initialization over landmark window,” in 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Aug 2015. http://dx.doi.org/10.1109/ICCEREC.2015.7337056 pp. 7–11.
  • 18. K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson, “Systematic Mapping Studies in Software Engineering,” 12Th International Conference on Evaluation and Assessment in Software Engineering, vol. 17, p. 10, 2008. http://dx.doi.org/10.1142/S0218194007003112. [Online]. Available: http://www.cse.chalmers.se/~feldt/publications/petersen_ease08_sysmap_studies_in_se.pdf
  • 19. X. Masip-Bruin, E. Marn-Tordera, G. Tashakor, A. Jukan, and G. Ren, “Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems,” IEEE Wireless Communications, vol. 23, no. 5, pp. 120–128, 2016. http://dx.doi.org/10.1109/MWC.2016.7721750
  • 20. D. Bruneo, S. Distefano, F. Longo, and G. Merlino, “An IoT Testbed for the Software Defined City Vision: The #SmartMe Project,” in 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 2016. http://dx.doi.org/10.1109/SMARTCOMP.2016.7501678 pp. 1–6.
  • 21. M. S. Carmo, S. Jardim, A. V. Neto, R. Aguiar, and D. Corujo, “Towards fog-based slice-defined WLAN infrastructures to cope with future 5G use cases,” in 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), 2017. http://dx.doi.org/10.1109/NCA.2017.8171397 pp. 1–5.
  • 22. J. Santos, P. Leroux, T. Wauters, B. Volckaert, and F. D. Turck, “Anomaly detection for Smart City applications over 5G low power wide area networks,” in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, 2018. http://dx.doi.org/10.1109/NOMS.2018.8406257. ISSN 2374-9709 pp. 1–9.
  • 23. X. Masip-Bruin, E. Marin-Tordera, A. Jukan, and G.-J. Ren, “Managing resources continuity from the edge to the cloud: Architecture and performance,” Future Generation Computer Systems, vol. 79, pp. 777–785, 2018. http://dx.doi.org/https://doi.org/10.1016/j.future.2017.09.036. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0167739X17302686
  • 24. K. S. Sahoo and B. Sahoo, “SDN Architecture on Fog Devices for Realtime Traffic Management : A Case Study SDN architecture on fog devices for realtime traffic management : A case study,” no. October, 2017. http://dx.doi.org/10.1007/978-81-322-3592-7
  • 25. A. Abeshu and N. Chilamkurti, “Deep Learning: The Frontier for Distributed Attack Detection in Fog-To-Things Computing,” IEEE Communications Magazine, vol. 56, no. 2, pp. 169–175, 2018. http://dx.doi.org/10.1109/MCOM.2018.1700332
  • 26. X. An, X. Zhou, X. Lü, F. Lin, and L. Yang, “Sample selected extreme learning machine based intrusion detection in fog computing and MEC,” Wireless Communications and Mobile Computing, vol. 2018, pp. 1–10, 2018. http://dx.doi.org/10.1155/2018/7472095
  • 27. S. Prabavathy, K. Sundarakantham, and S. M. Shalinie, “Design of cognitive fog computing for intrusion detection in Internet of Things,” Journal of Communications and Networks, vol. 20, no. 3, pp. 291–298, 2018. http://dx.doi.org/10.1109/JCN.2018.000041
  • 28. A. Diro and N. Chilamkurti, “Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications,” IEEE Communications Magazine, vol. 56, no. 9, pp. 124–130, 2018. http://dx.doi.org/10.1109/M-COM.2018.1701270
Uwagi
1. Track 3: Network Systems and Applications
2. Technical Session: 3rd Workshop on Internet of Things - Enablers, Challenges and Applications
3. Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2020).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-30b29dd0-df5f-450d-ad06-06537838bd82
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.