{"title":"Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment","authors":"Yepeng Ding, Hiroyuki Sato","doi":"10.1109/MobileCloud48802.2020.00011","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00011","url":null,"abstract":"Access control plays a crucial role in constructing trust in a system. Particularly, it is imperative to enforce a fine-grained access control mechanism to make the access control framework flexible due to the high complexity of untrustworthy environments such as the Internet of Things (IoT) environments. However, traditional access control techniques can be hardly trusted on account of their centralized enforcements and improper distributed computing mechanisms while facing diverse and intricate threats. Although existing solutions based on public blockchain technology have addressed some issues, new challenges derived from public blockchain technology become noticeable such as low consensus efficiency and delicate incentive mechanism. In this paper, we propose Bloccess, a fine-grained access control framework using permissioned blockchain techniques, which enhances the trust in untrustworthy environments by enforcing a trustworthy access control mechanism. Bloccess provides a unified and user-centric solution for access control in distributed untrustworthy environments and optimizes the decentralized access control management, which significantly ensures the security properties of protected environments in terms of the threat model structured in this paper. We also prove the feasibility and effectiveness of Bloccess by security analysis and the comparison with some related frameworks.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"321 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114048862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Participant Comfort Adaptation in Dependable Mobile Crowdsensing Services","authors":"V. Dasari, Murat Simsek, B. Kantarci","doi":"10.1109/MobileCloud48802.2020.00015","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00015","url":null,"abstract":"Mobile Crowdsensing (MCS) is a ubiquitous sensing concept under the Internet of Things (IoT) ecosystem where builtin sensors in smart mobile devices are utilized as users join in sensing campaigns launched by the crowdsensing platform. The pervasive and non-dedicated nature of the sensing instruments in MCS raises the trustworthiness issue. On the other hand, due to granting access to the hardware on their devices, user comfort –which is directly related to the information revealed or the type of sensor activation by user– is also another barrier against wide adoption of MCS in the IoT Era. In this article, we present an adaptive mechanism to manage user comfort in an adaptive manner while ensuring the trustworthiness of the crowdsensed data through auction based reputation maintenance at the MCS platform. The proposed mechanism allows the users to adaptively switch their sensory allocation that are made available to the MCS platform based on historical tracking of the changes in their utility. Through simulations, we show that adaptive management of sensory selection in the auction-based MCS campaign can result in up to >3% increase in user comfort and up to >2% improvement in platform utility when compared to the fixed configuration of sensory arrays based on constant comfort levels used in user recruitment.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131223120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juan Li, Shadi Alian, Maryam Sadat Amiri Tehrani Zadeh, Bikesh Maharjan, Yan Bai
{"title":"Drone-Assisted Fog-Cloud IoT Content Service Platform for Rural Communities","authors":"Juan Li, Shadi Alian, Maryam Sadat Amiri Tehrani Zadeh, Bikesh Maharjan, Yan Bai","doi":"10.1109/MobileCloud48802.2020.00014","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00014","url":null,"abstract":"Although social media and contents are being generated and shared with an unprecedented scale and speed, rural and underdeveloped areas throughout the world have only limited access due to the lack of high-speed Internet. Connecting rural communities to the digital world and providing them with right contents will provide the much-needed bridge between urban and rural areas. In this paper, we propose a communication and information framework that utilizes simple Internet of Things (IoT) in a rural community to assist delay-tolerant content distribution. Specifically, a hybrid fog-cloud content distribution network is constructed by deploying low-end simple fog nodes and utilizing the movement of community vehicles. Moreover, drones are used to distribute content on demand as a compliment of the delay tolerant network for better delivery rate and lower delay time. A novel drone scheduling algorithm is proposed to plan drones’ tours optimally. Extensive simulation experiments have been performed to evaluate the performance of the proposed framework.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dominic Pirker, Thomas Fischer, Christian H. Lesjak, C. Steger
