A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

抄録

The increase of sensitive data in the current Internet of Things (IoT) raises demands of computation, communication and storage capabilities. Indeed, thanks to RFID tags and wireless sensor networks, anything can be part of IoT. As a result, a large amount of data is generated, which is hard for many IoT devices to handle, as many IoT devices are resource-constrained and cannot use the existing standard security protocols. Cloud computing might seem like a convenient solution, since it offers on-demand access to a shared pool of resources such as processors, storage, applications and services. However this comes as a cost, as unnecessary communications not only burden the core network, but also the data center in the cloud. Therefore, considering suitable approaches such as fog computing and security middleware solutions is crucial. In this paper, we propose a novel middleware architecture to solve the above issues, and discuss the generic concept of using fog computing along with cloud in order to achieve a higher security level. Our security middleware acts as a smart gateway as it is meant to pre-process data at the edge of the network. Depending on the received information, data might either be processed and stored locally on fog or sent to the cloud for further processing. Moreover, in our scheme, IoT constrained devices communicate through the proposed middleware, which provide access to more computing power and enhanced capability to perform secure communications. We discuss these concepts in detail, and explain how our proposal is effective to cope with some of the most relevant IoT security challenges.

元の言語英語
ホスト出版物のタイトルProceedings of the International Conference on Internet of Things and Machine Learning, IML 2017
編集者Hani Hamdan, Faouzi Hidoussi, Djallel Eddine Boubiche
出版者Association for Computing Machinery
ISBN(電子版)9781450352437
DOI
出版物ステータス出版済み - 10 17 2017
イベント1st International Conference on Internet of Things and Machine Learning, IML 2017 - Liverpool, 英国
継続期間: 10 17 201710 18 2017

出版物シリーズ

名前ACM International Conference Proceeding Series

その他

その他1st International Conference on Internet of Things and Machine Learning, IML 2017
英国
Liverpool
期間10/17/1710/18/17

Fingerprint

Fog
Middleware
Communication
Cloud computing
Radio frequency identification (RFID)
Internet of things
Wireless sensor networks
Network protocols
Processing
Costs

All Science Journal Classification (ASJC) codes

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

これを引用

Razouk, W., Sgandurra, D., & Sakurai, K. (2017). A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. : H. Hamdan, F. Hidoussi, & D. E. Boubiche (版), Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017 [a35] (ACM International Conference Proceeding Series). Association for Computing Machinery. https://doi.org/10.1145/3109761.3158413

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. / Razouk, Wissam; Sgandurra, Daniele; Sakurai, Kouichi.

Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. 版 / Hani Hamdan; Faouzi Hidoussi; Djallel Eddine Boubiche. Association for Computing Machinery, 2017. a35 (ACM International Conference Proceeding Series).

研究成果: 著書/レポートタイプへの貢献会議での発言

Razouk, W, Sgandurra, D & Sakurai, K 2017, A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. : H Hamdan, F Hidoussi & DE Boubiche (版), Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017., a35, ACM International Conference Proceeding Series, Association for Computing Machinery, 1st International Conference on Internet of Things and Machine Learning, IML 2017, Liverpool, 英国, 10/17/17. https://doi.org/10.1145/3109761.3158413
Razouk W, Sgandurra D, Sakurai K. A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. : Hamdan H, Hidoussi F, Boubiche DE, 編集者, Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. Association for Computing Machinery. 2017. a35. (ACM International Conference Proceeding Series). https://doi.org/10.1145/3109761.3158413
Razouk, Wissam ; Sgandurra, Daniele ; Sakurai, Kouichi. / A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017. 編集者 / Hani Hamdan ; Faouzi Hidoussi ; Djallel Eddine Boubiche. Association for Computing Machinery, 2017. (ACM International Conference Proceeding Series).
@inproceedings{e3cc42ed252b49beb08ba1620d6ba515,
title = "A new security middleware architecture based on fog computing and cloud to support IoT constrained devices",
abstract = "The increase of sensitive data in the current Internet of Things (IoT) raises demands of computation, communication and storage capabilities. Indeed, thanks to RFID tags and wireless sensor networks, anything can be part of IoT. As a result, a large amount of data is generated, which is hard for many IoT devices to handle, as many IoT devices are resource-constrained and cannot use the existing standard security protocols. Cloud computing might seem like a convenient solution, since it offers on-demand access to a shared pool of resources such as processors, storage, applications and services. However this comes as a cost, as unnecessary communications not only burden the core network, but also the data center in the cloud. Therefore, considering suitable approaches such as fog computing and security middleware solutions is crucial. In this paper, we propose a novel middleware architecture to solve the above issues, and discuss the generic concept of using fog computing along with cloud in order to achieve a higher security level. Our security middleware acts as a smart gateway as it is meant to pre-process data at the edge of the network. Depending on the received information, data might either be processed and stored locally on fog or sent to the cloud for further processing. Moreover, in our scheme, IoT constrained devices communicate through the proposed middleware, which provide access to more computing power and enhanced capability to perform secure communications. We discuss these concepts in detail, and explain how our proposal is effective to cope with some of the most relevant IoT security challenges.",
author = "Wissam Razouk and Daniele Sgandurra and Kouichi Sakurai",
year = "2017",
month = "10",
day = "17",
doi = "10.1145/3109761.3158413",
language = "English",
series = "ACM International Conference Proceeding Series",
publisher = "Association for Computing Machinery",
editor = "Hani Hamdan and Faouzi Hidoussi and Boubiche, {Djallel Eddine}",
booktitle = "Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017",

