Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Integration of Fog Computing with Internet of Things (IoT): Blockchain Perspectives  
  Authors : Srishti Garg; P. K. Chaurasia
  Cite as:

 

The predominantly global stationing and utilization of technologically advanced and interactive electronic devices such as the tablets, phablets, smart phones, refrigerators, sensors, speakers, etc. These are mainly interrelated channelization of various applications for the Internet of Things (IoT) devices are reckoned to outstretch a large indefinite amount, from last two decades. The biggest challenge is the management of such amounts of data, which seems to be unable to be coped up with the user of traditional IoT and cloud-based architectures. A solution to this is the decentralization of applications using a computed distributed model. The infrastructure generating big data or a fog-based architecture which extends the Cloud Computing paradigm is defined to fully support the IoT methodology. Fog computing or "Fogging" works with the aim to enhance the processing, intelligence, and accumulation of data gradually closer and streamlined to the Edge of a network. This facilitates to provide computer-related services more efficiently much closer to the inter-operated smart things that form a major part of the IoT in a distributed computed environment. The objective of this paper is to understand the topical impediments which arise in the critical infrastructure of the organization's technology systems. Further, after introduction of the infrastructure, the challenges in securing and maintaining the big data privacy and trust concerns in relation to fog-enabled IoT is presented. A blockchain-based technology is deployed to address the security related issues in IoT and fog computing. Thereafter, Blockchain is integrated with IoT applications. The work, therefore, formalizes task of securing data in the current scenario, the prevalent threats for practitioners and the recommendations for promising research investigation in the future.

 

Published In : IJCSN Journal Volume 9, Issue 5

Date of Publication : October 2020

Pages : 240-251

Figures :05

Tables : --

 

Srishti Garg : is pursuing M.Tech. (Software Engineering) with Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh in the Department of Information Technology. She received her Bachelor Degree in Computer Science and Engineering from Uttar Pradesh Technical University, Lucknow, Uttar Pradesh, India in 2014. Her research areas include Cloud Computing, Machine Translation, Natural Language Processing and Machine Learning.

Pawan Kumar Chaurasia : is working as an Associate Professor and Head with Mahatma Gandhi Central University, Motihari, Bihar in the Department of Computer Science and Information Technology. He was working as an Assistant Professor in the Department of Information Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Lucknow, India prior to this. He has published more than 30 International Journal papers, prsented more than 20 research papers and delivered more than 10 lectures. His research area includes Software Reliability, Software Quality, Software Testing, Machine Learning and IoT.

 

Blockchain, Big Data, Cloud Computing, Fog Computing, Internet of Things (IoT), Security

The irresistible and captivating environment of Fog computing will culminate in the unfolding of advanced big business representations, henceforth assisting the organizations to flourish supplementary methodically and rapidly. As a consequence of which new marketers and industries will approach imminently with fresh benefactions and new architectural viewpoints to networking. One exhilarated phenomenon of evolution and progressions is Fog-as-a-Service (FaaS) [50] where a Fog service contributor establishes unified and coordinated fog nodes to shield a territorial area of service. This, sequentially, will be helpful in imparting extended and favourable opportunities for actualizing contemporary and advanced breakthrough applications and resources that the ongoing host-based and Cloud-based manifesto are unable to develop comfortably and efficiently. This can be illustrated by the attribute evidenced that the Fog-based security services is capable to detail many challenges and other facets that are lately being confronted in the IoT environment [51, 52].

 

