Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn
{"title":"A Decentralised Mechanism for Secure Cloud Computing Transactions","authors":"Monjur Ahmed, M. Bhuiyan, Sapna Jaidka, P. Jiranantanagorn","doi":"10.1109/FMEC54266.2021.9732405","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732405","url":null,"abstract":"In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a de centralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Ngā-KNgōpuku - a de centralised and distributed computing security model that employs scattered and redundant de centralised processing.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan
{"title":"Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review","authors":"Christopher Nixon, Mohamed H. Sedky, Mohamed Hassan","doi":"10.1109/FMEC54266.2021.9732566","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732566","url":null,"abstract":"Intrusion Detection Systems (IDS) monitor com-puter networks for attack. Network data streams are potentially infinite and require real-time processing in order to provide timely detection of changing attacks. To address the nature of the network data stream it is important to consider the use of online data stream learning methods for IDS. Online data stream learning is an extension of Machine Learning (ML) where special consideration is given to finding anomalies in the data stream via supervised and unsupervised methods, adapting to concept drift, processing real-time events, and management of labelling cost by using Active Learning (AL). This paper asks the question of which online data stream and AL methods for IDS have been recently reviewed? A Systematic Literature Review (SLR) was performed and found that there is currently no reviews available that focus primarily on IDS data stream learning. Reviews were organised into categories and key considerations presented.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro
{"title":"Modeling Polymorphic Ciphers","authors":"Albert H Carlson, I. Dutta, Bhaskar Ghosh, Michael Totaro","doi":"10.1109/FMEC54266.2021.9732571","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732571","url":null,"abstract":"Polymorphic ciphers are a relatively new construct in the field of encryption. Although the first real example of the encryption, the One Time Pad (OTP), has been known since the early part of the 20th century, the idea of a “mutating cipher” has not been implemented and well studied until now. Since these ciphers are actually “engines” comprised of single algorithm ciphers with good encryption properties, such as a large key space, evaluating the characteristics of the engine becomes im-portant. In this paper, we present a simple method to classify the polymorphic properties of ciphers and the polymorphic engine. In addition, the security of such engines is presented, along with an analysis of the additional latency and overhead costs.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133393115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna
{"title":"A Distributed Trust Layer for Edge Infrastructure","authors":"V. T. Le, Nabil El Ioini, C. Pahl, H. Barzegar, C. Ardagna","doi":"10.1109/FMEC54266.2021.9732606","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732606","url":null,"abstract":"Recently, Mobile Edge Cloud computing (MEC) has attracted attention both from academia and industry. The idea of moving a part of cloud resources closer to users and data sources can bring many advantages in terms of speed, data traffic, security and context-aware services. The MEC infrastructure does not only host and serves applications next to the end-users, but services can be dynamically migrated and reallocated as mobile users move in order to guarantee latency and performance constraints. This specific requirement calls for the involvement and collaboration of multiple MEC providers, which raises a major issue related to trustworthiness. Two main challenges need to be addressed: i) trustworthiness needs to be handled in a manner that does not affect latency or performance, ii) trustworthiness is considered in different dimensions - not only security metrics but also performance and quality metrics in general. In this paper, we propose a trust layer for public MEC infrastructure that handles establishing and updating trust relations among all MEC entities, making the interaction withing a MEC network transparent. First, we define trust attributes affecting the trusted quality of the entire infrastructure and then a methodology with a computation model that combines these trust attribute values. Our experiments showed that the trust model allows us to reduce latency by removing the burden from a single MEC node, while at the same time increase the network trustworthiness.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130462117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EdgeRE: An Edge Computing-enhanced Network Redundancy Elimination Service for Connected Cars","authors":"Masahiro Yoshida, Koya Mori, Tomohiro Inoue, Hiroyuki Tanaka","doi":"10.1109/FMEC54266.2021.9732548","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732548","url":null,"abstract":"Connected cars generate a huge amount of Internet of Things (IoT) sensor information called Controller Area Network (CAN) data. Interest has recently been growing in collecting CAN data from connected cars in a cloud system in order to enable life-critical use cases such as safe driving support. Although each CAN data packet is very small, a connected car generates thousands of CAN data packets per second. Therefore, real-time CAN data collection from connected cars to a cloud system is one of the most challenging problems in the current IoT. In this paper, we propose an Edge computing-enhanced network Redundancy Elimination service (EdgeRE) for CAN data collection. In developing EdgeRE, we design a CAN data compression architecture that combines in-vehicle computers, edge datacenters, and a public cloud system. EdgeRE includes the idea of a hierarchical data compression and dynamic data buffering at edge datacenters for real-time CAN data collection. Across a wide range of field tests with connected cars and an edge computing testbed, we show that the EdgeRE reduces the bandwidth usage by 88% and the number of packets by 99%.