2019 3rd Cyber Security in Networking Conference (CSNet) 2019
DOI: 10.1109/csnet47905.2019.9108975
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(10 citation statements)
references
References 25 publications
2
8
0
Order By: Relevance
“…• Reputations of fog nodes are used either to distribute incentives and to penalize them for bad behaviour Yu et al [47] • To identify and analyze storage and computing requirements Cinque et al [56] • Instead of using reputation scores, fog nodes assign trust degrees to other nodes Alshehri et al [46] Security…”
Section: Author Purpose Synopsismentioning
confidence: 99%
See 1 more Smart Citation
“…• Reputations of fog nodes are used either to distribute incentives and to penalize them for bad behaviour Yu et al [47] • To identify and analyze storage and computing requirements Cinque et al [56] • Instead of using reputation scores, fog nodes assign trust degrees to other nodes Alshehri et al [46] Security…”
Section: Author Purpose Synopsismentioning
confidence: 99%
“…6) Alshehri et al [46] resist the fog nodes from infringement data security. They have maintained on-chain policies to control access to the data.…”
Section: Author Purpose Synopsismentioning
confidence: 99%
“…Authors have provided some recommendations that can help in addressing, at least partially, the issue of trust in the Fog environment such as using blockchain technology to maintain the log files, which has the records of events and messages exchanging in Fog nodes in a distributed way. 84,[106][107][108][109][110][111] So, if a Fog node misbehaves, other trusted nodes can discover that. In other words, using Blockchain can enable a trustworthy IoT-Fog-Cloud architecture.…”
Section: Trust Managementmentioning
confidence: 99%
“…The project aims to help users extend their infrastructures, and easily get access to private computational resources using FC through simple GUI. Authors of [62] suggested adding the BC to their previously-proposed approach in [73], for protecting fog-enabled systems from malicious nodes. BC was deployed in this approach for delivering two services: data management and data access control.…”
Section: F Other Fc-bc Applicationsmentioning
confidence: 99%