}

TY - GEN

T1 - A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

AU - Razouk, Wissam

AU - Sgandurra, Daniele

AU - Sakurai, Kouichi

PY - 2017/10/17

Y1 - 2017/10/17

N2 - The increase of sensitive data in the current Internet of Things (IoT) raises demands of computation, communication and storage capabilities. Indeed, thanks to RFID tags and wireless sensor networks, anything can be part of IoT. As a result, a large amount of data is generated, which is hard for many IoT devices to handle, as many IoT devices are resource-constrained and cannot use the existing standard security protocols. Cloud computing might seem like a convenient solution, since it offers on-demand access to a shared pool of resources such as processors, storage, applications and services. However this comes as a cost, as unnecessary communications not only burden the core network, but also the data center in the cloud. Therefore, considering suitable approaches such as fog computing and security middleware solutions is crucial. In this paper, we propose a novel middleware architecture to solve the above issues, and discuss the generic concept of using fog computing along with cloud in order to achieve a higher security level. Our security middleware acts as a smart gateway as it is meant to pre-process data at the edge of the network. Depending on the received information, data might either be processed and stored locally on fog or sent to the cloud for further processing. Moreover, in our scheme, IoT constrained devices communicate through the proposed middleware, which provide access to more computing power and enhanced capability to perform secure communications. We discuss these concepts in detail, and explain how our proposal is effective to cope with some of the most relevant IoT security challenges.

AB - The increase of sensitive data in the current Internet of Things (IoT) raises demands of computation, communication and storage capabilities. Indeed, thanks to RFID tags and wireless sensor networks, anything can be part of IoT. As a result, a large amount of data is generated, which is hard for many IoT devices to handle, as many IoT devices are resource-constrained and cannot use the existing standard security protocols. Cloud computing might seem like a convenient solution, since it offers on-demand access to a shared pool of resources such as processors, storage, applications and services. However this comes as a cost, as unnecessary communications not only burden the core network, but also the data center in the cloud. Therefore, considering suitable approaches such as fog computing and security middleware solutions is crucial. In this paper, we propose a novel middleware architecture to solve the above issues, and discuss the generic concept of using fog computing along with cloud in order to achieve a higher security level. Our security middleware acts as a smart gateway as it is meant to pre-process data at the edge of the network. Depending on the received information, data might either be processed and stored locally on fog or sent to the cloud for further processing. Moreover, in our scheme, IoT constrained devices communicate through the proposed middleware, which provide access to more computing power and enhanced capability to perform secure communications. We discuss these concepts in detail, and explain how our proposal is effective to cope with some of the most relevant IoT security challenges.

UR - http://www.scopus.com/inward/record.url?scp=85048369120&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85048369120&partnerID=8YFLogxK

U2 - 10.1145/3109761.3158413

DO - 10.1145/3109761.3158413

M3 - Conference contribution

AN - SCOPUS:85048369120

T3 - ACM International Conference Proceeding Series

BT - Proceedings of the International Conference on Internet of Things and Machine Learning, IML 2017

A2 - Hamdan, Hani

A2 - Hidoussi, Faouzi

A2 - Boubiche, Djallel Eddine

PB - Association for Computing Machinery

ER -