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114255222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Architecture for Component Authentication using Secure Cyber-physical Information and Blockchain","authors":"M. Sandborn, Carlos Olea, Sam Hays, Jules White","doi":"10.1109/FMEC54266.2021.9732547","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732547","url":null,"abstract":"Cyber-physical systems (CPSs) tie software to components that manipulate physical space, and safety-critical CPSs comprise an increasing share of roles in process automation, transportation, and industrial operations. As device intercon-nectivity increases, security paradigms must be developed to address cross-domain interactions and prevent vulnerabilities from one domain (e.g. misconfigured robot controller software) manifesting in the other (e.g. mechatronic arm harms factory worker). In particular, counterfeit goods pose a significant threat to the construction of safety-critical CPSs with downstream effects spanning both cyber and physical environments (e.g. commercial aircraft with faulty fuel pump). In this paper, we present a theoretical architecture for exchanging and verifying Signed Physically Unclonable iDentities (SPUDs). The proposed system, based on Blockchain, allows tracking of components throughout a CPS supply network using both cyber and physical identifiers.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac
{"title":"A micro grid information architecture with open source components","authors":"A. Smith, Buhle Mkhize, Boitumelo Mahlobo, S. Isaac","doi":"10.1109/FMEC54266.2021.9732593","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732593","url":null,"abstract":"Presented is an information system architecture based on open source platforms to support the successful management of a micro grid. The paper justifies the use of open source platforms in the micro grid context. Also given are the benefits of a micro grid as it relates to distributed energy generation and subsequently the need explained for an information system that keeps a record of all devices and their interconnections, while simultaneously providing access to instantaneous data along various points in the micro grid. Three examples of services made possible by the architecture are given.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski
{"title":"Self-Healing for Cyber-Security","authors":"B. Gijsen, R. Montalto, J. Panneman, Federico Falconieri, Paul Wiper, P. Zuraniewski","doi":"10.1109/FMEC54266.2021.9732575","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732575","url":null,"abstract":"Autonomic computing long since holds the promise to achieve properties including self-healing IT. The self-healing property provides a new perspective in the continuous battle between cyber attackers and defenders. Emerging containerization technology, and accompanying monitoring and deployment tools, can boost the state-of-the-art regarding self-healing IT. In this paper, we demonstrate how emerging technology can be integrated into a platform for regenerating and adaptive, self-healing containers. This Self-Healing for Cyber-Security (SH4CS) contribution paves the way towards a new type of autonomous cyber-security solutions.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling Real-Time IoT Workflows in a Fog Computing Environment Utilizing Cloud Resources with Data-Aware Elasticity","authors":"Georgios L. Stavrinides, H. Karatza","doi":"10.1109/FMEC54266.2021.9732561","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732561","url":null,"abstract":"In a fog computing environment the supplementary public cloud resources should be managed as effectively as possible, utilizing a dynamic scaling mechanism, in order to provide monetary cost savings and resilience against workload fluctuations. Furthermore, the dynamic scaling strategy should take into account the data dependencies of the workload, in order to prevent data loss. Towards this direction, in this paper we propose a reactive data-aware dynamic scaling mechanism for the provision of cloud resources, along with a heuristic for the scheduling of real-time Internet of Things (IoT) workflows, in a three-tier IoT-fog-cloud architecture. The performance of the proposed scheme is evaluated and compared via simulation to a static provisioning case, under different patterns of incoming workload. The simulation results provide useful insights into how each workload pattern affects the performance of the framework under study, in each of the provisioning cases of the cloud resources.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-jamming strategy based on game theory in single-channel UAV communication network","authors":"Jiangwei Xu, Kehao Wang, Xun Zhang, Pei Liu, Dejin Kong, Hongkuan Zhou","doi":"10.1109/FMEC54266.2021.9732602","DOIUrl":"https://doi.org/10.1109/FMEC54266.2021.9732602","url":null,"abstract":"This paper investigates the power control prob-lem in unmanned aerial vehicle (UAV) communication network anti-jamming system. To obtain the optimal power of UAVs, Stackelberg game and Nash game, two different anti-jamming models, are proposed to achieve the best performance. In the Stackelberg game model, as the leader, the smart jammer who has the privilege to take actions ahead of the user, while the user acts as the follower after knowing the strategy of the smart jammer and adjusts transmission power adaptively to maximize the utility function. We design a simulated annealing algorithm to obtain Stackelberg equilibrium (SE). In the Nash game model, two players would take actions simultaneously, and the closed-form expression of Nash equilibrium (NE) is derived. Finally, we verify the convergence of proposed algorithm, compare the two game models and analyze the influence of observation error and transmission distance on the user UAV's and jammer UAV's utility function through detailed simulations.","PeriodicalId":217996,"journal":{"name":"2021 Sixth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128757144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}