[1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):2013, 1645-1660. [2] Chang, S.N. Srirama, and R. Buyya. Mobile cloud business process management system for the Internet of Things: A survey. ACM Computing Surveys, 49(4): 70:1-70:42, December 2016. [3] Afshan Zameer, Pawan Kumar Chaurasia, (2018): "A Review on Crypto-Currency", International Journal of Computer Science and Mobile Applications, ISSN (online): 2321-8363 Vol.6, Issue. 1, January- 2018, pg. 95-100. [4] M. Chiang and T. Zhang, Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6):2016, 854?864. [5] H.P. Sajjad, K. Danniswara, A. Al-Shishtawy and V. Vlassov. Span Edge: Towards unifying stream processing over central and near-the-edge datacenters. In Proceedings of the IEEE/ACM Symposium on Edge Computing (SEC, IEEE, 2016.), pp. 168-178. [6] M. Satyanarayanan, P. Bahl, R. Caceres and N. Davies. The Case forVM-Based Cloudlets in Mobile Computing, IEEE Pervasive Computing, 8(4): 14-23, 2009. [7] Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, 2015, vol. 17, no. 4, pp. 2347-2376. [8] Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and internet of things: a survey," Future Generation Computer Systems, 2016, vol. 56, pp. 684-700. [9] C. W. Tsai, C.-F. Lai, M.-C. Chiang, L. T. Yang et al., "Data mining for internet of things: A survey." IEEE Communications Surveys and Tutorials, 2014, vol. 16, no. 1, pp. 77-97. [10] J. Ni, Y. Yu, Y. Mu, and Q. Xia, "On the security of an efficient dynamic auditing protocol in cloud storage," IEEE Transactions on Parallel and Distributed Systems, 2014, vol. 25, no. 10, pp.2760-2761. [11] F. Jalali, K. Hinton, R. Ayre, T. Alpcan, and R. S. Tucker, "Fog computing may help to save energy in cloud computing," IEEE Journal on Selected Areas in Communications, 2016, Vol. 34, No. 5, pp. 1728-1739. [12] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proc. of MCC, 2012, pp. 13-16. [13] Fog computing: Fog and Cloud along the Cloud-to-Thing continuumwww.i-scoop.eu. [14] Fog Computing: A New IoT Architecture? RTInsightswww.rtinsights.com. [15] P. Sharma and Pawan K. Chaurasia, "Proposed Algorithm for Secured Transaction using 3-Tier Architecture", International Journal of Computer Sciences and Engineering, Vol. 6, No. 6, pp. 316-321, 2018. Available: 10.26438/ijcse/v6i6.316321. [16] P. Hu, H. Ning, T. Qiu, Y. Zhang, and X. Luo, "Fog computing based face identification and resolution scheme in internet of things," IEEE transactions on industrial informatics,2017, Vol. 13, no. 4, pp. 1910-1920. [17] P. Garcia Lopez, A. Montresor, D. Epema, A. Datta, T. Higashino, A. Iamnitchi, M. Barcellos,P. Felber, and E. Riviere, "Edge-centric computing: Vision and challenges," ACM SIGCOMM Computer Communication Review,2015, vol. 45, no. 5, pp. 37-42. [18] S. Singh, N. Yadav and Pawan K. Chaurasia, "A Review on Cyber Physical System Attacks: Issues and Challenges," 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2020, pp. 1133-1138, doi: 10.1109/ICCSP48568.2020.9182452. [19] M. Chiang and T. Zhang, "Fog and IoT: An overview of research opportunities," IEEE Internet of Things Journal, vol. 3, no. 6, pp. 854-864, 2016. [20] M. Tao, K. Ota, and M. Dong, "Foud: integrating fog and cloud for 5g-enabled v2g networks," IEEE Network, vol. 31, no. 2, pp. 8-13, 2017. [21] J. Ni, K. Zhang, X. Lin, Y. Yu, and X. Shen, "Cloud-based privacy-preserving parking navigation through vehicular communications," in Proc. of Securecomm, 2016, pp. 85-103. [22] J. Ni, A. Zhang, X. Lin, and X. Shen, "Security, privacy, and fairness in fog-based vehicular crowd sensing," IEEE Communications Magazine, 2017, Vol. 55, no. 6, pp. 146-152. [23] J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, and X. Shen, "Differentially private smart metering with fault tolerance and range-based filtering," IEEE Transactions on Smart Grid,2017, Vol. 8, no. 5, pp. 2483-2493. [24] J. Ni, K. Zhang, X. Lin, and X. Shen, "Securing fog computing for internet of things applications: Challenges and solutions," IEEE Communications Surveys & Tutorials, 2017, vol. 20, no. 1, pp. 601-628. [25] Cearley DW (2010) Cloud computing: key initiative overview. Gartner Report, 2010 [26] Mahmood Z (2011) In: Mahmood Z, Hill R (eds) Cloud computing for enterprise architectures. Springer, Berlin. [27] Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing, MCC' 12, ACM, 2012, pp 13-16. [28] Cisco (2013) Fog computing, ecosystem, architecture and applications. Cisco Report RFP-2013-078. [29] Greenfield D (2016) Fog computing vs. edge computing: what's the