Skip to main content
Top

2020 | OriginalPaper | Chapter

Secure Apps in the Fog: Anything to Declare?

Authors : Antonio Brogi, Gian-Luigi Ferrari, Stefano Forti

Published in: Advances in Service-Oriented and Cloud Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Assessing security of application deployments in the Fog is a non-trivial task, having to deal with highly heterogeneous infrastructures containing many resource-constrained devices. In this paper, we introduce: (i) a declarative way of specifying security capabilities of Fog infrastructures and security requirements of Fog applications, and (ii) a (probabilistic) reasoning strategy to determine application deployments and to quantitatively assess their security level, considering the trust degree of application operators in different Cloud/Fog providers. A lifelike example is used to showcase a first proof-of-concept implementation and to illustrate how it can be used in synergy with other predictive tools to optimise the deployment of Fog applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
The proposed taxonomy can be easily modified, extended and refined so as to include new security categories and third-level security features as soon as normative security frameworks will get established for the Fog.
 
3
For the sake of simplicity, in this paper, we assume that operators exploit the vocabulary of the example taxonomy in Fig. 1. In reality, different operators can employ different vocabulary and then rely on mediation mechanisms [31].
 
4
For the sake of readability, we omit the application requirements. The interested reader can find all the details in [8].
 
5
A fact declared simply as f. is assumed to be true with probability 1.
 
6
f, r and {ci} can include variable (upper-case) or constant (lower-case) terms. The OR operator \(\vee \) is denoted by a semicolon like in c1; c2.
 
7
For the sake of simplicity, we assume here \(\omega _m = \frac{1}{|M|}\), which can be tuned differently depending on the needs of the application operator.
 
