Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3569507.3569509acmotherconferencesArticle/Chapter ViewAbstractPublication PagescciotConference Proceedingsconference-collections
research-article

SecMesh: An efficient information security method for stream processing in edge-fog-cloud

Published: 09 December 2022 Publication History

Abstract

The management and processing of the data life-cycle produced by Internet of Things (IoT) devices through edge-fog-cloud infrastructures results key for organizations to derive useful information for decision-making processes. When managing health IoT data, organizations should implement strict security policies to face threats or mitigate risks arising in each infrastructure (any combination of edge, fog, or cloud), which is not a trivial task. In this paper, we present the design, development, and evaluation of SecMesh, an efficient information security method for stream processing in edge-fog-cloud infrastructures. This method is based on a mesh model, where independent and generic security services are managed and coupled to securely manage edge-fog-cloud data flows. SecMesh also includes efficient processing schemes based on both parallel patterns and online/offline encryption to compensate the costs of security services and to produce a continuous secure data delivery/retrieval for applications deployed on edge-fog-cloud. A prototype of SecMesh was implemented to create edge-fog-cloud services, which was used to conduct a case study to manage electrocardiograms. The performance evaluation revealed the feasibility of SecMesh to build multiple efficient security services on heterogeneous infrastructures.

References

[1]
Mohammed Al-khafajiy, Lee Webster, Thar Baker, and Atif Waraich. 2018. Towards Fog Driven IoT Healthcare: Challenges and Framework of Fog Computing in Healthcare. In ICFNDS ’18 (Amman, Jordan). New York, NY, USA, Article 9, 7 pages.
[2]
Abdulwahab Alazeb and Brajendra Panda. 2019. Ensuring data integrity in fog computing based health-care systems. In SpaCCS. Springer, Atlanta, GA, USA, 63–77.
[3]
Tahani Almehmadi, Suhair Alshehri, and Sabeen Tahir. 2019. A Secure Fog-Cloud Based Architecture for MIoT. In CCAIS. IEEE, Riyadh, Kingdom of Saudi Arabia, 1–6.
[4]
Roberto Beraldi, Hussein Alnuweiri, and Abderrahmen Mtibaa. 2018. A power-of-two choices based algorithm for fog computing. IEEE Trans. on Cloud Comput. 8, 3 (2018), 698–709.
[5]
Kay Bierzynski, Antonio Escobar, and Matthias Eberl. 2017. Cloud, fog and edge: Cooperation for the future?. In FMEC. IEEE, Valencia, Spain, 62–67.
[6]
Hung Cao and Monica Wachowicz. 2019. An edge-fog-cloud architecture of streaming analytics for internet of things applications. Sensors 19, 16 (2019), 3594.
[7]
Diana Carrizales-Espinoza, Dante D Sanchez-Gallegos, JL Gonzalez-Compean, and Jesus Carretero. 2022. FedFlow: a federated platform to build secure sharing and synchronization services for health dataflows. Computing 1(2022), 1–19.
[8]
Diana Carrizales-Espinoza, Dante D Sánchez-Gallegos, JL Gonzalez-Compean, Jesus Carretero, and Ricardo Marcelin-Jimenez. 2022. SeRSS: a storage mesh architecture to build serverless reliable storage services. In PDP. IEEE, Valladolid, Spain, 88–91.
[9]
Shu-jen Chang, Ray Perlner, William E Burr, Meltem Sönmez Turan, John M Kelsey, Souradyuti Paul, and Lawrence E Bassham. 2012. Third-round report of the SHA-3 cryptographic hash algorithm competition. NIST Interagency Report 7896 (2012), 121.
[10]
Dimiter V Dimitrov. 2016. Medical internet of things and big data in healthcare. Healthc. Inform. Res. 22, 3 (2016), 156–163.
[11]
Dimiter V Dimitrov. 2016. Medical internet of things and big data in healthcare. Healthcare informatics research 22, 3 (2016), 156–163.
[12]
Hadia M.S. El Hennawy, Alaa E.A. Omar, and Salah M.A. Kholaif. 2015. LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm. Ain Shams Engineering Journal 6, 1 (2015), 57–65.
[13]
Farshad Firouzi, Bahar Farahani, Ehsan Panahi, and Mojtaba Barzegari. 2021. Task Offloading for Edge-Fog-Cloud Interplay in the Healthcare Internet of Things (IoT). In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). IEEE, Barcelona, Spain, 1–8.
[14]
Felix Garcia-Carballeira, Alejandro Calderon, and Jesus Carretero. 2021. Enhancing the power of two choices load balancing algorithm using round robin policy. Cluster Computing 24, 2 (2021), 611–624.
[15]
Gonzalez, Perez, Sosa-Sosa, Sanchez, and Bergua. 2015. SkyCDS: A resilient content delivery service based on diversified cloud storage. SIMPAT 54(2015), 64–85.
[16]
Lilian Hernandez, Hung Cao, and Monica Wachowicz. 2017. Implementing an edge-fog-cloud architecture for stream data management. In FWC. IEEE, Santa Clara, California, USA, 1–6.
[17]
Susan Hohenberger and Brent Waters. 2014. Online/offline attribute-based encryption. In PKC. Springer, Buenos Aires, Argentina, 293–310.
[18]
Senwen Kan and Jennifer Dworak. 2018. IJTAG Integrity Checking with Chained Hashing. In ITC. IEEE, Phoenix, Arizona, USA, 1–10.
[19]
Wazir Zada Khan, Ejaz Ahmed, Saqib Hakak, Ibrar Yaqoob, and Arif Ahmed. 2019. Edge computing: A survey. Future Gener. Comput. Syst. 97 (2019), 219–235.
[20]
McAfee. 2019. Cloud Adoption and Risk Report. https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-cloud-adoption-risk.pdf, Accessed on April, 2022.
[21]
Morales, Gonzalez, Diaz, and Sosa. 2018. A pairing-based cryptographic approach for data security in the cloud. IJISP 17, 4 (2018), 441–461.
[22]
Morales, Santiago, Gaytan, Gonzalez, Sosa, and Lopez. 2018. A Data Distribution Service for Cloud and Containerized Storage Based on Information Dispersal. In SOSE. IEEE, Bamberg, Germany, 86–95.
[23]
Nour Moustafa. 2019. A systemic iot-fog-cloud architecture for big-data analytics and cyber security systems: A review of fog computing. arXiv preprint arXiv:1906.01055 2019 (2019), 1–7.
[24]
Giuseppe Nebbione and Maria Calzarossa. 2020. Security of IoT application layer protocols: Challenges and findings. Future Internet 12, 3 (2020), 55.
[25]
Ortega-Arjona. 2010. Patterns for Parallel Software Design(1st ed.). Wiley Publishing, West Sussex, United Kingdom.
[26]
Kamini Pareek, Pradeep Kumar Tiwari, and Vaibhav Bhatnagar. 2021. Fog Computing in Healthcare: A Review. In Materials Science and Engineering, Vol. 1099. IOP Publishing, IOP Publishing, Jaipur, India, 012025.
[27]
Salvador Pérez, Domenico Rotondi, Diego Pedone, Leonardo Straniero, María José Núñez, and Fernando Gigante. 2017. Towards the CP-ABE application for privacy-preserving secure data sharing in IoT contexts. In IMIS. Springer, Torino, Italy, 917–926.
[28]
Dante D Sánchez, Alejandro Galaviz, JL Gonzalez, Salvador Villarreal, Aldo E Perez, Diana Carrizales, and Jesus Carretero. 2020. On the Continuous Processing of Health Data in Edge-Fog-Cloud Computing by Using Micro/Nanoservice Composition. IEEE Access 8(2020), 120255–120281.
[29]
Holger Schulze. 2022. The Biggest Cloud Security Challenges in 2022. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/the-biggest-cloud-security-challenges-in-2022/
[30]
M Sznajder and M Lukowska. 2017. Python online and offline ECG QRS detector based on the pan-Tomkins algorithm. Zenodo 2, 2 (2017), 5.
[31]
Dante D. Sánchez, Diana Carrizales, Hugo G. Reyes, J.L. Gonzalez, Jesus Carretero, Miguel Morales, and Alejandro Galaviz. 2020. From the edge to the cloud: A continuous delivery and preparation model for processing big IoT data. SIMPAT 105(2020), 102136.
[32]
M. Tran, D. Nguyen, V. Le, D. Nguyen, and T. Pham. 2019. Task placement on fog computing made efficient for IoT application provision. Wirel. Commun. Mob. Comput. 2019 (2019), 1–18.
[33]
Shreshth Tuli, Redowan Mahmud, Shikhar Tuli, and Rajkumar Buyya. 2019. Fogbus: A blockchain-based lightweight framework for edge and fog computing. Journal of Systems and Software 154 (2019), 22–36.

