SURETY-Fog: Secure Data Query and Storage Processing in Fog Driven IoT Environment

IF 3.8 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Pratibha Sharma , Hemraj Saini , Arvind Kalia
{"title":"SURETY-Fog: Secure Data Query and Storage Processing in Fog Driven IoT Environment","authors":"Pratibha Sharma ,&nbsp;Hemraj Saini ,&nbsp;Arvind Kalia","doi":"10.1016/j.suscom.2025.101113","DOIUrl":null,"url":null,"abstract":"<div><div>Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all the devices access data from the cloud. To overcome this problem, fog computing is introduced to reduce the latency. However, several security limitations associated with fog computing have not been addressed. This research proposed the Secure Data Query and Storage Processing (SURETY-fog) method, which overcomes the security limitation. The proposed work has different processes to enhance security and efficiency including IoT device and user registration based on the Naor Reingold generator and Prince algorithm, Authentication by using a Multi-Factor Authentication model, secure optimized fog node selection and secure sensed data storage by using Deer Hunting Optimization (DHO) algorithm, Deep Q learning based secure data storage with improved trust in fog, and Lightweight based secure data transmission in fog layer by using bliss signature. The simulation is conducted by using iFogSim and evaluating the performance based on the following metrics, response time, attack detection rate, resource utilization, number of queries processed, transmission latency, and processing latency.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"46 ","pages":"Article 101113"},"PeriodicalIF":3.8000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537925000332","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Fog computing is an important paradigm in the current scenario among many sensing application services based on the Internet of Things (IoT). A traditional IoT environment suffers from a significant latency where all the devices access data from the cloud. To overcome this problem, fog computing is introduced to reduce the latency. However, several security limitations associated with fog computing have not been addressed. This research proposed the Secure Data Query and Storage Processing (SURETY-fog) method, which overcomes the security limitation. The proposed work has different processes to enhance security and efficiency including IoT device and user registration based on the Naor Reingold generator and Prince algorithm, Authentication by using a Multi-Factor Authentication model, secure optimized fog node selection and secure sensed data storage by using Deer Hunting Optimization (DHO) algorithm, Deep Q learning based secure data storage with improved trust in fog, and Lightweight based secure data transmission in fog layer by using bliss signature. The simulation is conducted by using iFogSim and evaluating the performance based on the following metrics, response time, attack detection rate, resource utilization, number of queries processed, transmission latency, and processing latency.
Secure -Fog:雾驱动物联网环境下的安全数据查询和存储处理
在当前基于物联网(IoT)的众多传感应用服务中,雾计算是一个重要的范例。传统的物联网环境存在明显的延迟,因为所有设备都从云端访问数据。为了克服这个问题,引入了雾计算来减少延迟。然而,与雾计算相关的几个安全限制还没有得到解决。本研究提出了安全数据查询和存储处理(Secure Data Query and Storage Processing, SURETY-fog)方法,克服了安全性的限制。提出的工作有不同的过程来提高安全性和效率,包括基于Naor Reingold生成器和Prince算法的物联网设备和用户注册,使用多因素身份验证模型的身份验证,使用寻鹿优化(DHO)算法的安全优化雾节点选择和安全感知数据存储,基于深度Q学习的安全数据存储,提高雾中的信任,利用bliss签名实现基于轻量化的雾层安全数据传输。利用iFogSim软件进行仿真,根据响应时间、攻击检测率、资源利用率、处理查询次数、传输时延、处理时延等指标对性能进行评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Sustainable Computing-Informatics & Systems
Sustainable Computing-Informatics & Systems COMPUTER SCIENCE, HARDWARE & ARCHITECTUREC-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
10.70
自引率
4.40%
发文量
142
期刊介绍: Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信