Literature
3.
go back to reference Belle, V.: Logic meets probability: towards explainable AI systems for uncertain worlds. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI, pp. 19–25 (2017) Belle, V.: Logic meets probability: towards explainable AI systems for uncertain worlds. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI, pp. 19–25 (2017)
4.
go back to reference Bistarelli, S., Martinelli, F., Santini, F.: Weighted datalog and levels of trust. In: 3rd International Conference on Availability, Reliability and Security, pp. 1128–1134 (2008) Bistarelli, S., Martinelli, F., Santini, F.: Weighted datalog and levels of trust. In: 3rd International Conference on Availability, Reliability and Security, pp. 1128–1134 (2008)
5.
go back to reference Brogi, A., Forti, S.: QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J. 4(5), 1185–1192 (2017)CrossRef Brogi, A., Forti, S.: QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J. 4(5), 1185–1192 (2017)CrossRef
6.
go back to reference Brogi, A., Forti, S., Guerrero, C., Lera, I.: How to Place Your Apps in the Fog - State of the Art and Open Challenges. arXiv:1901.05717 [cs.DC] (2019) Brogi, A., Forti, S., Guerrero, C., Lera, I.: How to Place Your Apps in the Fog - State of the Art and Open Challenges. arXiv:​1901.​05717 [cs.DC] (2019)
7.
go back to reference Brogi, A., Forti, S., Ibrahim, A.: How to best deploy your Fog applications, probably. In: Rana, O., Buyya, R., Anjum, A. (eds.) Proceedings of 1st IEEE International Conference on Fog and Edge Computing (2017) Brogi, A., Forti, S., Ibrahim, A.: How to best deploy your Fog applications, probably. In: Rana, O., Buyya, R., Anjum, A. (eds.) Proceedings of 1st IEEE International Conference on Fog and Edge Computing (2017)
8.
go back to reference Brogi, A., Forti, S., Ibrahim, A.: Deploying fog applications: how much does it cost, by the way? In: Proceedings of the 8th International Conference on Cloud Computing and Services Science, pp. 68–77. SciTePress (2018) Brogi, A., Forti, S., Ibrahim, A.: Deploying fog applications: how much does it cost, by the way? In: Proceedings of the 8th International Conference on Cloud Computing and Services Science, pp. 68–77. SciTePress (2018)
9.
go back to reference Brogi, A., Forti, S., Ibrahim, A., Rinaldi, L.: Bonsai in the fog: an active learning lab with fog computing. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 79–86. IEEE (2018) Brogi, A., Forti, S., Ibrahim, A., Rinaldi, L.: Bonsai in the fog: an active learning lab with fog computing. In: 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), pp. 79–86. IEEE (2018)
10.
go back to reference Choo, K.K.R., Lu, R., Chen, L., Yi, X.: A foggy research future: advances and future opportunities in fog computing research (2018) Choo, K.K.R., Lu, R., Chen, L., Yi, X.: A foggy research future: advances and future opportunities in fog computing research (2018)
11.
go back to reference Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)CrossRef Dastjerdi, A.V., Buyya, R.: Fog computing: helping the internet of things realize its potential. Computer 49(8), 112–116 (2016)CrossRef
13.
go back to reference De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: a probabilistic prolog and its application in link discovery. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence, pp. 2468–2473 (2007) De Raedt, L., Kimmig, A., Toivonen, H.: ProbLog: a probabilistic prolog and its application in link discovery. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence, pp. 2468–2473 (2007)
14.
go back to reference Forti, S.: Supporting application deployment and management in fog computing. Papers From the 12th Advanced Summer School on Service-Oriented Computing (SummerSOC 2018), pp. 64–75 (2018) Forti, S.: Supporting application deployment and management in fog computing. Papers From the 12th Advanced Summer School on Service-Oriented Computing (SummerSOC 2018), pp. 64–75 (2018)
15.
go back to reference Goettelmann, E., Dahman, K., Gateau, B., Dubois, E., Godart, C.: A security risk assessment model for business process deployment in the cloud. In: 2014 IEEE International Conference on Services Computing, pp. 307–314. IEEE (2014) Goettelmann, E., Dahman, K., Gateau, B., Dubois, E., Godart, C.: A security risk assessment model for business process deployment in the cloud. In: 2014 IEEE International Conference on Services Computing, pp. 307–314. IEEE (2014)
16.
go back to reference Guerrero, C., Lera, I., Juiz, C.: Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications. J. Supercomput. 74(7), 2956–2983 (2018)CrossRef Guerrero, C., Lera, I., Juiz, C.: Resource optimization of container orchestration: a case study in multi-cloud microservices-based applications. J. Supercomput. 74(7), 2956–2983 (2018)CrossRef
17.
go back to reference Guerrero, C., Lera, I., Juiz, C.: A lightweight decentralized service placement policy for performance optimization in fog computing. J. Ambient. Intell. Hum. Comput. (2018) Guerrero, C., Lera, I., Juiz, C.: A lightweight decentralized service placement policy for performance optimization in fog computing. J. Ambient. Intell. Hum. Comput. (2018)
18.
go back to reference Gupta, H., Vahid Dastjerdi, A., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw. Pract. Exp. 47(9), 1275–1296 (2017)CrossRef Gupta, H., Vahid Dastjerdi, A., Ghosh, S.K., Buyya, R.: iFogSim: a toolkit for modeling and simulation of resource management techniques in the Internet of Things, edge and fog computing environments. Softw. Pract. Exp. 47(9), 1275–1296 (2017)CrossRef
19.
go back to reference Arkian, H.R., Diyanat, A., Pourkhalili, A.: MIST: fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications. J. Netw. Comput. Appl. 82, 152–165 (2017)CrossRef Arkian, H.R., Diyanat, A., Pourkhalili, A.: MIST: fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications. J. Netw. Comput. Appl. 82, 152–165 (2017)CrossRef
20.
go back to reference Hong, H.J., Tsai, P.H., Hsu, C.H.: Dynamic module deployment in a fog computing platform. In: 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6 (2016) Hong, H.J., Tsai, P.H., Hsu, C.H.: Dynamic module deployment in a fog computing platform. In: 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1–6 (2016)
21.
go back to reference Kaur, A., Singh, M., Singh, P., et al.: A taxonomy, survey on placement of virtual machines in cloud. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 2054–2058. IEEE (2017) Kaur, A., Singh, M., Singh, P., et al.: A taxonomy, survey on placement of virtual machines in cloud. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 2054–2058. IEEE (2017)
22.
