{"title":"SURETY-Fog: Secure Data Query and Storage Processing in Fog Driven IoT Environment","authors":"Pratibha Sharma , Hemraj Saini , Arvind Kalia","doi":"10.1016/j.suscom.2025.101113","DOIUrl":null,"url":null,"abstract":"<div><div>Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all the devices access data from the cloud. To overcome this problem, fog computing is introduced to reduce the latency. However, several security limitations associated with fog computing have not been addressed. This research proposed the Secure Data Query and Storage Processing (SURETY-fog) method, which overcomes the security limitation. The proposed work has different processes to enhance security and efficiency including IoT device and user registration based on the Naor Reingold generator and Prince algorithm, Authentication by using a Multi-Factor Authentication model, secure optimized fog node selection and secure sensed data storage by using Deer Hunting Optimization (DHO) algorithm, Deep Q learning based secure data storage with improved trust in fog, and Lightweight based secure data transmission in fog layer by using bliss signature. The simulation is conducted by using iFogSim and evaluating the performance based on the following metrics, response time, attack detection rate, resource utilization, number of queries processed, transmission latency, and processing latency.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"46 ","pages":"Article 101113"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537925000332","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all the devices access data from the cloud. To overcome this problem, fog computing is introduced to reduce the latency. However, several security limitations associated with fog computing have not been addressed. This research proposed the Secure Data Query and Storage Processing (SURETY-fog) method, which overcomes the security limitation. The proposed work has different processes to enhance security and efficiency including IoT device and user registration based on the Naor Reingold generator and Prince algorithm, Authentication by using a Multi-Factor Authentication model, secure optimized fog node selection and secure sensed data storage by using Deer Hunting Optimization (DHO) algorithm, Deep Q learning based secure data storage with improved trust in fog, and Lightweight based secure data transmission in fog layer by using bliss signature. The simulation is conducted by using iFogSim and evaluating the performance based on the following metrics, response time, attack detection rate, resource utilization, number of queries processed, transmission latency, and processing latency.
在当前基于物联网(IoT)的众多传感应用服务中,雾计算是一个重要的范例。传统的物联网环境存在明显的延迟,因为所有设备都从云端访问数据。为了克服这个问题,引入了雾计算来减少延迟。然而,与雾计算相关的几个安全限制还没有得到解决。本研究提出了安全数据查询和存储处理(Secure Data Query and Storage Processing, SURETY-fog)方法,克服了安全性的限制。提出的工作有不同的过程来提高安全性和效率,包括基于Naor Reingold生成器和Prince算法的物联网设备和用户注册,使用多因素身份验证模型的身份验证,使用寻鹿优化(DHO)算法的安全优化雾节点选择和安全感知数据存储,基于深度Q学习的安全数据存储,提高雾中的信任,利用bliss签名实现基于轻量化的雾层安全数据传输。利用iFogSim软件进行仿真,根据响应时间、攻击检测率、资源利用率、处理查询次数、传输时延、处理时延等指标对性能进行评估。
期刊介绍:
Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.