A two-way trust management system for fog computing

Fog computing is the next frontier of cloud computing since it can compute and store a massive amount of data generated by IoT devices near their sources. Indeed, transmitting all these data to the cloud will take up a huge amount of bandwidth. However, its features and flexibility of deployment mak...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Future generation computer systems 2020-05, Vol.106, p.206-220
Hauptverfasser: Alemneh, Esubalew, Senouci, Sidi-Mohammed, Brunet, Philippe, Tegegne, Tesfa
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 220
container_issue
container_start_page 206
container_title Future generation computer systems
container_volume 106
creator Alemneh, Esubalew
Senouci, Sidi-Mohammed
Brunet, Philippe
Tegegne, Tesfa
description Fog computing is the next frontier of cloud computing since it can compute and store a massive amount of data generated by IoT devices near their sources. Indeed, transmitting all these data to the cloud will take up a huge amount of bandwidth. However, its features and flexibility of deployment make fog computing vulnerable to security and privacy attacks. The high-mobility support, dynamic environment, geographical distribution, location awareness, proximity to end users, and lack of redundancy are among these features that make the existing schemes not adequate to fog computing. Therefore, since trust management ensures security and privacy, we propose a two-way subjective logic-based trust management system that enables a service requester to verify whether a service provider can give reliable and secure services and lets the service provider check the trustworthiness of the service requester. Extensive evaluation of the system shows that the trust value of a node is accurate and converges in a very few trust computation cycles. The solution is also resilient to a large population of misbehaving nodes and it is able to thwart trust-based attacks successfully. Moreover, comparative analysis is made with different modification of the system and two baseline schemes, PeerTrust and EigenTrust. The comparison depicts that the two-way trust management proposals have lower overhead, allow a balanced load distribution, are effective in selecting the right service providers and are more accurate than the conventional one-way trust management systems. •Fog Computing is Vulnerable to security and privacy attacks.•Two-way trust management system ensures security and privacy.•Adaptive weighting increases trust accuracy of good fog nodes.•Behavior change of fog nodes is captured by the trust management system.•Two-way trust management outperforms one-way trust management system.
doi_str_mv 10.1016/j.future.2019.12.045
format Article
fullrecord <record><control><sourceid>elsevier_hal_p</sourceid><recordid>TN_cdi_hal_primary_oai_HAL_hal_02885815v1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167739X19316437</els_id><sourcerecordid>S0167739X19316437</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-17fa6ef303bd8ac828b05bf9faeb2857223ef5faf0e9259960e5deac7bd4a8263</originalsourceid><addsrcrecordid>eNp9kEFLwzAUx4MoOKffwEOvHlrzkqVJL8IY6oSCFwVvIU1fZsfajiTd2Le3o-LRw-PB4_f_w_sRcg80Awr54zZzQxw8ZoxCkQHL6EJckBkoyVIJIC7JbMRkKnnxdU1uQthSSkFymBG-TOKxT4_mlEQ_hJi0pjMbbLGLSTiFiG3iej_OJrF9ux9i021uyZUzu4B3v3tOPl-eP1brtHx_fVsty9RylccUpDM5Ok55VStjFVMVFZUrnMGKKSEZ4-iEM45iwURR5BRFjcbKql4YxXI-Jw9T77fZ6b1vWuNPujeNXi9Lfb5RppRQIA4wsouJtb4PwaP7CwDVZ0l6qydJ-ixJA9OjpDH2NMVw_OPQoNfBNthZrBuPNuq6b_4v-AF_tHJW</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A two-way trust management system for fog computing</title><source>Elsevier ScienceDirect Journals</source><creator>Alemneh, Esubalew ; Senouci, Sidi-Mohammed ; Brunet, Philippe ; Tegegne, Tesfa</creator><creatorcontrib>Alemneh, Esubalew ; Senouci, Sidi-Mohammed ; Brunet, Philippe ; Tegegne, Tesfa</creatorcontrib><description>Fog computing is the next frontier of cloud computing since it can compute and store a massive amount of data generated by IoT devices near their sources. Indeed, transmitting all these data to the cloud will take up a huge amount of bandwidth. However, its features and flexibility of deployment make fog computing vulnerable to security and privacy attacks. The high-mobility support, dynamic environment, geographical distribution, location awareness, proximity to end users, and lack of redundancy are among these features that make the existing schemes not adequate to fog computing. Therefore, since trust management ensures security and privacy, we propose a two-way subjective logic-based trust management system that enables a service requester to verify whether a service provider can give reliable and secure services and lets the service provider check the trustworthiness of the service requester. Extensive evaluation of the system shows that the trust value of a node is accurate and converges in a very few trust computation cycles. The solution is also resilient to a large population of misbehaving nodes and it is able to thwart trust-based attacks successfully. Moreover, comparative analysis is made with different modification of the system and two baseline schemes, PeerTrust and EigenTrust. The comparison depicts that the two-way trust management proposals have lower overhead, allow a balanced load distribution, are effective in selecting the right service providers and are more accurate than the conventional one-way trust management systems. •Fog Computing is Vulnerable to security and privacy attacks.