Abstract
Blockchain expansion is the high priority necessity to improve security. Hacking and other attacks are headway from system innovation and security measures for the cloud architecture. That is why the countermeasure deployed for such attacks should act in an opportune way and ought to be situated as close as possible to attacking device. As an example, DDoS attacks were not that complex as they are getting now with the new technology known as IoT. Imagine the consequences if 25 billion of IoT devices generate a huge amount of data for DDoS attacks. That is why we propose a new framework that can expand blockchain in a manner where more companies can share their resources to enhance security. So, we proposed a new and complete framework with cloud, fog, to secure configuration files with blockchain technology. Our framework considers the configuration files from SDN or NFV as an asset to secure with blockchain. By saving configuration files into blockchain, we can detect illegal changes occurred to configuration files after hacking attack. This study also focuses on expanding blockchain between the multiple service providers with ease to prevent waste of resources. This paper mainly provides opportunities for different could or companies to secure their assets by employing the power of blockchain and smart contracts.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Agiwal M, Roy A, Saxena N (2016) Next generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials. https://doi.org/10.1109/COMST.2016.2532458
Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in internet of things. Comput Netw 129:459–471. https://doi.org/10.1016/j.comnet.2017.06.013
Alavian SA, Chimeh JD (2009) Mobile systems challenges in next generation networks. Int J Futur Gener Commun Netw 1: 15–22. https://www.sersc.org/journals/IJFGCN/vol1_no1/papers/03.pdf
Arasteh H, Hosseinnezhad V, Loia V, Tommasetti A, Troisi O, Shafie-khah M, Siano P (2016) IoT-based smart cities: a survey iot-based smart cities: a survey. In: 2016 IEEE 16th international conference on environment and electrical engineering (EEEIC), pp 2–7. doi:10.1109/EEEIC.2016.7555867
Cardenas AA, Manadhata PK, Rajan SP (2013) Big data analytics for security. IEEE Secur. Priv. 11:74–76. https://doi.org/10.1109/MSP.2013.138
Frustaci M, Pace P, Aloi G, Fortino G (2017) Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2017.2767291
Gódor G, Jakó Z, Knapp Á, Imre S (2015) A survey of handover management in LTE-based multi-tier femtocell networks: Requirements, challenges and solutions. Comput Netw 76:17–41. https://doi.org/10.1016/j.comnet.2014.10.016
Gul J, Mushtaq S, Riaz R (2012) Optimal guard node placement using SGLD and energy factor. J Comput 4:87–92
Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Pennsylvania
Gupta BB, Perez GM, Agrawal DP, Gupta D (2019) Handbook of computer networks and cyber security: principles and paradigms. Springer, Berlin. https://www.springer.com/gp/book/9783030222765. Accessed August 19, 2019
Kambourakis G, Kolias C, Stavrou A (2017) The Mirai botnet and the IoT Zombie Armies. In: Proceeding of the IEEE military communication conference MILCOM, 2017, pp 267–272. doi:10.1109/MILCOM.2017.8170867.
Kim J, Kim D, Choi S (2017) 3GPP SA2 architecture and functions for 5G mobile communication system. ICT Express 3:1–8. https://doi.org/10.1016/j.icte.2017.03.007
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer (Long Beach Calif). 50:80–84. https://doi.org/10.1109/MC.2017.201
Lee I, Lee K (2015) The internet of things (IoT): applications, investments, and challenges for enterprises. Bus Horiz 58:431–440. https://doi.org/10.1016/j.bushor.2015.03.008
Lytras MD, Al-Halabi W, Zhang JX, Haraty RA, Masud M (2015) Enabling technologies and business infrastructures for next generation social media: Big data, cloud computing, internet of things and virtual reality. J Univers Comput Sci 21:1379–1384
Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IAT, Siddiqa A, Yaqoob I (2017) Big IoT data analytics: architecture, opportunities, and open research challenges. IEEE Access 5:5247–5261. https://doi.org/10.1109/ACCESS.2017.2689040
Mourtzis D, Vlachou E, Milas N (2016) Industrial big data as a result of IoT adoption in manufacturing. In: Procedia CIRP, 2016: pp 290–295. doi:10.1016/j.procir.2016.07.038.