{"title":"Global and Secured UAV Authentication System based on Hardware-Security","authors":"Dominic Pirker, Thomas Fischer, Christian H. Lesjak, C. Steger","doi":"10.1109/MobileCloud48802.2020.00020","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00020","url":null,"abstract":"UAVs are gaining traction outside their usual markets of hobbyists, areal recordings, and surveillance services with cloud computing enabled applications and their massive combined computing power. These applications rapidly grow the UAV market, consequently raising the priority of safety solutions. Tremendous incidents, such as the air traffic interruption in London (Dec. 2018), raised awareness and demand for UAV identification, authentication, and tracking. To prevent these type of incidents, aviation authorities, such as the FAA or EASA, are currently working on proper regulations. The implementation of the regulations demands dependable technical solutions. This paper proposes a secured and globally operative UAV authentication system, based on reliable security mechanisms and standardized protocols. Therefore, this system must provide mutual and strong cryptographic authentication. First, the TLS protocol is used for mutual authentication and for protecting the communication. Then, hardware-security is implemented to store the necessary keys and certificates in a protected storage, thus supporting the TLS handshake to avoid common attacks against pure software implementations. Lastly, a concept for protected sensor values is introduced. The proposed UAV authentication concept is demonstrated by a proof-of-concept implementation, evaluated for performance and compared to existing solutions.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game Theoretic Algorithm for Energy Efficient Mobile Edge Computing with Multiple Access Points","authors":"Tobias Mahn, Maximilian Wirth, A. Klein","doi":"10.1109/MobileCloud48802.2020.00013","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00013","url":null,"abstract":"This paper considers a Mobile Edge Computing scenario with multiple mobile units (MUs), multiple access points (APs) and one cloudlet server. The MUs have to decide whether offloading their computation tasks to the cloudlet is energy wise beneficial. As there are multiple APs available to connect the MUs to the cloudlet and communication and computation resources have to be shared among all MUs, each MU also has to choose the AP for transmission that minimizes its offloading energy under the given fraction of the overall resources. The problem is formulated as a energy minimization problem with a maximum offloading time constraint. MUs not only need to consider the energy required for local computation or offloading, but simultaneously avoid an overlong processing time of offloaded computation. This joint offloading decision and resource allocation is divided into two subproblems in the proposed approach. The resource allocation problem is reformulated by using Lagrange multipliers and closed-forms for the calculation of the shared resources are found. These results can be integrated into the proposed game theoretic algorithm for the offloading decision problem. The algorithm is based on a potential game and therefore, can be proven to converge to a Nash equilibrium. Numerical results show a benefit of the proposed resource allocation strategy, a performance of the proposed game algorithm near the optimal solution and a fast algorithm execution time that can even be significantly improved by proposed sorting metrics. mobile edge computing, joint optimization, resource allocation strategy, game theory","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Nakata, Mayuko Takai, Hiroaki Konoura, Masafumi Kinoshita
{"title":"Cross-Site Edge Framework for Location-Awareness Distributed Edge-Computing Applications","authors":"Y. Nakata, Mayuko Takai, Hiroaki Konoura, Masafumi Kinoshita","doi":"10.1109/MobileCloud48802.2020.00017","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00017","url":null,"abstract":"In an edge computing application, cloud-side process and edge-side process run individually. This distributed process of an application fulfilling one common goal results in low readability of codes and additional maintenance cost. To address this issue, we propose a new edge-computing application framework, called ``cross-site edge framework'' (CEF). The key approach of CEF is a messaging middleware layer on which function calls are converted into messages that are exchanged between regions behind the application code. Developers can implement all processes in all environments into a single file or project as if the application runs in one environment. Using this approach, developers can add an annotation that specifies the location where the function is performed to a function in the application. This approach reduces the number of operation tasks required for developing edge-computing applications by a half compared to the number required by an edge-computing service of cloud vendor.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124569552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable and Efficient Mutual Authentication Strategy in Fog Computing","authors":"Jatna Bavishi, M. S. Shaikh, Reema Patel","doi":"10.1109/MobileCloud48802.2020.00019","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00019","url":null,"abstract":"Fog Computing paradigm extends the cloud computing to the edge of the network to resolve the problem of latency but this introduces new security and privacy issues. So, it is necessary that a user must be authenticated before initiating data exchange in order to preserve the integrity. Secondly, in fog computing, fog node must also be authorized for ensuring the proper behaviour of fog node and validate that the fog node is not corrupted. Hence, we proposed a mutual authentication scheme which verifies both the fog node and the end user before the transfer of data. Traditional authentication protocol uses digital certificate and digital signature which faces the problem of scalability and more complexity respectively. So, in the proposed architecture, the problem of scalability and complexity is reduced to a greater extent compared to traditional authentication techniques. The proposed scheme also ensures multi-factor authentication of the user before sending the data and it is way too efficient.