Skip to main content

CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems

  • Conference paper
  • First Online:
Intelligent Distributed Computing XIII (IDC 2019)

Abstract

The ubiquitous connectivity of “things” in the Internet of Things, and fog computing systems, presents a stimulating setting for innovation and business opportunity, but also an immense set of security threats and challenges. Security engineering for such systems must take into consideration the peculiar conditions under which these systems operate: low resource constraints, decentralized decision making, large device churn, etc. Thus, techniques and methodologies of building secure and robust IoT/fog systems have to support these conditions.

In this paper, we are presenting the CAAVI-RICS framework, a novel security review methodology tightly coupled with distributed, IoT and fog computing systems. With CAAVI-RICS we are exploring credibility, authentication, authorization, verification, and integrity through explaining the rationale, influence, concerns and security solutions that accompany them. Our contribution is a through systematic categorization and rationalization of security issues, covering the security landscape of IoT/fog computing systems. Additionally, we contribute to the discussion on the aspects of fog computing security and state-of-the-art solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahmed, S., Tepe, K.: Misbehaviour detection in vehicular networks using logistic trust. In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE (2016)

    Google Scholar 

  • Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the Internet of Things (IoT). In: International Conference on Network Security and Applications, pp. 420–429. Springer (2010)

    Google Scholar 

  • Bao, F., Chen, R.: Trust management for the Internet of Things and its application to service composition. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6. IEEE (2012)

    Google Scholar 

  • Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 164–173. IEEE (1996)

    Google Scholar 

  • Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009)

    Article  Google Scholar 

  • Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)

    Article  Google Scholar 

  • Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. 49, 1162–1174 (2016)

    Article  Google Scholar 

  • Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)

    Article  Google Scholar 

  • Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP-based Internet of Things: an algorithmic overview. Algorithms 6(2), 197–226 (2013)

    Article  Google Scholar 

  • Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 27–33. IEEE (2010)

    Google Scholar 

  • Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. (TOSN) 4(3), 15 (2008)

    Google Scholar 

  • Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in Internet of Things systems. Comput. Commun. 97, 1–14 (2017)

    Article  Google Scholar 

  • Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium, vol. 2004 (2004)

    Google Scholar 

  • Jøsang, A., Keser, C., Dimitrakos, T.: Can we manage trust? In: International Conference on Trust Management, pp. 93–107. Springer (2005)

    Google Scholar 

  • Jyothi, V., Wang, X., Addepalli, S.K., Karri, R.: Brain: behavior based adaptive intrusion detection in networks: using hardware performance counters to detect DDoS attacks. In: 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), pp. 587–588. IEEE (2016)

    Google Scholar 

  • Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)

    Article  Google Scholar 

  • Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, Indianapolis (2010)

    Google Scholar 

  • Kumar, P., Zaidi, N., Choudhury, T.: Fog computing: common security issues and proposed countermeasures. In: 2016 International Conference System Modeling and Advancement in Research Trends (SMART), pp. 311–315. IEEE (2016)

    Google Scholar 

  • Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)

    Google Scholar 

  • Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Anderson, R., Hubaux, J.P.: Fast exclusion of errant devices from vehicular networks. In: 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 135–143. IEEE (2008)

    Google Scholar 

  • Muda, Z., Yassin, W., Sulaiman, M., Udzir, N.I., et al.: A k-means and Naive Bayes learning approach for better intrusion detection. Inform. Technol. J. 10(3), 648–655 (2011)

    Article  Google Scholar 

  • Nitti, M., Girau, R., Atzori, L., Iera, A., Morabito, G.: A subjective model for trustworthiness evaluation in the social Internet of Things. In: 2012 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 18–23. IEEE (2012)

    Google Scholar 

  • Razouk, W., Sgandurra, D., Sakurai, K.: A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. In: Proceedings of the 1st International Conference on Internet of Things and Machine Learning, p. 35. ACM (2017)

    Google Scholar 

  • Rosenfeld, K., Gavas, E., Karri, R.: Sensor physical unclonable functions. In: 2010 IEEE International Symposium on Hardware-oriented Security and Trust (HOST), pp. 112–117. IEEE (2010)

    Google Scholar 

  • Sadeghi, A.R., Schulz, S., Wachsmann, C.: Short paper: lightweight remote attestation using physical functions. In: WiSec 2011 (2011)

    Google Scholar 

  • Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  • Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1–8. IEEE (2014)

    Google Scholar 

  • Sun, Y., Han, Z., Liu, K.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112–119 (2008)

    Article  Google Scholar 

  • Wang, X., Karri, R.: Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(3), 485–498 (2016)

    Article  Google Scholar 

  • Wang, X., Konstantinou, C., Maniatakos, M., Karri, R.: Confirm: detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, pp. 544–551. IEEE Press (2015)

    Google Scholar 

  • Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 685–695. Springer (2015)

    Google Scholar 

  • Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626–23638 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saša Pešić .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pešić, S. et al. (2020). CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems. In: Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., Ivanovic, M. (eds) Intelligent Distributed Computing XIII. IDC 2019. Studies in Computational Intelligence, vol 868. Springer, Cham. https://doi.org/10.1007/978-3-030-32258-8_3

Download citation

Publish with us

Policies and ethics