๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Fog/Edge Computing For Security, Privacy, And Applications

โœ Scribed by Wei Chang, Jie Wu


Publisher
Springer
Year
2021
Tongue
English
Leaves
417
Series
Advances In Information Security
Edition
1st Edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

โœฆ Table of Contents


Preface......Page 6
Contents......Page 10
Part I Overview of Fog/Edge Computing......Page 12
1 Introduction......Page 13
2 4G and LTE......Page 14
3 5G Network......Page 15
4 Fog Computing on 5G Networks......Page 17
5 Fog Computing in 5G Networks: An Application Perspective......Page 18
5.1 Physical Network Architecture......Page 19
5.2 Application Architecture......Page 21
6 Latency Critical Application: Mobile Gaming......Page 22
7 5G Gaming......Page 24
8.1 Data Analytics......Page 25
9 5G and Satellites......Page 26
10 An Introduction to Telecom Network Security......Page 27
11 Understanding Security in the Era of 5G......Page 28
13 5G Security and New Network Architectures......Page 30
14 Security Concerns for Cloud-Based Services......Page 31
14.2 Security Concern: Insufficient Identity, Credential and Access Management......Page 32
14.3 Security Concern: Insecure Interfaces and APIs......Page 33
14.5 Security Concern: Account Hijacking......Page 34
14.8 Security Concern: Data Loss......Page 35
14.10 Security Concern: Abuse and Nefarious Use of Cloud Services......Page 36
14.12 Security Concern: Shared Technology Vulnerabilities......Page 37
17 Virtual Reality Mobile Application with 5G......Page 38
18 Security of 5G-V2X......Page 39
References......Page 40
1 Introduction......Page 43
2 Edge Computing Concepts......Page 45
3 Evolution Edge Computing......Page 47
4 Edge Computing and Internet of Things (IoT)......Page 49
5 Edge Computing Applications......Page 51
6 Discussion......Page 54
7 Benefits and Challenges of Edge Computing......Page 57
8 Conclusions......Page 59
References......Page 60
Part II Security in Fog/Edge Computing......Page 63
1 Introduction......Page 64
2.1 Fine-Grained Access Control on Encrypted Data......Page 65
2.2 User Revocation......Page 67
2.3 Searchable Encryption......Page 68
3.1 System Model......Page 69
3.2 Threat Model......Page 70
4.1 Definitions and Assumptions......Page 71
5 Secure Storage Services......Page 72
5.1 Hierarchical Attribute-Based Encryption......Page 74
5.2 Overview of TimePRE......Page 76
5.3 Construction of TimePRE......Page 80
6 Secure Search Services......Page 85
6.1 Preliminaries......Page 86
6.2 Scheme Definition......Page 87
6.3 Policy Updating......Page 89
6.4 Construction......Page 91
6.5 Correctness Proof......Page 93
6.7 Performance Analysis......Page 94
7 Security in Fog/Edge Computing......Page 95
References......Page 96
1 Background......Page 101
2.1 Significance......Page 102
2.2 Resource, Scalability and Algorithms Requirements......Page 104
2.3 Challenges and Limitations of the State-of-the-Art IDS for Fog-to-Things Computing......Page 105
2.4 Leveraging Fog Nodes for IDS......Page 106
2.5 Fog Computing IDS Architecture......Page 107
3.1 The Emergence of Deep Learning for Cyber Defense......Page 110
3.2 The Need for Autonomous Cyber Defense......Page 111
3.3 The Application of Federated Learning-Based Intrusion Detection in Fog Computing......Page 114
4.1 Architecture......Page 115
4.2 Algorithms......Page 116
4.3 Evaluation and Discussions......Page 117
5 Conclusion and Further Research......Page 123
References......Page 124
1 Introduction......Page 128
2.1 Fog/Edge Computing......Page 130
2.2 Blockchain and BFT......Page 131
3 Fog/Edge Computing Meets Blockchain......Page 132
4 The Scope of Byzantine-Resilient Data Management Approaches......Page 133
4.1.2 Problem Definition......Page 134
4.1.4 Byzantine Agreement......Page 135
4.1.6 Feasibility Discussion and Limitations......Page 137
4.2.2 Problem Definition......Page 138
4.2.4 Blocks, Transactions, and the (Block) Chain......Page 139
4.2.5 Leader Election......Page 140
4.2.6 Current State of the Art Solutions......Page 141
4.3.2 Problem Definition......Page 142
4.3.3 Desired Safety and Liveness Properties......Page 143
4.3.4 Current Solutions......Page 144
5 Findings and Concluding Remarks......Page 145
References......Page 147
Part III Privacy in Fog/Edge Computing......Page 151
1 Introduction......Page 152
2.1 Overview......Page 154
2.2 Data Privacy......Page 155