Neupane RL, Neely T, Chettri N, Vassell M, Zhang Y, Calyam P, Durairajan R (2018) Dolus: cyber defense using pretense against DDoS attacks in cloud platforms. In: ACM international conference on proceeding series Part F1331 (2018). doi:10.1145/3154273.3154346.
Olakanmi OO, Dada A (2019) an efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms. Int J Cloud Appl Comput 9:79–98. https://doi.org/10.4018/ijcac.2019040105
Osanaiye O, Choo KKR, Dlodlo M (2016) Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67:147–165. https://doi.org/10.1016/j.jnca.2016.01.001
Ouaguid A, Abghour N, Ouzzif M (2018) A novel security framework for managing android permissions using blockchain technology. Int J Cloud Appl Comput 8:55–79. https://doi.org/10.4018/IJCAC.2018010103
Pacheco J, Hariri S (2016) IoT security framework for smart cyber infrastructures. In: Proceeding of the IEEE 1st international workshops on foundations and applications of self-systems, FAS-W 2016, 2016, pp 242–247. doi:10.1109/FAS-W.2016.58.
Saeed F, Paul A, Rehman A, Hong W, Seo H (2018) IoT-based intelligent modeling of smart home environment for fire prevention and safety. J Sens Actuator Netw 7:11. https://doi.org/10.3390/jsan7010011
Somani G, Gaur MS, Sanghi D, Conti M, Buyya R (2017) DDoS attacks in cloud computing: issues, taxonomy, and future directions. Comput Commun 107:30–48. https://doi.org/10.1016/j.comcom.2017.03.010
Stergiou C, Psannis KE, Gupta BB, Ishibashi Y (2018) Security, privacy and efficiency of sustainable cloud computing for big data & IoT. Sustain Comput Informatics Syst 19:174–184. https://doi.org/10.1016/J.SUSCOM.2018.06.003
Tweneboah-Koduah S, Skouby KE, Tadayoni R (2017) Cyber security threats to IoT applications and service domains. Wirel Pers Commun 95:169–185. https://doi.org/10.1007/s11277-017-4434-6
Wang P, Valerdi R, Zhou S, Li L (2015) Introduction: Advances in IoT research and applications. Inf Syst Front 17:239–241. https://doi.org/10.1007/s10796-015-9549-2
Wang Y, de Almeida Correia GH, van Arem B, Timmermans HJP (2018) Understanding travellers’ preferences for different types of trip destination based on mobile internet usage data. Transp. Res. Part C Emerg. Technol. 90:247–259. https://doi.org/10.1016/J.TRC.2018.03.009
Xu X, Zhang H, Dai X, Hou Y, Tao X, Zhang P (2014) SDN based next generation mobile network with service slicing and trials. China Commun 11:65–77. https://doi.org/10.1109/CC.2014.6821738
Zand A, Modelo-Howard G, Tongaonkar A, Lee SJ, Kruegel C, Vigna G (2017) Demystifying DDoS as a service. IEEE Commun Mag 55:14–21. https://doi.org/10.1109/MCOM.2017.1600980
Zhu S, Han Y (2018) Secure data outsourcing scheme in cloud computing with attribute-based encryption. Int J High Perform Comput Netw 12:128. https://doi.org/10.1504/IJHPCN.2018.094363
Acknowledgement
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2016R1D1A1A09919551).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest.
Additional information
Communicated by V. Loia.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gul, M.J., Rehman, A., Paul, A. et al. Blockchain Expansion to secure Assets with Fog Node on special Duty. Soft Comput 24, 15209–15221 (2020). https://doi.org/10.1007/s00500-020-04857-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-020-04857-0