difference? https://www.automationworld.com/Fog-computing-vs-edge-computing-whats-difference. [30] OPTO-22 (2018) Fog computing vs. edge computing. http://info.opto22.com/Fog-vs-edgecomputing. [31] Shariffdeen R (2017) Fog computing vs. edge computing. https://medium.com/@rshariffdeen/edge-computing-vs-Fog-computing-5b23d6bb049d. [32] Shah H (2017) Edge computing and fog computing for enterprise IoT. https://www.simform.com/iot-edge-Fog-computing/. [33] Open Fog (2017) Open Fog reference architecture for fog computing.Fogconsortium.org/wpcontent/uploads/OpenFog_Reference_Architecture_2_09_17-FINAL-1. [34] McKendrick J (2016) Fog computing: a new IoT architecture? https://www.rtinsights.com/ what-is-Fog-computing-open-consortium/. [35] Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, 2015, vol. 17, no. 4, pp. 2347-2376. [36] Botta, W. De Donato, V. Persico, and A. Pescapé, "Integration of cloud computing and internet of things: a survey," Future Generation Computer Systems, 2016, vol. 56, pp. 684-700. [37] C.-W. Tsai, C.-F. Lai, M.-C. Chiang, L. T. Yang et al., "Data mining for internet of things: A survey." IEEE Communications Surveys and Tutorials, 2014, vol. 16, no. 1, pp. 77-97. [38] J. Ni, Y. Yu, Y. Mu, and Q. Xia, "On the security of an efficient dynamic auditing protocol in cloud storage," IEEE Transactions on Parallel and Distributed Systems, 2014, vol. 25, no. 10, pp.2760-2761. [39] F. Jalali, K. Hinton, R. Ayre, T. Alpcan, and R. S. Tucker, "Fog computing may help to save energy in cloud computing," IEEE Journal on Selected Areas in Communications,2016, vol. 34, no. 5, pp. 1728-1739. [40] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proc. of MCC, 2012, pp. 13-16. [41] Schubert L, Jeffery K (2012) Advances in clouds expert group report public version 1.0 research in future cloud computing. In: Schubert L, Jeffery K, Research in future cloud computing. [42] Ukil A, Jana D, De Sarkar A (2013) A security framework in cloud computing infrastructure. Int. J Netw Secur Appl (IJNSA) 5(5). https://doi.org/10.5121/ijnsa.2013.550211. [43] Stanton B, Theofanos M, Joshi KP (2015) Framework for cloud usability NIST special publication 500-316. http://dx.doi.org/10.6028/NIST.SP.500-316. Accessed 3 May 2017. [44] Yi S, Li C, Li Q (2012) A survey of fog computing: concepts, applications andissues.http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.702.7773&rep=rep1&type=pdf. Accessed 26 Oct 2017 of life in the Grid. Sci. Program 13(4):265-275. [45] Nurmi D, Wolski R et al (2009) the eucalyptus open-source cloud-computing system. In: Proceeding of 9th IEEE/ACM international symposium on cluster computing and the grid. [46] Barham P, Dragovic B, Hand SK, Harris T, Ho A, Neugebauery R et al (2003) Xen and art of virtualisation. http://www.cl.cam.ac.uk/research/srg/netos/papers/2003-xensosp.pdf. Accessed 26 Oct 2017. [47] Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44(5):27. [48] Pahl, N. El Ioini, and S. Helmer. A decision framework for blockchain platforms for IoT and edge computing. International Conference on Internet of Things, Big Data and Security, 2018. [49] Dorri, S. Salil Kanhere, and R. Jurdak. Towards an Optimized BlockChain for IoT, Intl Conf on IoT Design and Implementation, 2017. [50] N. Kshetri. Can Blockchain Strengthen the Internet of Things? IT Professional, 2017, 19(4): 68-72. [51] Kitanov S, Janevski T (2016) State of the art: fog computing for 5G networks, 24th telecommunications forum TELFOR, 2016. [52] Vaquero LM, Rodero-Merino L, Gradiant Vigo L (2014) Finding your way in the fog: towards a comprehensive definition of fog computing. ACM SIGCOMM Comput Commun Rev 44:27-32. [53] Ai Y, Peng M, Zhang K (2017) Edge computing technologies for internet of things: a primer. Digit Commun Netw OpenFog Consortium Architecture Working Group (2017) OpenFog reference architecture for fog computing. [54] Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile Cloud computing-MCC '12, 2014, P.13. ACM Press, New York, NY, USA. [55] Banafa A What is fog computing?https://www.ibm.com/blogs/Cloud-computing/2014/08/fog-computing/. [56] Dastjerdi AV, Buyya R (2016) Fog Computing: helping the internet of things realize it's potential. Computer 49(8):112-116. [57] Luan TH, Gao L, Li Z, Xiang Y, Sun L, 2015, Fog Computing: focusing on mobile users at the edge. CoRR, vol. abs/1502.01815. [58] Stojmenovic I, Wen S (2014) The Fog Computing paradigm: scenarios and security issues. In: 2014 federated conference on FedCSIS. IEEE. [59] Shahid MA, Sharif M, 2015, Cloud computing security models, architectures, issues and challenges: a survey. Smart Comput Rev 5:602-616.