Cited By

View all
  • (2024)Federated Learning-Oriented Edge Computing Framework for the IIoTSensors10.3390/s2413418224:13(4182)Online publication date: 27-Jun-2024
  • (2024)Detection and Localization of Malicious Nodes in Internet of Things Based on SDNWireless Artificial Intelligent Computing Systems and Applications10.1007/978-3-031-71467-2_37(465-480)Online publication date: 14-Nov-2024
  • (2023)A Survey on Networked Data Streaming With Apache KafkaIEEE Access10.1109/ACCESS.2023.330381011(85333-85350)Online publication date: 2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CCIOT '22: Proceedings of the 2022 7th International Conference on Cloud Computing and Internet of Things
September 2022
82 pages
ISBN:9781450396738
DOI:10.1145/3569507
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 December 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Edge-Fog-Cloud
  2. Medical data
  3. Security services
  4. Serverless
  5. Storage systems

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • CONACYT-PRONACES
  • DECIDE

Conference

CCIOT 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Federated Learning-Oriented Edge Computing Framework for the IIoTSensors10.3390/s2413418224:13(4182)Online publication date: 27-Jun-2024
  • (2024)Detection and Localization of Malicious Nodes in Internet of Things Based on SDNWireless Artificial Intelligent Computing Systems and Applications10.1007/978-3-031-71467-2_37(465-480)Online publication date: 14-Nov-2024
  • (2023)A Survey on Networked Data Streaming With Apache KafkaIEEE Access10.1109/ACCESS.2023.330381011(85333-85350)Online publication date: 2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media