Skip to main content
Top

2019 | OriginalPaper | Chapter

Maintaining Fog Trust Through Continuous Assessment

Authors : Hasan Ali Khattak, Muhammad Imran, Assad Abbas, Samee U. Khan

Published in: Services – SERVICES 2019

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing continues to provide flexible and efficient way for delivery of services, meeting user requirements and challenges of the time. Software, Infrastructures, and Platforms are provided as services in cloud and fog computing in a cost-effective manner. Migration towards fog instigate new aspects of research for security & privacy. Trust is dependent on measures taken for availability, security, and privacy of users’ services as well as data in fog as well as sharing of these statistics with stakeholders. Any type of lapses in measures for security & privacy shatter user’s trust. In order to provide a trust worthy security and privacy system, we have conducted a thorough survey of existing techniques. A generic model for trustworthiness is proposed in this paper. This model yields a comprehensive component-based architecture of a trust management system to aid fog service providers to preserve users’ Trust in a fog computing environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Firdhous, M., Ghazali, O., Hassan, S.: Trust management in cloud computing: a critical review. arXiv Prepr. arXiv:1211.3979 (2012) Firdhous, M., Ghazali, O., Hassan, S.: Trust management in cloud computing: a critical review. arXiv Prepr. arXiv:​1211.​3979 (2012)
2.
go back to reference Cisco Systems. Fog computing and the internet of things: extend the cloud to where the things are, p. 6 (2016). Www.Cisco.Com Cisco Systems. Fog computing and the internet of things: extend the cloud to where the things are, p. 6 (2016). Www.​Cisco.​Com
3.
go back to reference Arshad, H., Khattak, H.A., Shah, M.A., Abbas, A., Zoobia, A.: Evaluation and analysis of bio-inspired optimization techniques for bill estimation in fog computing. Int. J. Adv. Comput. Sci. Appl. 9(7), 191–198 (2018) Arshad, H., Khattak, H.A., Shah, M.A., Abbas, A., Zoobia, A.: Evaluation and analysis of bio-inspired optimization techniques for bill estimation in fog computing. Int. J. Adv. Comput. Sci. Appl. 9(7), 191–198 (2018)
4.
go back to reference Salman, O., Elhajj, I., Kayssi, A., Chehab, A.: Edge computing enabling the Internet of Things. In: Proceedings of IEEE World Forum on Internet of Things, WF-IoT 2015, pp. 603–608 (2016) Salman, O., Elhajj, I., Kayssi, A., Chehab, A.: Edge computing enabling the Internet of Things. In: Proceedings of IEEE World Forum on Internet of Things, WF-IoT 2015, pp. 603–608 (2016)
5.
go back to reference Rabai, L.B.A., Jouini, M., Ben Aissa, A., Mili, A.: A cybersecurity model in cloud computing environments. J. King Saud Univ. Inf. Sci. 25(1), 63–75 (2013)CrossRef Rabai, L.B.A., Jouini, M., Ben Aissa, A., Mili, A.: A cybersecurity model in cloud computing environments. J. King Saud Univ. Inf. Sci. 25(1), 63–75 (2013)CrossRef
6.
go back to reference Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2010 Second International Conference on Engineering Systems Management and Its Applications (ICESMA), pp. 1–7 (2010) Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2010 Second International Conference on Engineering Systems Management and Its Applications (ICESMA), pp. 1–7 (2010)
7.
go back to reference Nitti, M., Girau, R., Atzori, L., Iera, A., Morabito, G.: A subjective model for trustworthiness evaluation in the social internet of things. In: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 18–23 (2012) Nitti, M., Girau, R., Atzori, L., Iera, A., Morabito, G.: A subjective model for trustworthiness evaluation in the social internet of things. In: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 18–23 (2012)
8.
go back to reference Martucci, L.A., Zuccato, A., Smeets, B., Habib, S.M., Johansson, T., Shahmehri, N.: Privacy, security and trust in cloud computing: the perspective of the telecommunication industry. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 627–632 (2012) Martucci, L.A., Zuccato, A., Smeets, B., Habib, S.M., Johansson, T., Shahmehri, N.: Privacy, security and trust in cloud computing: the perspective of the telecommunication industry. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 627–632 (2012)
9.
go back to reference Li, X., Du, J.: Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf. Secur. 7(1), 39–50 (2013)CrossRef Li, X., Du, J.: Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf. Secur. 7(1), 39–50 (2013)CrossRef
10.
go back to reference Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurrency Comput. Pract. Exp. 28(10), 2991–3005 (2015)CrossRef Stojmenovic, I., Wen, S., Huang, X., Luan, H.: An overview of fog computing and its security issues. Concurrency Comput. Pract. Exp. 28(10), 2991–3005 (2015)CrossRef
11.
go back to reference Liang, G.: Automatic traffic accident detection based on the internet of things and support vector machine. Int. J. Smart Home 9(4), 97–106 (2015)MathSciNetCrossRef Liang, G.: Automatic traffic accident detection based on the internet of things and support vector machine. Int. J. Smart Home 9(4), 97–106 (2015)MathSciNetCrossRef
12.
go back to reference Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Proceedings of 2014 Federated Conference on Computer Science and Information Systems, vol. 2, pp. 1–8 (2014) Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: Proceedings of 2014 Federated Conference on Computer Science and Information Systems, vol. 2, pp. 1–8 (2014)
13.
go back to reference Khan, S.U., Khan, R.: Content-location based key management scheme for content centric networks. In: Proceedings of 6th International Conference on Security of Information and Networks - SIN 2013, pp. 376–379 (2013) Khan, S.U., Khan, R.: Content-location based key management scheme for content centric networks. In: Proceedings of 6th International Conference on Security of Information and Networks - SIN 2013, pp. 376–379 (2013)
14.
go back to reference Muzammal, S.M., et al.: Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 6, 20722–20733 (2018)CrossRef Muzammal, S.M., et al.: Counter measuring conceivable security threats on smart healthcare devices. IEEE Access 6, 20722–20733 (2018)CrossRef
16.
go back to reference Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)CrossRef Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)CrossRef
18.
go back to reference Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)CrossRef Colquitt, J.A., Scott, B.A., LePine, J.A.: Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. J. Appl. Psychol. 92(4), 909 (2007)CrossRef
19.
go back to reference Kang, D., Jung, J., Mun, J., Lee, D., Choi, Y., Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)CrossRef Kang, D., Jung, J., Mun, J., Lee, D., Choi, Y., Won, D.: Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain. Secur. Commun. Netw. 9(11), 1462–1476 (2016)CrossRef
Metadata
Title
Maintaining Fog Trust Through Continuous Assessment
Authors
Hasan Ali Khattak
Muhammad Imran
Assad Abbas
Samee U. Khan
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-23381-5_10