Enabling Fog Complex Security Services in Mobile Cloud Environments

Alexandria Engineering Journal - Tập 60 - Trang 3709-3719 - 2021
Mohamed Hamdy1,2, Safia Abbas3,1, Doaa Hegazy1
1Faculty of Computer and Information Sciences, Ain Shams University, Egypt
2Faculty of Computing and Information Technology, King Abdulaziz University, Saudi Arabia
3Department of Computer Science, College of Computer and Information Science, Princess Nourah bint Abdulrahman University, Saudi Arabia

Tài liệu tham khảo

Erl, 2014 Ibrahim, 2017, Towards an optimum authentication service allocation and availability in vanets, Int. J. Network Sec., 19, 955 Cho, 2016, Trust threshold based public key management in mobile ad hoc networks, Ad Hoc Netw., 44, 58, 10.1016/j.adhoc.2016.02.014 Moudni, 2016, Secure routing protocols for mobile ad hoc networks, 1 Shams, 2018, A novel support vector machine based intrusion detection system for mobile ad hoc networks, Wireless Netw., 24, 1821, 10.1007/s11276-016-1439-0 Raja, 2016, A reliant certificate revocation of malicious nodes in manets, Wireless Pers. Commun., 90, 435, 10.1007/s11277-015-3016-8 Jain, 2018, Security enhancement in manets using fuzzy-based trust computation against black hole attacks, 39 Corcoran, 2016, Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network, IEEE Consumer Electron. Mag., 5, 73, 10.1109/MCE.2016.2590099 C. Thota, G. Manogaran, D. Lopez, V. Vijayakumar, Big data security framework for distributed cloud data centers, in: Cybersecurity breaches and issues surrounding online threat protection, IGI global, 2017, pp. 288–310. Liu, 2017, A framework of fog computing: Architecture, challenges, and optimization, IEEE Access, 5, 25445, 10.1109/ACCESS.2017.2766923 M. Hamdy, A. Derhab, B. König-Ries, A comparison on manets’ service replication schemes: Interest versus topology prediction, in: Proceedings of the 2nd International Conference on Wireless and Mobile Networks (WiMo 2010), Vol. 84 of Communications in Computer and Information Science CCIS, Springer, Berlin Heidelberg, Ankara, Turkey, 2010, pp. 202–216. M. Hamdy, B. König-Ries, Handbook of Research on Non-Functional Properties for Service-Oriented Systems: Future Directions, Advances in Knowledge Management (AKM), IGI GLOBAL, 2012, Ch. The Gross Interest: Service Popularity Aggregation, pp. 322–333. Grzech, 2009, Modeling and optimization of complex services in service-based systems, Cybernet. Syst., 40, 706, 10.1080/01969720903294619 Ibrahim, 2017, Towards an optimum authentication service allocation and availability in vanets, Int. J. Network Sec., 19, 955 Amato, 2017, Exploiting cloud and workflow patterns for the analysis of composite cloud services, Future Generat. Comput. Syst., 67, 255, 10.1016/j.future.2016.06.035 Haas, 2001, The design and performance of mobile tcp for wireless networks, High Speed Networks, 10, 187 Farris, 2017, Lightweight service replication for ultra-short latency applications in mobile edge networks, 1 Choi, 2014, Fault tolerance and qos scheduling using can in mobile social cloud computing, Springer Cluster Comput., 17, 911, 10.1007/s10586-013-0286-3 Moysiadis, 2018, Towards distributed data management in fog computing, Wireless Commun. Mobile Comput., 10.1155/2018/7597686 Yi, 2015, A survey of fog computing: concepts, applications and issues, in, 37 Skarlat, 2016, Resource provisioning for iot services in the fog, 32 Wen, 2017, Fog orchestration for internet of things services, IEEE Internet Comput., 21, 16, 10.1109/MIC.2017.36 Kaewpuang, 2013, A framework for cooperative resource management in mobile cloud computing, IEEE J. Sel. Areas Commun., 31, 2685, 10.1109/JSAC.2013.131209 M. Hamdy, B. König-Ries, Service Availability, Success Ratio, Prevalence, Replica Allocation Correctness, Replication Degree, and Effects of Different Replication/hibernation Behavior Effects of the Service Distribution Protocol for Mobile Ad Hoc Networks: A Detailed Study, Friedrich-Schiller-Univ., 2008. J. Hasenburg, M. Grambow, D. Bermbach, Towards a replication service for