2022
DOI: 10.32604/cmc.2022.019802
|View full text |Cite
|
Sign up to set email alerts
|

Building a Trust Model for Secure Data Sharing (TM-SDS) in Edge Computing Using HMAC Techniques

Abstract: With the rapid growth of Internet of Things (IoT) based models, and the lack amount of data makes cloud computing resources insufficient. Hence, edge computing-based techniques are becoming more popular in present research domains that makes data storage, and processing effective at the network edges. There are several advanced features like parallel processing and data perception are available in edge computing. Still, there are some challenges in providing privacy and data security over networks. To solve th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 32 publications
(33 reference statements)
0
4
0
Order By: Relevance
“…The previous work discussed DCS technological environment followed by DCS environment-related threats and attacks [4]. This paper extends the last research work by further examining the risk management methodology by incorporating two additional components, namely, trust and reputation, where trust refers to the degree of confidence in the form of probability by which one entity will assume, or expect, the behavior of another entity [5][6][7], and reputation refers to a form of indirect trust where one entity relies on surrounding entities' observation and opinion about the target entity's behavior and reliability within a specified timeframe [8].…”
Section: Introductionmentioning
confidence: 79%
“…The previous work discussed DCS technological environment followed by DCS environment-related threats and attacks [4]. This paper extends the last research work by further examining the risk management methodology by incorporating two additional components, namely, trust and reputation, where trust refers to the degree of confidence in the form of probability by which one entity will assume, or expect, the behavior of another entity [5][6][7], and reputation refers to a form of indirect trust where one entity relies on surrounding entities' observation and opinion about the target entity's behavior and reliability within a specified timeframe [8].…”
Section: Introductionmentioning
confidence: 79%
“…Data security is achieved at both the local and global levels in this proposed work using a centralized cloud server and a distributed edge network system. This model achieved a packet delivery ratio of 84.25% 16 …”
Section: Literature Surveymentioning
confidence: 95%
“…This model achieved a packet delivery ratio of 84.25%. 16 Rehmat Ullah et al proposed an open-source framework that integrates Edge Cloud Computing (and Named Data Networking (NDN) via an N-Tier architecture with six Cloud Tier layers and seven Edge Tier layers. NDN was combined with ECC in this paper to achieve a fast communication connection speed.…”
Section: Encryption-based Techniquesmentioning
confidence: 99%
“…Ensuring these aspects of integrity is crucial to maintaining the overall reliability and trustworthiness of these systems. Various approaches were proposed to preserve the integrity of data and codes in IoT networks including cryptographic approaches such as HMACHash-Based Message Authentication Code [52] and digital signatures [53]. A remote software attestation scheme that enhances integrity in IoT environments through SDN was introduced in [54].…”
Section: Security Requirements Researchmentioning
confidence: 99%