2.2.2 Pseudo-Random Permutation Based Method for Mobile Edge Computing......Page 156
2.3 Location Privacy......Page 157
2.3.2 Mobile Device-Based Schemes......Page 158
2.4 Identity Privacy......Page 159
3.1 Overview......Page 160
3.2.1 Definition......Page 162
3.2.2 Implementation......Page 163
3.2.3 Properties......Page 164
3.3.1 Preserving Privacy in Machine Learning......Page 165
3.3.2 Preserving Privacy in Big Data......Page 168
3.3.3 Other Topics......Page 170
5 Summary......Page 171
References......Page 172
1 Introduction......Page 175
2.1 Edge Video Analytics......Page 177
2.2 Privacy-Preserving Video Analytics......Page 178
3.1 Federated Optimization......Page 180
3.2 Federated Averaging......Page 181
4 FedEVA Framework Overview......Page 182
5.1.1 Algorithm 1: Helper Algorithm......Page 184
5.2 Analysis on Privacy Preservation......Page 185
6 Performance Evaluation......Page 187
6.1 Experiment Settings......Page 188
6.2.1 IID Case......Page 189
6.2.2 Non-IID Case......Page 191
References......Page 192
Part IV Architectural Design in Fog/Edge Computing......Page 195
1 Introduction......Page 196
2 Computational Cloudization......Page 198
3.1 Hardware/Middleware Infrastructure......Page 201
3.3 FEC Services......Page 203
4 Vulnerabilities in Hierarchical FEC Reference Architecture......Page 204
4.1 Reference Architecture......Page 205
4.2 Adversary Models......Page 206
4.2.2 Denial of Service (DoS)......Page 207
4.3 Security Recommendations......Page 208
5 Vulnerabilities in FEC Virtualization......Page 209
6 Vulnerabilities of FEC Integration into the 5G Network......Page 211
References......Page 213
1 Introduction......Page 216
2 Related Works......Page 217
3 Collaborative Trusted Edge/Fog Computing......Page 219
3.1 Fog Nodes Information Encryption......Page 220
3.2 Trusted Service Request Generation......Page 221
3.4 Trusted Evidence Aggregation......Page 222
4.1 Basic Idea of Edge Defense Mechanism with Content Semantic Awareness......Page 223
4.2 Architecture of Smart Reasoning Based Content Threat Fog-Defense......Page 224
4.3 Smart Semantic Reasoning for Defense Knowledge Policy......Page 226
5.1 Basic Idea of Proposed Edge Unified Big Data Intelligent Storage Architecture......Page 227
5.2 Machine Learning Based Dynamic Data Storage Strategy......Page 228
5.3 Dynamic Storage Model......Page 229
6.1 Basic Idea......Page 230
6.2 Service Popularity Model......Page 231
6.3 Computing Cost......Page 232
7.1 Main Contributions......Page 233
8 Conclusion......Page 235
References......Page 236
1 Introduction......Page 238
2 Related Work......Page 240
3.1 Security Network Functions and Their Virtualization......Page 242
4.1 System Model......Page 243
4.2 NFV-Enabled Multicast Requests with Service Function Chain Requirements......Page 244
4.3 Admission Costs of an NFV-Enabled Multicast Request......Page 246
4.4 Problem Definitions......Page 247
5.1 Algorithm Overview......Page 248
5.2 Approximation Algorithm......Page 249
5.3 Algorithm Analysis......Page 250
6 An Approximation Algorithm for the Cost Minimization Problem......Page 252
6.2 Approximation Algorithm......Page 253
6.3 Algorithm Analysis......Page 255
7.1 The Usage Cost Model of Resources......Page 258
7.2 Algorithm Analysis......Page 260
8.1 Experiment Settings......Page 266
8.2 Performance Evaluation of Approximation Algorithm for the Cost Minimization Problem with Consolidated VNFs......Page 267
8.3 Performance Evaluation of Algorithms for the Cost Minimization Problem......Page 269
9 Conclusion and Future Research Directions......Page 270
References......Page 271
1 Introduction......Page 274
2.1 Limitations of Cloud Computing......Page 275
2.2 Distinct Features of Fog Computing......Page 276
3 Fog Computing Use Cases and Their Security Requirements......Page 278
4 Generic Security Requirements for Fog Applications......Page 280
5 A Blockchain Primer......Page 282
5.1 Distributed Ledger......Page 283
5.3 Consensus Protocols......Page 284
5.4 Smart-Contracts......Page 285
6.1 Blockchain Based Authentication......Page 286
6.3 Blockchain Based Availability......Page 287
6.4 Blockchain Based Privacy......Page 288
7 A Performance Analysis of Blockchain and Fog Computing Integration......Page 289
8 Conclusion......Page 290
References......Page 291
Part V Applications of Fog/Edge Computing......Page 294
1 Introduction......Page 295
2 Relevant Computing Paradigms and Requirements......Page 298
3.1.1 System Architecture......Page 301