data-intensive fog applications, in: Proceedings of the 35th ACM Symposium on Applied Computing, Posters Track (SAC 2020). ACM, 2020. Farris, 2017, Optimizing service replication for mobile delay-sensitive applications in 5g edge network, 1 Guerrero-Contreras, 2017, A context-aware architecture supporting service availability in mobile cloud computing, IEEE Trans. Serv. Comput., 10, 956, 10.1109/TSC.2016.2540629 Beloudane, 2017, Cloud-based on agent model for mobile devices, 281 Vakili, 2017, Comprehensive and systematic review of the service composition mechanisms in the cloud environments, J. Network Comput. Appl., 81, 24, 10.1016/j.jnca.2017.01.005 Jula, 2014, Cloud computing service composition: A systematic literature review, Expert Syst. Appl., 41, 3809, 10.1016/j.eswa.2013.12.017 She, 2019, Qos-aware cloud service composition: A systematic mapping study from the perspective of computational intelligence, Expert Syst. Appl., 12 Asghari, 2019, Cloud service composition using an inverted ant colony optimisation algorithm, Int. J. Bio-Inspired Comput., 13, 257, 10.1504/IJBIC.2019.100139 Chiang, 2016, Fog and iot: An overview of research opportunities, IEEE Internet Things J., 3, 854, 10.1109/JIOT.2016.2584538 Mukherjee, 2017, Security and privacy in fog computing: Challenges, IEEE Access, 5, 19293, 10.1109/ACCESS.2017.2749422 Roman, 2018, Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges, Future Generat. Comput. Syst., 78, 680, 10.1016/j.future.2016.11.009 Huang, 2019, Security modeling and efficient computation offloading for service workflow in mobile edge computing, Future Generat. Comput. Syst., 97, 755, 10.1016/j.future.2019.03.011 Sha, 2017, Edgesec: Design of an edge layer security service to enhance iot security, 81 Tsai, 2015, A privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Syst. J., 9, 805, 10.1109/JSYST.2014.2322973 Dewanta, 2019, A mutual authentication scheme for secure fog computing service handover in vehicular network environment, IEEE Access, 7, 103095, 10.1109/ACCESS.2019.2931217 Dewanta, 2019, Bidding price-based transaction: Trust establishment for vehicular fog computing service in rural area, 882 Barbareschi, 2019, Puf-enabled authentication-as-a-service in fog-iot systems, 58 W. Bradley, D. Maher, G. Boccon-Gibod, Interoperable systems and methods for peer-to-peer service orchestration, uS Patent 8,234,387 (Jul. 31 2012). Singh, 2016, A survey on cloud computing security: Issues, threats, and solutions, J. Network Comput. Appl., 75, 200, 10.1016/j.jnca.2016.09.002 M. Hamdy, B. König-Ries, Leader election modes of the service distribution protocol for mobile ad hoc networks, in: Proceedings of the 4th Conference on Mobility and Mobile Information Systems (4. Konferenz Mobilität und mobile Informationssysteme) (MMS 2009), Münster, Germany, 2009. Y.M. Mohsen, M. Hamdy, M. Hashem, Gpsih: A generic ip-based scheme for identity hiding in manets, in: 2014 9th International Conference on Informatics and Systems, IEEE, 2014, pp. CNs-32. Zhang, 2018, Lightweight soa-based multi-engine architecture for workflow systems in mobile ad hoc networks, IEEE Access, 6, 14212, 10.1109/ACCESS.2018.2815617 Shila, 2016, Amcloud: Toward a secure autonomic mobile ad hoc cloud computing system, IEEE Wirel. Commun., 24, 74, 10.1109/MWC.2016.1500119RP Bettstetter, 2004, Stochastic properties of the random waypoint mobility model, Wireless Netw., 10, 555, 10.1023/B:WINE.0000036458.88990.e5 C. Perkins, E. Belding-Royer, S. Das, Rfc3561: Ad hoc on-demand distance vector (aodv) routing (2003). M. Hamdy, B. König-Ries, U. Küster, Non-functional parameters as first class citizens in service description and matchmaking - an integrated approach, in: Proceedings of the International Conference on Service-Oriented Computing (ICSOC 2007) Workshops: The 1st International Workshop on Non Functional Properties and Service Level Agreements in Service Oriented Computing (NFPSLA-SOC2007), Revised Selected Papers, Springer-Verlag, Berlin, Heidelberg, 2007, pp. 93–104. doi: 10.1007/978-3-540-93851-4_10.