Policy-driven security management for fog computing: Preliminary framework and a case study

Clinton Dsouza, Gail-Joon Ahn, Marthony Taguinod

Research output: Chapter in Book/Report/Conference proceedingConference contribution

189 Scopus citations

Abstract

With the increasing user demand for elastic provisioning of resources coupled with ubiquitous and on-demand access to data, cloud computing has been recognized as an emerging technology to meet such dynamic user demands. In addition, with the introduction and rising use of mobile devices, the Internet of Things (IoT) has recently received considerable attention since the IoT has brought physical devices and connected them to the Internet, enabling each device to share data with surrounding devices and virtualized technologies in real-time. Consequently, the exploding data usage requires a new, innovative computing platform that can provide robust real-time data analytics and resource provisioning to clients. As a result, fog computing has recently been introduced to provide computation, storage and networking services between the end-users and traditional cloud computing data centers. This paper proposes a policy-based management of resources in fog computing, expanding the current fog computing platform to support secure collaboration and interoperability between different user-requested resources in fog computing.

Original languageEnglish (US)
Title of host publicationProceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014
EditorsElisa Bertino, Bhavani Thuraisingham, Ling Liu, James Joshi
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages16-23
Number of pages8
ISBN (Electronic)9781479958801
DOIs
StatePublished - Feb 27 2014
Event15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 - San Francisco, United States
Duration: Aug 13 2014Aug 15 2014

Publication series

NameProceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014

Other

Other15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014
Country/TerritoryUnited States
CitySan Francisco
Period8/13/148/15/14

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Policy-driven security management for fog computing: Preliminary framework and a case study'. Together they form a unique fingerprint.

Cite this