3.1.2 Active Maintenance Case Study......Page 302
3.1.3 Tests Performed......Page 303
3.2 Supply Chain Management......Page 304
3.3 Food Industry......Page 305
3.4 Distributed Synchronization Services......Page 306
3.5 Healthcare......Page 308
3.6 Agriculture......Page 309
4.1 Smart Grids......Page 310
4.2 Satellite Communication......Page 313
4.3 Manufacturing Process Monitoring......Page 316
5.1 Programmability and Task Partitioning......Page 317
5.2 Security and Privacy......Page 318
5.3 Blockchain for IIoT......Page 319
5.4 Virtualization......Page 321
5.5 Resource Allocation......Page 322
5.6 System Metrics......Page 323
References......Page 324
1 Introduction......Page 328
2 Background of AR Systems......Page 329
3 Security Risks of AR......Page 331
3.1.2 Data Collection......Page 332
3.3 Output Phase Attacks......Page 334
4 AR Security at the Edge......Page 336
4.2 Quality of Augmentation at the Edge......Page 337
4.2.1 Metrics for QoA......Page 338
4.2.2 Trade-Offs for QoA......Page 339
4.3.1 Calculating Service Latency......Page 340
4.3.2 Trade-Offs to Manage Latency......Page 341
4.4.1 Input Phase Defenses......Page 342
4.4.2 Transformation Phase Defenses......Page 344
4.4.3 Output Phase Defenses......Page 345
5 Analysis and Discussion......Page 346
5.1 Experimental Results Comparing Local and Remote Processing......Page 347
5.2 Impacts of Security Measures on QoA......Page 349
5.3 Open Problems......Page 350
References......Page 351
1 Introduction......Page 355
2.1 Data Stream Processing: Basic Concepts and Challenges......Page 357
2.2 Placement of DSP Applications in the Fog......Page 360
2.3 Security and Privacy in DSP......Page 362
3 Modeling Security-Related Requirements......Page 364
3.2 Requirements Forest......Page 365
4 DSP Application Placement Modeling......Page 367
4.1 System Model......Page 368
4.1.2 Computing Infrastructure Model......Page 369
4.2 DSP Placement Model......Page 370
4.3 QoS and Cost Metrics......Page 371
4.3.2 Security Requirements......Page 372
4.3.3 Deployment Cost......Page 374
5 Security-Aware DSP Placement Problem Formulation......Page 375
5.1 Problem Formulation......Page 376
5.2 Example......Page 377
6 Discussion......Page 381
References......Page 382
1 Introduction......Page 386
2.1 Blockchain......Page 388
2.1.1 Structure of a Block......Page 389
2.2 System Model......Page 390
3.1 Expiration Time Ordering Graph......Page 391
3.2 Structure of LiTiChain......Page 392
3.3 Retention Cost......Page 393
3.4 Limiting AoG Edges and Blockheight......Page 394
4 -LiTiChain......Page 395
4.1 s-LiTiChain......Page 397
4.2 p-LiTiChain......Page 398
4.3 Algorithms......Page 400
5.1 Performance Metrics......Page 402
5.3 Simulation Results......Page 403
5.3.1 LiTiChain......Page 404
5.3.2 -LiTiChain......Page 407
6 Conclusion......Page 415
References......Page 416

โœฆ Subjects


Mobile And Network Security


๐Ÿ“œ SIMILAR VOLUMES


Fog/Edge Computing For Security, Privacy
โœ Wei Chang (editor), Jie Wu (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<div><div>This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The fir

Security and Privacy for Big Data, Cloud
โœ Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› The Institution of Engineering and Technology ๐ŸŒ English

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privac

Computational Intelligence for Privacy a
โœ David A. Elizondo, Agusti Solanas (auth.), David A. Elizondo, Agusti Solanas, An ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Springer-Verlag Berlin Heidelberg ๐ŸŒ English

<p><p>The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural

Privacy and Security for Cloud Computing
โœ Siani Pearson (auth.), Siani Pearson, George Yee (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p>This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics a

Secure Edge Computing for IoT: Master Se
โœ Oluyemi James Odeyinka ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Orange Education Pvt Ltd, AVAโ„ข ๐ŸŒ English

Securing the Future of IoT with Advanced Edge Computing Solutions Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. Fro

Secure Edge Computing for IoT: Master Se
โœ Oluyemi James Odeyinka ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Orange Education Pvt Ltd, AVAโ„ข ๐ŸŒ English

Securing the Future of IoT with Advanced Edge Computing Solutions Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. Fro