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127738509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DewROS: A Platform for Informed Dew Robotics in ROS","authors":"Giovanni Stanco, A. Botta, G. Ventre","doi":"10.1109/MobileCloud48802.2020.00010","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00010","url":null,"abstract":"In recent years Cloud Robotics technology has been proposed to overcome the constraints imposed by the resources of standalone robots. We can imagine that in near future robots will be very present in everyday life and interact with humans, so it is necessary to guarantee that robots could make decisions even if the connection to the cloud is unavailable. It is then important to move the critical tasks on the edge devices in order to make them always accessible, not following the Cloud Robotics paradigm but the Dew Robotics one instead. In this paper we propose DewROS, a platform for Dew Robotics that uses monitoring entities to monitor the system status in order to adapt the application operating conditions. In particular in this work we describe the DewROS platform and its application in the case of video analysis in a surveillance scenario. The results provided in this paper demonstrate how DewROS allows us to exploit at their best the limited resources of our robots.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117189434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Welcome Message from the IEEE Mobile Cloud 2020 Program Chairs","authors":"Kaikai Liu, Juan Li, M. Rossi","doi":"10.1109/mobilecloud48802.2020.00006","DOIUrl":"https://doi.org/10.1109/mobilecloud48802.2020.00006","url":null,"abstract":"On behalf of the Technical Program Committee, it is our pleasure to welcome you to the 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2020), held in Oxford, United Kingdom. The conference is structured as a single-track event, providing a very nice platform to allow researchers in academia and industry alike to exchange their latest research results and developments on mobile edge and cloud computing. This year, the technical program has been extended to include emerging hot areas such as 5G network edge/cloud architectures and machine and deep learning enabled frameworks and applications for edge and cloud infrastructures. Mobile Cloud is organized in conjunction with four other IEEE conferences: the 14th IEEE International Symposium on Service-Oriented System Engineering (SOSE 2020), the 2nd IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2020), the 6th IEEE International Conference on Big Data Computing Service and Machine Learning Applications (BigDataService 2020), and the 2nd IEEE International Conference on Artificial Intelligence Testing (AITest 2020). Also, Mobile Cloud is jointly organized with the International Workshop of Security and Trust in Mobile Networks 2020 (SeTM 2020). This makes it a very rich event, which allows attendees to interact with a broader community within the edge, cloud, computing and machine learning/artificial intelligence fields. This will hopefully generate new ideas and foster collaborations.","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116054386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic Function Chain Control for Edge Networks under Reconfiguration Delay and QoS Requirements","authors":"Michele Berno, Flavio Esposito, M. Rossi","doi":"10.1109/MobileCloud48802.2020.00018","DOIUrl":"https://doi.org/10.1109/MobileCloud48802.2020.00018","url":null,"abstract":"Network Function Virtualization (NFV) allows network providers to reconfigure their edge processing infrastructure in an online fashion, to adapt it to the changing traffic demands (intensity and type of computation requests). In this work, we consider the Virtual Network Function Placement and Chaining (VNFPC) problem, whose aim is to elastically deploy services (i.e., chains of multiple Virtual Functions, VFs) through three phases: function placement, assignment, and chaining. For this problem, a predictive control framework is proposed to solve these three phases jointly by horizontally scaling VF instances, adapting their number to current and predicted demands, while ensuring that flows' Quality of Service (QoS) requirements (latency) are met. Our technique accounts for the delays and costs incurred in reconfiguration operations and uses a Gaussian Mixture Model, trained with real traces collected by base stations across the city of Milan (Italy), to estimate future computing demands. The proposed predictive control method is tested against a heuristic policy for several meaningful metrics, achieving up to 99% less edge control overhead and allowing a reduction of the blocking probability by 95% with respect to the heuristic (for the same energy consumption).","PeriodicalId":241174,"journal":{"name":"2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133898417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}