Скачать книгу

individual perspective. We see why the device’s firewall is a must to defend the device from unethical hackers or viruses. We should be able to use the applications on the IoT with sufficient supervision and rules to further improve the protection of our device. We lock our doors to deter stolen robes when we leave our building, why not use a firewall to protect your computer?

      References

      1. Abbas, R., Michael, K., Michael, M.G., Using a Social-Ethical Framework to Evaluate Location-Based Services in an IoT of Things World. Int. Rev. Inf. Ethics, 22, 12, 2015.

      2. Abie, H. and Balasingham, I., Risk-based adaptive security for smart IoT in eHealth, in: Proceedings of the 7th International Conference on Body Area Networks, February, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 269–275, 2012.

      3. Agarwal, Y. and Dey, A.K., Toward Building a Safe, Secure, and Easy-to-Use IoT of Things Infrastructure. Computer, 49, 4, 88–91, 2016.

      4. Bassi, A. and Horn, G., IoT of Things in 2020 A ROADMAP FOR THE FUTURE, European Commission: Information Society and Media, 22, 97–114, 2008.

      6. Gartner, (n.d.), IoT of Things: The Gartner Perspective, Retrieved May 2, 2020, from https://www.gartner.com/en/information-technology/insights/IoT-of-things.

      7. Hunter, M.G., The use of RepGrids to gather interview data about information systems analysts. Inf. Syst. J., 7, 1, 67–81, 1997.

      8. Keeney, R.L. and McDaniels, T.L., Value-focused thinking about strategic decisions at BC Hydro. Interfaces, 22, 6, 94–109, 1992.

      9. Keeney, R.L., The value of IoT commerce to the customer. Manage. Sci., 45, 4, 533–542, 1999.

      10. Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M., Pereira, A.G., Building trust in the human? IoT of things relationship. IEEE Technol. Soc. Mag., 33, 4, 73–80, 2014.

      11. Rakic-Skokovic, M., Guidelines for Overcoming some IoT Security Issues, XVII International Scientific Conference on Industrial Systems, 1–6, 2017, Retrieved from http://www.iim.ftn.uns.ac.rs/is17.

      12. OWASP Application Security – Building and Breaking Applications, OWASP, https://owasp.org/www-community/OWASP_Application_Security_FAQ

      13. FTC. (2017). Privacy & Data Security Update, | Federal Trade Commission, 2016. Retrieved from https://www.ftc.gov/reports/privacy-data-security-update-2016.

      1 *Corresponding author: [email protected]

      3

      An Efficient Fog-Based Model for Secured Data Communication

       V. Lakshman Narayana1* and R. S. M. Lakshmi Patibandla2†

       1Department of IT, Vignan’s Nirula Institute of Technology & Science for Women. Peda Palakaluru, Guntur, Andhra Pradesh, India

       2Department of IT, Vignan’s Foundation for Science, Technology and Research, Guntur, Andhra Pradesh, India

       Abstract

      Fog Computing is an effective computing model that expands Cloud Computing administrations to the edge of the system to provide security for the data. The new features offered by Fog Computing if effectively applied for time-sensitive applications that can possibly quicken the revelation of early crisis circumstances to help smart dynamic applications. While promising, how to plan and grow certifiable fog registering based information checking frameworks is as yet an open issue. As an initial step to address this issue, in the proposed work, a fog based model for Secured data communication is developed and shows the functional relevance and centrality of such a framework. In this work, a unique Fog Based elevated level programming model for sensitive applications that are geospatially circulated, enormous scope is designed. The fog registering system gives the model to oversee IoT benefits in the fog prospect by methods for a certifiable proving position. Moreover, the system encourages the communication between the gadgets, fog gadget arrangements, IoT administration and dynamic asset provisioning in a secured way. The proposed model overcomes communication issues in IoT gadgets to build up a powerful programming condition with fog computing method in performing resource handling, validations and IoT device arrangements. The proposed Fog Computing model effectively establishes communication among IoT devices and provides security to the data during communication.

      Keywords: Secure data transmission, data empowerment, communication, security, IoT device security, resource handling

Schematic illustration of the comparison of cloud computing and fog computing.

      Figure 3.1 Cloud computing vs fog computing.

      Fog computing is also termed as fogging, but, is that the expansion or bring of cloud computing capacity along with the edge of the system and so on grant closer ICT administrations to the less clients. Along these lines, what identify Fog Computing from cloud computing is it’s more rapidly proximity to modest end-clients, its further pervasive customer attainment, and better portability [3]. As against expectant gadgets to expertise the scheme of main framework, Fog Computing grants gadgets to edge straightforwardly and permits them to affect their associations and errands any way they esteem fit. Accordingly, Fog Computing improves the character of supervision, diminishes attacks, and provides a gradually agreeable consumer practice [4].

      Fog computing simply sustains the expanding internet of things (IoT)—properties (vehicles, home machines, and even outfits) that are inserted with sensors to allow them to retrieve information [5]. Fog Computing can be actualized utilizing a fundamental association structure instead of being executed utilizing an awesome spike organizes [6]. Accordingly, it has a denser inclusion. This bit of flexibility makes it simpler to run an ongoing, large information activity with the capacity to help millions of hubs in profoundly unique, different conditions.

      3.1.1 Fog Computing Model

Скачать книгу