论文标题

一种基于区块链加密的方法来保护雾化联邦免受流氓节点

A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes

论文作者

Alshehri, Mohammed, Panda, Brajendra

论文摘要

人们已经使用云计算方法远程存储数据。作为这种方法的吉祥,它带来了许多挑战:从数据安全到数据计算的时间延迟问题以及向最终用户交付。雾计算已成为云计算的扩展,以将数据处理和存储接近最终用户的传播。但是,它可以最大程度地减少时间延迟问题,但仍面临数据安全挑战。例如,当损害向最终用户提供服务的雾节点时,可能会违反用户的数据安全性。因此,本文通过集成CP-ABE算法和区块链概念,提出了一个安全且细粒度的数据访问控制方案,以防止在驱逐受损害的FOG节点的情况下,防止FOG节点违反最终用户的数据安全性。我们还根据其属性(例如服务和位置)将雾节点分类为雾化联合会,以最大程度地减少雾节点和云服务器之间的时间延迟和通信开销。此外,区块链概念和CP-ABE算法的剥削和集成使同一FOG联合会中的FOG节点能够以分布式的方式执行授权过程。此外,为了解决时间延迟和通信间接费用问题,我们为每个FOG节点配备了一个离链数据库,以在特定时间内存储最常访问的数据文件,并使用链上访问控制策略表(链上文件跟踪表),必须保护,这些表不受恶意(Rogue(Rogue)(Rogue)Fog Nodes的篡改。因此,区块链在这里起着至关重要的作用,因为它本质上是防篡改的。我们通过设计算法和进行安全分析来证明我们计划的效率和可行性。提供的分析表明,所提出的方案在驱散恶意(Rogue)雾节点方面是有效且可行的。

People have used cloud computing approach to store their data remotely. As auspicious as this approach is, it brings forth many challenges: from data security to time latency issues with data computation as well as delivery to end users. Fog computing has emerged as an extension for cloud computing to bring data processing and storage close to end-users; however, it minimizes the time latency issue but still suffers from data security challenges. For instance, when a fog node providing services to end users is compromised, the users' data security can be violated. Thus, this paper proposes a secure and fine-grained data access control scheme by integrating the CP-ABE algorithm and blockchain concept to prevent fog nodes from violating end users' data security in a situation where a compromised fog node is being ousted. We also classify the fog nodes into fog federations, based on their attributes such as services and locations, to minimize the time latency and communication overhead between fog nodes and cloud server. Further, the exploitation and integration of the blockchain concept and the CP-ABE algorithm enables fog nodes in the same fog federation to perform the authorization process in a distributed manner. In addition, to solve time latency and communication overhead problems, we equip every fog node with an off-chain database to store most frequently accessed data files for specific time, and with an on-chain access control policies table (On-chain Files Tracking Table) which must be protected from being tampered by malicious (rogue) fog nodes. Therefore, blockchain plays a vital role here as it is tamper-proof by nature. We demonstrate our scheme's efficiency and feasibility by designing algorithms and conducting a security analysis. The provided analysis shows that the proposed scheme is efficient and feasible in ousting malicious (rogue) fog nodes.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源