go back to reference Luna, J., Taha, A., Trapero, R., Suri, N.: Quantitative reasoning about cloud security using service level agreements. IEEE Trans. Cloud Comput. 5(3), 457–471 (2017)CrossRef Luna, J., Taha, A., Trapero, R., Suri, N.: Quantitative reasoning about cloud security using service level agreements. IEEE Trans. Cloud Comput. 5(3), 457–471 (2017)CrossRef
23.
go back to reference Mahmud, R., Ramamohanarao, K., Buyya, R.: Latency-aware application module management for fog computing environments. Trans. Internet Technol. 19, 1–21 (2018) Mahmud, R., Ramamohanarao, K., Buyya, R.: Latency-aware application module management for fog computing environments. Trans. Internet Technol. 19, 1–21 (2018)
24.
go back to reference Mezni, H., Sellami, M., Kouki, J.: Security-aware SaaS placement using swarm intelligence. J. Softw. Evol. Process. 30(8), e1932 (2018)CrossRef Mezni, H., Sellami, M., Kouki, J.: Security-aware SaaS placement using swarm intelligence. J. Softw. Evol. Process. 30(8), e1932 (2018)CrossRef
25.
go back to reference Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017)CrossRef Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017)CrossRef
26.
go back to reference Nacer, A.A., Goettelmann, E., Youcef, S., Tari, A., Godart, C.: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment. In: 2016 IEEE World Congress on Services (SERVICES), pp. 18–25. IEEE (2016) Nacer, A.A., Goettelmann, E., Youcef, S., Tari, A., Godart, C.: Obfuscating a business process by splitting its logic with fake fragments for securing a multi-cloud deployment. In: 2016 IEEE World Congress on Services (SERVICES), pp. 18–25. IEEE (2016)
27.
go back to reference Newman, S.: Building microservices: designing fine-grained systems. O’Reilly Media Inc., Sebastopol (2015) Newman, S.: Building microservices: designing fine-grained systems. O’Reilly Media Inc., Sebastopol (2015)
28.
go back to reference Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Comm. Surv. Tutor. 20, 601–628 (2017)CrossRef Ni, J., Zhang, K., Lin, X., Shen, X.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Comm. Surv. Tutor. 20, 601–628 (2017)CrossRef
29.
go back to reference OpenFog: OpenFog Reference Architecture (2016) OpenFog: OpenFog Reference Architecture (2016)
30.
go back to reference Rahbari, D., Nickray, M.: Scheduling of fog networks with optimized knapsack by symbiotic organisms search. In: 2017 21st Conference of Open Innovations Association (FRUCT), pp. 278–283 (2017) Rahbari, D., Nickray, M.: Scheduling of fog networks with optimized knapsack by symbiotic organisms search. In: 2017 21st Conference of Open Innovations Association (FRUCT), pp. 278–283 (2017)
31.
go back to reference Rodríguez, M.A., Egenhofer, M.J.: Determining semantic similarity among entity classes from different ontologies. Trans. Knowl. Data Eng. 15(2), 442–456 (2003)CrossRef Rodríguez, M.A., Egenhofer, M.J.: Determining semantic similarity among entity classes from different ontologies. Trans. Knowl. Data Eng. 15(2), 442–456 (2003)CrossRef
32.
go back to reference Schoenen, S., Mann, Z.Á., Metzger, A.: Using risk patterns to identify violations of data protection policies in cloud systems. In: Braubach, L., Murillo, J.M., Kaviani, N., Lama, M., Burgueño, L., Moha, N., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10797, pp. 296–307. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91764-1_24CrossRef Schoenen, S., Mann, Z.Á., Metzger, A.: Using risk patterns to identify violations of data protection policies in cloud systems. In: Braubach, L., Murillo, J.M., Kaviani, N., Lama, M., Burgueño, L., Moha, N., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10797, pp. 296–307. Springer, Cham (2018). https://​doi.​org/​10.​1007/​978-3-319-91764-1_​24CrossRef
33.
go back to reference Skarlat, O., Nardelli, M., Schulte, S., Dustdar, S.: Towards QoS-aware fog service placement. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 89–96 (2017) Skarlat, O., Nardelli, M., Schulte, S., Dustdar, S.: Towards QoS-aware fog service placement. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 89–96 (2017)
34.
go back to reference Soldani, J., Tamburri, D.A., Van Den Heuvel, W.J.: The pains and gains of microservices: a systematic grey literature review. J. Syst. Softw. 146, 215–232 (2018)CrossRef Soldani, J., Tamburri, D.A., Van Den Heuvel, W.J.: The pains and gains of microservices: a systematic grey literature review. J. Syst. Softw. 146, 215–232 (2018)CrossRef
35.
go back to reference Taneja, M., Davy, A.: Resource aware placement of IoT application modules in fog-cloud computing paradigm. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1222–1228 (2017) Taneja, M., Davy, A.: Resource aware placement of IoT application modules in fog-cloud computing paradigm. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1222–1228 (2017)
36.
go back to reference Tang, Z., Zhou, X., Zhang, F., Jia, W., Zhao, W.: Migration modeling and learning algorithms for containers in fog computing. Trans. Serv. Comput. 12, 712–725 (2018)CrossRef Tang, Z., Zhou, X., Zhang, F., Jia, W., Zhao, W.: Migration modeling and learning algorithms for containers in fog computing. Trans. Serv. Comput. 12, 712–725 (2018)CrossRef
37.
go back to reference Varshney, P., Simmhan, Y.: Demystifying fog computing: characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 115–124 (2017) Varshney, P., Simmhan, Y.: Demystifying fog computing: characterizing architectures, applications and abstractions. In: 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp. 115–124 (2017)
38.
go back to reference Wang, S., Zafer, M., Leung, K.K.: Online placement of multi-component applications in edge computing environments. IEEE Access 5, 2514–2533 (2017)CrossRef Wang, S., Zafer, M., Leung, K.K.: Online placement of multi-component applications in edge computing environments. IEEE Access 5, 2514–2533 (2017)CrossRef
39.
go back to reference Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for Internet of Things services. IEEE Internet Comput. 21(2), 16–24 (2017)CrossRef Wen, Z., Yang, R., Garraghan, P., Lin, T., Xu, J., Rovatsos, M.: Fog orchestration for Internet of Things services. IEEE Internet Comput. 21(2), 16–24 (2017)CrossRef
40.
go back to reference Wen, Z., Cała, J., Watson, P., Romanovsky, A.: Cost effective, reliable and secure workflow deployment over federated clouds. Trans. Serv. Comput. 10(6), 929–941 (2017)CrossRef Wen, Z., Cała, J., Watson, P., Romanovsky, A.: Cost effective, reliable and secure workflow deployment over federated clouds. Trans. Serv. Comput. 10(6), 929–941 (2017)CrossRef
41.
go back to reference Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)CrossRef Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)CrossRef
Metadata
Title
Secure Apps in the Fog: Anything to Declare?
Authors
Antonio Brogi
Gian-Luigi Ferrari
Stefano Forti
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-63161-1_4

Premium Partner