Research Area:  Fog Computing
Fog-enabled IoT applications are the next step in the deployment of cloud computing backed services through the Internet. The use of fog nodes at the edge of the network reduces traffic to cloud servers, decreases latency of services and improves ubiquity. Security is, however, a fundamental challenge of fog computing because both fog and IoT nodes may be deployed in disperse non-secure locations. Solutions to this challenge rely on expensive cryptography, such as attribute-based encryption of homomorphic encryption, which significantly degrades the response time of the service delivery due to the limited resources of IoT nodes. In this paper, we tackle this issue by relying on the novel concept of fog orchestration. Through orchestration, the network is self-tailored to the service to be delivered, and we use this possibility to enable a secure and efficient service delivery. Specifically, we propose several secure and privacy-by-design protocols for the orchestration and delivery fog-enabled IoT services. We also assume the most challenging scenario in which nodes exchange data in open and potential unsecured networks and they can be subjected to a wide range of active attacks. The feasibility of our proposal and the improvements it brings over related works are discussed through a set of theoretical and empirical evaluations of its performance.
Keywords:  
Author(s) Name:  Alexandre Viejo, David Sánchez
Journal name:  Ad Hoc Networks
Conferrence name:  
Publisher name:  Elsevier
DOI:  10.1016/j.adhoc.2018.08.002
Volume Information:  Volume 82, January 2019, Pages 113-125
Paper Link:   https://www.sciencedirect.com/science/article/abs/pii/S1570870518305493