•Two-way trust management system ensures security and privacy.•Adaptive weighting increases trust accuracy of good fog nodes.•Behavior change of fog nodes is captured by the trust management system.•Two-way trust management outperforms one-way trust management system.</description><identifier>ISSN: 0167-739X</identifier><identifier>EISSN: 1872-7115</identifier><identifier>DOI: 10.1016/j.future.2019.12.045</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Engineering Sciences ; Fog computing ; Fog nodes ; Subjective logic ; Trust management</subject><ispartof>Future generation computer systems, 2020-05, Vol.106, p.206-220</ispartof><rights>2019 Elsevier B.V.</rights><rights>Attribution - NonCommercial</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-17fa6ef303bd8ac828b05bf9faeb2857223ef5faf0e9259960e5deac7bd4a8263</citedby><cites>FETCH-LOGICAL-c386t-17fa6ef303bd8ac828b05bf9faeb2857223ef5faf0e9259960e5deac7bd4a8263</cites><orcidid>0000-0002-7814-2231 ; 0000-0001-8525-9596</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0167739X19316437$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>230,314,776,780,881,3537,27901,27902,65306</link.rule.ids><backlink>$$Uhttps://hal.science/hal-02885815$$DView record in HAL$$Hfree_for_read</backlink></links><search><creatorcontrib>Alemneh, Esubalew</creatorcontrib><creatorcontrib>Senouci, Sidi-Mohammed</creatorcontrib><creatorcontrib>Brunet, Philippe</creatorcontrib><creatorcontrib>Tegegne, Tesfa</creatorcontrib><title>A two-way trust management system for fog computing</title><title>Future generation computer systems</title><description>Fog computing is the next frontier of cloud computing since it can compute and store a massive amount of data generated by IoT devices near their sources. Indeed, transmitting all these data to the cloud will take up a huge amount of bandwidth. However, its features and flexibility of deployment make fog computing vulnerable to security and privacy attacks. The high-mobility support, dynamic environment, geographical distribution, location awareness, proximity to end users, and lack of redundancy are among these features that make the existing schemes not adequate to fog computing. Therefore, since trust management ensures security and privacy, we propose a two-way subjective logic-based trust management system that enables a service requester to verify whether a service provider can give reliable and secure services and lets the service provider check the trustworthiness of the service requester. Extensive evaluation of the system shows that the trust value of a node is accurate and converges in a very few trust computation cycles. The solution is also resilient to a large population of misbehaving nodes and it is able to thwart trust-based attacks successfully. Moreover, comparative analysis is made with different modification of the system and two baseline schemes, PeerTrust and EigenTrust. The comparison depicts that the two-way trust management proposals have lower overhead, allow a balanced load distribution, are effective in selecting the right service providers and are more accurate than the conventional one-way trust management systems. •Fog Computing is Vulnerable to security and privacy attacks.•Two-way trust management system ensures security and privacy.•Adaptive weighting increases trust accuracy of good fog nodes.•Behavior change of fog nodes is captured by the trust management system.•Two-way trust management outperforms one-way trust management system.</description><subject>Engineering Sciences</subject><subject>Fog computing</subject><subject>Fog nodes</subject><subject>Subjective logic</subject><subject>Trust management</subject><issn>0167-739X</issn><issn>1872-7115</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLwzAUx4MoOKffwEOvHlrzkqVJL8IY6oSCFwVvIU1fZsfajiTd2Le3o-LRw-PB4_f_w_sRcg80Awr54zZzQxw8ZoxCkQHL6EJckBkoyVIJIC7JbMRkKnnxdU1uQthSSkFymBG-TOKxT4_mlEQ_hJi0pjMbbLGLSTiFiG3iej_OJrF9ux9i021uyZUzu4B3v3tOPl-eP1brtHx_fVsty9RylccUpDM5Ok55VStjFVMVFZUrnMGKKSEZ4-iEM45iwURR5BRFjcbKql4YxXI-Jw9T77fZ6b1vWuNPujeNXi9Lfb5RppRQIA4wsouJtb4PwaP7CwDVZ0l6qydJ-ixJA9OjpDH2NMVw_OPQoNfBNthZrBuPNuq6b_4v-AF_tHJW</recordid><startdate>202005</startdate><enddate>202005</enddate><creator>Alemneh, Esubalew</creator><creator>Senouci, Sidi-Mohammed</creator><creator>Brunet, Philippe</creator><creator>Tegegne, Tesfa</creator><general>Elsevier