Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing

Fog computing is an extension of cloud computing and enables computing directly at the edge of the network. In fog computing paradigm, the fog nodes reside between smart end devices and the cloud. Benefiting from the structure of fog computing, fog computing can provide services with low latency, lo...

Full description

Bibliographic Details
Main Authors: Lei Zhang, Jiangtao Li
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8456519/
id doaj-39095611d5f3406a81f67008b74da178
record_format Article
spelling doaj-39095611d5f3406a81f67008b74da1782021-03-29T21:16:53ZengIEEEIEEE Access2169-35362018-01-016503845039310.1109/ACCESS.2018.28689208456519Enabling Robust and Privacy-Preserving Resource Allocation in Fog ComputingLei Zhang0https://orcid.org/0000-0001-8786-4562Jiangtao Li1Shanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, ChinaShanghai Key Laboratory of Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Shanghai, ChinaFog computing is an extension of cloud computing and enables computing directly at the edge of the network. In fog computing paradigm, the fog nodes reside between smart end devices and the cloud. Benefiting from the structure of fog computing, fog computing can provide services with low latency, location awareness, and mobility. Since the fog nodes are not as powerful as the cloud, resource allocation techniques are usually adapted to optimize the utilization of the resources of fog nodes. However, the current resource allocation techniques are not privacy-preserving, i.e., an attacker can easily find end devices' sensitive information. In this paper, we propose a privacy-preserving resource allocation scheme for fog computing. The new proposal has constant message expansion, and it is secure against both an eavesdropper and a smart gateway that is employed to perform the resource allocation algorithm. Our scheme is also robust, since it achieves a full key compromise resistance which guarantees that even if the private keys of all the fog nodes in a fog system are corrupted the scheme remains secure.https://ieeexplore.ieee.org/document/8456519/Fog computingresource allocationuser privacyInternet of Things
collection DOAJ
language English
format Article
sources DOAJ
author Lei Zhang
Jiangtao Li
spellingShingle Lei Zhang
Jiangtao Li
Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
IEEE Access
Fog computing
resource allocation
user privacy
Internet of Things
author_facet Lei Zhang
Jiangtao Li
author_sort Lei Zhang
title Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
title_short Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
title_full Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
title_fullStr Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
title_full_unstemmed Enabling Robust and Privacy-Preserving Resource Allocation in Fog Computing
title_sort enabling robust and privacy-preserving resource allocation in fog computing
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Fog computing is an extension of cloud computing and enables computing directly at the edge of the network. In fog computing paradigm, the fog nodes reside between smart end devices and the cloud. Benefiting from the structure of fog computing, fog computing can provide services with low latency, location awareness, and mobility. Since the fog nodes are not as powerful as the cloud, resource allocation techniques are usually adapted to optimize the utilization of the resources of fog nodes. However, the current resource allocation techniques are not privacy-preserving, i.e., an attacker can easily find end devices' sensitive information. In this paper, we propose a privacy-preserving resource allocation scheme for fog computing. The new proposal has constant message expansion, and it is secure against both an eavesdropper and a smart gateway that is employed to perform the resource allocation algorithm. Our scheme is also robust, since it achieves a full key compromise resistance which guarantees that even if the private keys of all the fog nodes in a fog system are corrupted the scheme remains secure.
topic Fog computing
resource allocation
user privacy
Internet of Things
url https://ieeexplore.ieee.org/document/8456519/
work_keys_str_mv AT leizhang enablingrobustandprivacypreservingresourceallocationinfogcomputing
AT jiangtaoli enablingrobustandprivacypreservingresourceallocationinfogcomputing
_version_ 1724193179995996160