实现雾计算安全性、可用性和可靠性的整体方法

Abdulrahman Alshehri, H. Alshareef, Samah Alhazmi, M. Almasri, Maha Helal
{"title":"实现雾计算安全性、可用性和可靠性的整体方法","authors":"Abdulrahman Alshehri, H. Alshareef, Samah Alhazmi, M. Almasri, Maha Helal","doi":"10.3844/jcssp.2024.641.648","DOIUrl":null,"url":null,"abstract":": Cloud computing has become popular in recent years due to the considerable flexibility it provides in terms of its availability and affordability and the reliability of different software and services for remote users. Fog computing has also gained considerable attention in recent years from the research fraternity. Fog computing is an additional layer between the users of the cloud and the cloud infrastructure as a place that stores frequently used data in order to reduce latency, which might occur as a consequence of using cloud computing. It also provides easy access and management mechanisms to the devices located at the edge of the cloud, which leads to better performance when compared with cloud computing. Fog computing does, however, pose certain challenges, related to security, such as data breaches; availability, such as dealing with connectivity interruptions; and the reliability of fog resources and services. This study proposes a lightweight system that adopts the fog computing paradigm and addresses several of its challenges by, for instance, enhancing the security aspects of the whole system by validating nodes that join the fog layer before serving the end user. In addition, the proposed system provides better availability and reliability for fog computing and its associated services by capturing and tracking the progress of tasks and being able to resume once an interruption is detected. Experimental results validate the feasibility of the proposed system in terms of its enhanced security capabilities and time cost. This is achieved by using several security techniques which result in allowing only approved devices to join the fog layer. The results also demonstrate the capability to execute tasks even if an interruption is detected by resuming the remainder of the task through another fog node. The proposed solution is unique in the sense that it provides a simple mechanism for implementation in real-world applications, especially in crowded places or when the mobility of users is high. It can also be enhanced further in several ways to address other predicaments related to fog computing.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Holistic Approach to Security, Availability and Reliability in Fog Computing\",\"authors\":\"Abdulrahman Alshehri, H. Alshareef, Samah Alhazmi, M. Almasri, Maha Helal\",\"doi\":\"10.3844/jcssp.2024.641.648\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Cloud computing has become popular in recent years due to the considerable flexibility it provides in terms of its availability and affordability and the reliability of different software and services for remote users. Fog computing has also gained considerable attention in recent years from the research fraternity. Fog computing is an additional layer between the users of the cloud and the cloud infrastructure as a place that stores frequently used data in order to reduce latency, which might occur as a consequence of using cloud computing. It also provides easy access and management mechanisms to the devices located at the edge of the cloud, which leads to better performance when compared with cloud computing. Fog computing does, however, pose certain challenges, related to security, such as data breaches; availability, such as dealing with connectivity interruptions; and the reliability of fog resources and services. This study proposes a lightweight system that adopts the fog computing paradigm and addresses several of its challenges by, for instance, enhancing the security aspects of the whole system by validating nodes that join the fog layer before serving the end user. In addition, the proposed system provides better availability and reliability for fog computing and its associated services by capturing and tracking the progress of tasks and being able to resume once an interruption is detected. Experimental results validate the feasibility of the proposed system in terms of its enhanced security capabilities and time cost. This is achieved by using several security techniques which result in allowing only approved devices to join the fog layer. The results also demonstrate the capability to execute tasks even if an interruption is detected by resuming the remainder of the task through another fog node. The proposed solution is unique in the sense that it provides a simple mechanism for implementation in real-world applications, especially in crowded places or when the mobility of users is high. It can also be enhanced further in several ways to address other predicaments related to fog computing.\",\"PeriodicalId\":40005,\"journal\":{\"name\":\"Journal of Computer Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3844/jcssp.2024.641.648\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3844/jcssp.2024.641.648","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

:云计算在可用性和可负担性方面提供了相当大的灵活性,并且为远程用户提供了可靠的不同软件和服务,因此近年来大受欢迎。近年来,雾计算也获得了研究界的极大关注。雾计算是云用户和云基础设施之间的一个附加层,作为存储常用数据的地方,可以减少使用云计算可能导致的延迟。它还为位于云边缘的设备提供了便捷的访问和管理机制,与云计算相比,它能带来更好的性能。不过,雾计算也带来了一些挑战,涉及安全性(如数据泄露)、可用性(如处理连接中断)以及雾资源和服务的可靠性。本研究提出了一种采用雾计算范例的轻量级系统,通过验证加入雾层的节点,然后再为终端用户提供服务,从而增强了整个系统的安全性。此外,建议的系统通过捕获和跟踪任务进度,并在检测到中断时能够恢复,为雾计算及其相关服务提供了更好的可用性和可靠性。实验结果验证了拟议系统在增强安全能力和时间成本方面的可行性。这是通过使用几种安全技术实现的,这些技术只允许经过批准的设备加入雾层。实验结果还证明,即使检测到任务中断,也能通过另一个雾节点继续执行剩余任务。所提出的解决方案是独一无二的,因为它提供了一种简单的机制,可在现实世界的应用中实施,尤其是在拥挤的地方或用户流动性很高的情况下。它还可以通过多种方式进一步增强,以解决与雾计算相关的其他困境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Holistic Approach to Security, Availability and Reliability in Fog Computing
: Cloud computing has become popular in recent years due to the considerable flexibility it provides in terms of its availability and affordability and the reliability of different software and services for remote users. Fog computing has also gained considerable attention in recent years from the research fraternity. Fog computing is an additional layer between the users of the cloud and the cloud infrastructure as a place that stores frequently used data in order to reduce latency, which might occur as a consequence of using cloud computing. It also provides easy access and management mechanisms to the devices located at the edge of the cloud, which leads to better performance when compared with cloud computing. Fog computing does, however, pose certain challenges, related to security, such as data breaches; availability, such as dealing with connectivity interruptions; and the reliability of fog resources and services. This study proposes a lightweight system that adopts the fog computing paradigm and addresses several of its challenges by, for instance, enhancing the security aspects of the whole system by validating nodes that join the fog layer before serving the end user. In addition, the proposed system provides better availability and reliability for fog computing and its associated services by capturing and tracking the progress of tasks and being able to resume once an interruption is detected. Experimental results validate the feasibility of the proposed system in terms of its enhanced security capabilities and time cost. This is achieved by using several security techniques which result in allowing only approved devices to join the fog layer. The results also demonstrate the capability to execute tasks even if an interruption is detected by resuming the remainder of the task through another fog node. The proposed solution is unique in the sense that it provides a simple mechanism for implementation in real-world applications, especially in crowded places or when the mobility of users is high. It can also be enhanced further in several ways to address other predicaments related to fog computing.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Computer Science
Journal of Computer Science Computer Science-Computer Networks and Communications
CiteScore
1.70
自引率
0.00%
发文量
92
期刊介绍: Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信