B.V</general><general>Elsevier</general><scope>AAYXX</scope><scope>CITATION</scope><scope>1XC</scope><scope>VOOES</scope><orcidid>https://orcid.org/0000-0002-7814-2231</orcidid><orcidid>https://orcid.org/0000-0001-8525-9596</orcidid></search><sort><creationdate>202005</creationdate><title>A two-way trust management system for fog computing</title><author>Alemneh, Esubalew ; Senouci, Sidi-Mohammed ; Brunet, Philippe ; Tegegne, Tesfa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-17fa6ef303bd8ac828b05bf9faeb2857223ef5faf0e9259960e5deac7bd4a8263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Engineering Sciences</topic><topic>Fog computing</topic><topic>Fog nodes</topic><topic>Subjective logic</topic><topic>Trust management</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alemneh, Esubalew</creatorcontrib><creatorcontrib>Senouci, Sidi-Mohammed</creatorcontrib><creatorcontrib>Brunet, Philippe</creatorcontrib><creatorcontrib>Tegegne, Tesfa</creatorcontrib><collection>CrossRef</collection><collection>Hyper Article en Ligne (HAL)</collection><collection>Hyper Article en Ligne (HAL) (Open Access)</collection><jtitle>Future generation computer systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alemneh, Esubalew</au><au>Senouci, Sidi-Mohammed</au><au>Brunet, Philippe</au><au>Tegegne, Tesfa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A two-way trust management system for fog computing</atitle><jtitle>Future generation computer systems</jtitle><date>2020-05</date><risdate>2020</risdate><volume>106</volume><spage>206</spage><epage>220</epage><pages>206-220</pages><issn>0167-739X</issn><eissn>1872-7115</eissn><abstract>Fog computing is the next frontier of cloud computing since it can compute and store a massive amount of data generated by IoT devices near their sources. Indeed, transmitting all these data to the cloud will take up a huge amount of bandwidth. However, its features and flexibility of deployment make fog computing vulnerable to security and privacy attacks. The high-mobility support, dynamic environment, geographical distribution, location awareness, proximity to end users, and lack of redundancy are among these features that make the existing schemes not adequate to fog computing. Therefore, since trust management ensures security and privacy, we propose a two-way subjective logic-based trust management system that enables a service requester to verify whether a service provider can give reliable and secure services and lets the service provider check the trustworthiness of the service requester. Extensive evaluation of the system shows that the trust value of a node is accurate and converges in a very few trust computation cycles. The solution is also resilient to a large population of misbehaving nodes and it is able to thwart trust-based attacks successfully. Moreover, comparative analysis is made with different modification of the system and two baseline schemes, PeerTrust and EigenTrust. The comparison depicts that the two-way trust management proposals have lower overhead, allow a balanced load distribution, are effective in selecting the right service providers and are more accurate than the conventional one-way trust management systems. •Fog Computing is Vulnerable to security and privacy attacks.•Two-way trust management system ensures security and privacy.•Adaptive weighting increases trust accuracy of good fog nodes.•Behavior change of fog nodes is captured by the trust management system.•Two-way trust management outperforms one-way trust management system.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.future.2019.12.045</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-7814-2231</orcidid><orcidid>https://orcid.org/0000-0001-8525-9596</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0167-739X
ispartof Future generation computer systems, 2020-05, Vol.106, p.206-220
issn 0167-739X
1872-7115
language eng
recordid cdi_hal_primary_oai_HAL_hal_02885815v1
source Elsevier ScienceDirect Journals
subjects Engineering Sciences
Fog computing
Fog nodes
Subjective logic
Trust management
title A two-way trust management system for fog computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T18%3A58%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_hal_p&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20two-way%20trust%20management%20system%20for%20fog%20computing&rft.jtitle=Future%20generation%20computer%20systems&rft.au=Alemneh,%20Esubalew&rft.date=2020-05&rft.volume=106&rft.spage=206&rft.epage=220&rft.pages=206-220&rft.issn=0167-739X&rft.eissn=1872-7115&rft_id=info:doi/10.1016/j.future.2019.12.045&rft_dat=%3Celsevier_hal_p%3ES0167739X19316437%3C/elsevier_hal_p%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S0167739X19316437&rfr_iscdi=true