Font Size: a A A

The Research On Secure Resource Allocation Framework In Fog Computing

Posted on:2020-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:L Y TangFull Text:PDF
GTID:2428330602458743Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Currently,fog computing has become an emerging environment that provides data storage,computing and other services.Fog computing requires seamless integration of heterogeneous computing resources that are widely distributed across edge networks to provide users with unified resources and services.However,there are many security issues in the fog computing environment due to the large number of fog devices,the fact that many fog devices are in a state of lack of supervision,and the payment process in fog computing.For example,fog computing is closer to the end user and fog devices are often exposed to the external environment without any protection.Therefore,the fog computing is very vulnerable to attacks by malicious nodes.For another example,some fog nodes may falsely claim that they have more resources than their actual capabilities,thus gaining more task processing qualifi cations,which greatly damages users and affects service quality.The current research on allocation of fog computing resources focuses on achieving the goals of reducing delay,reducing energy consumption,and improving utilization,and rarely considers security issues in the process of resource allocation.Therefore,this paper aims to build a secure resource allocation franework in the fog computing environment.The main work is as follows:(1)Aiming at the problem of information data protection and fog service audit in the process of fog computing resource allocation,a secure resource allocation framework is constructed.The idea of stable matching is used to establish the matching relationship between users' subtasks and fog service devices,and the security scheme is constructed through data encryption and service auditing to.protect the information data transmission and the reasonable legality of the fog resource allocation process.Based on the proposed security requirements,we also analyzed the framework to defend against attack of malicious nodes,attack of fog servers,and collusion attack of fog servers and computing service devices.Through experiments,the performance of the resource allocation time,service delay and security overhead are analyzed.(2)For the asymmetry of information in fog computing resource allocation,a resource allocation scheme for community-based fog computing based on reputation mechanism is constructed.The community-based reputation model is constructed using the fog server and the users' evaluation of fog service nodes.Then use the fog resource reputation as an indicator of whether the resource meets the user's security requirements,consider the user's demand for multiple types of resources of the fog node,security requirements,and the distance between user and fog node,and adopt the idea of stable matching to perform users' subtasks and resource of fog nodes.Experiments show that the scheme can effectively resist the attack of malicious nodes,collusion nodes with servers and pure collusion nodes,improve the reliability of users,access to resources,and enhance the security of fog computing resource allocation.
Keywords/Search Tags:Fog computing, Resource allocation, Security, Audit, Community, Reputation
PDF Full Text Request
Related items