Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments

IF 0.3
Roshan Gunwantrao Belsare, Premchand B. Ambhore
{"title":"Pragmatic evaluation of privacy preservation security models targeted towards fog-based deployments","authors":"Roshan Gunwantrao Belsare, Premchand B. Ambhore","doi":"10.47164/ijngc.v13i5.935","DOIUrl":null,"url":null,"abstract":"Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.","PeriodicalId":42021,"journal":{"name":"International Journal of Next-Generation Computing","volume":"498 1","pages":""},"PeriodicalIF":0.3000,"publicationDate":"2022-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Next-Generation Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47164/ijngc.v13i5.935","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Fog layer sits between cloud layer and edge-layer and responsible for selection of edge-nodes to process cloud tasks. Fog devices manage routers, gateways and other scheduling components, which makes them highly vulnerable to security attacks. Attackers inject malicious packets fog-server, middleware or sensing layers which causes a wide variety of attacks. These attacks include node capturing, signal jamming, node outage, authorization, selective forwarding, data disclosure etc. To remove these attacks, wide variety of solutions are proposed by researchers, which include authorization, cryptography, error correction, firewall, broadcast authentication, selective disclosure etc. Moreover, these solutions vary with respect to privacy and security quality metrics, attack prevention capabilities and deployment quality of service (QoS). Thus, testing and deployment of these solutions is time consuming, requires additional manpower for performance validation. Hence fog deployments require larger time-to-market and are costly than their corresponding cloud deployments. In order to reduce the time for testing and validation of these resilience techniques, this text reviews various fog security & privacy preservation models and discusses their nuances, advantages, limitations and future research scopes. Furthermore it also performs a detailed performance comparison between the reviewed models, which assists in selecting best possible approach for a given application scenario. This text also recommends various fusion based approaches that can be applied to existing security and privacy models in order to further improve their performance. These approaches include hybridization, selective augmentation and Q-learning based models that assist in improving efficiency of encryption, privacy preservation, while maintaining high QoS levels.
面向雾部署的隐私保护安全模型的实用评估
雾层位于云层和边缘层之间,负责选择边缘节点来处理云任务。雾设备管理路由器、网关和其他调度组件,这使得它们极易受到安全攻击。攻击者在服务器层、中间件层或感知层注入恶意数据包,导致各种类型的攻击。这些攻击包括节点捕获、信号干扰、节点中断、授权、选择性转发、数据泄露等。为了消除这些攻击,研究人员提出了各种解决方案,包括授权、加密、纠错、防火墙、广播认证、选择性披露等。此外,这些解决方案在隐私和安全质量度量、攻击防御能力和部署服务质量(QoS)方面有所不同。因此,测试和部署这些解决方案非常耗时,需要额外的人力进行性能验证。因此,雾部署比相应的云部署需要更长的上市时间和成本。为了减少测试和验证这些弹性技术的时间,本文回顾了各种雾安全和隐私保护模型,并讨论了它们的细微差别、优势、局限性和未来的研究范围。此外,它还在审查的模型之间执行详细的性能比较,这有助于为给定的应用程序场景选择最佳的可能方法。本文还推荐了各种基于融合的方法,这些方法可以应用于现有的安全和隐私模型,以进一步提高其性能。这些方法包括杂交、选择性增强和基于q学习的模型,这些模型有助于提高加密效率、隐私保护,同时保持高QoS水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
International Journal of Next-Generation Computing
International Journal of Next-Generation Computing COMPUTER SCIENCE, THEORY & METHODS-
自引率
66.70%
发文量
60
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信