IEEE Access (Jan 2017)

Fog Computing Over IoT: A Secure Deployment and Formal Verification

  • Samman Zahra,
  • Masoom Alam,
  • Qaisar Javaid,
  • Abdul Wahid,
  • Nadeem Javaid,
  • Saif Ur Rehman Malik,
  • Muhammad Khurram Khan

DOI
https://doi.org/10.1109/ACCESS.2017.2766180
Journal volume & issue
Vol. 5
pp. 27132 – 27144

Abstract

Read online

Fog computing, being an extension to cloud computing has addressed some issues found in cloud computing by providing additional features, such as location awareness, low latency, mobility support, and so on. Its unique features have also opened a way toward security challenges, which need to be focused for making it bug-free for the users. This paper is basically focusing on overcoming the security issues encountered during the data outsourcing from fog client to fog node. We have added Shibboleth also known as security and cross domain access control protocol between fog client and fog node for improved and secure communication between the fog client and fog node. Furthermore to prove whether Shibboleth meets the security requirement needed to provide the secure outsourcing. We have also formally verified the protocol against basic security properties using high level Petri net.

Keywords