Abstract
In the IoT (Internet of Things), data are exchanged among objects in devices and subjects through manipulating objects. In order to reduce the network traffic and satisfy the time constraints, an FC (Fog Computing) model where a fog layer is introduced between devices and subjects is considered. Here, the fog layer is composed of fog nodes. Data from objects are processed at fog nodes and processed data are sent to subjects. Even if subjects manipulate objects in accordance with the CBAC (Capability-Based Access Control) model, the subjects can get data which are not allowed to be gotten by the subjects, i.e. illegal information flow and late information flow occur. Hence, the FCOI (FC-based Operation Interruption) and FCTBOI (FC and Time-Based OI) protocols where operations occurring illegal and late types of information flows are interrupted are implemented. In the FC model, fog nodes execute tasks to process data from objects. If the tasks are sent to fog nodes with a load balancing algorithm, data may be stored at multiple fog nodes. However, multi locations of data may cause significant security issues. Hence, an SOP (Source objects-based Object Placement) algorithm is proposed in this paper. Here, fog nodes to execute tasks are selected to reduce the number of fog nodes holding objects of common device owners.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Raspberry pi 3 model b+. https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/
Raspbian, version 10.3, 13 Feb 2020. https://www.raspbian.org/
Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston (1982)
Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58(5–6), 1189–1205 (2013)
Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018)
Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013)
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001). https://doi.org/10.1007/s102070100002
Kataoka, H., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: Multi-level power consumption model and energy-aware server selection algorithm. Int. J. Grid Util. Comput. 8(3), 201–210 (2017)
Ke, W., Xraobing, Z., Tonglin, L., Dongfang, Z., Michael, L., Ioan, R.: Optimizing load balancing and data-locality with data-aware scheduling. In: 2014 IEEE International Conference on Big Data (Big Data), pp. 119–128 (2014)
Minqi, Z., Rong, Z., Wei, X., Weining, Q., Aoying, Z.: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105–112 (2010)
Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: Influential abortion probability in a flexible read-write abortion protocol. In: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications, pp. 1–8 (2016)
Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurr. Comput. Pract. Exp. 32(8), e5118 (2020)
Nakamura, S., Enokido, T., Takizawa, M.: Implementation and evaluation of the information flow control for the internet of things. Concurr. Comput. Pract. Exp. 33(19), e6311 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control based on capability token validity for secure IOT: implementation and evaluation. Internet Things 15, 100423 (2021)
Nakamura, S., Enokido, T., Takizawa, M.: Traffic reduction for information flow control in the IoT. In: Barolli, L. (ed.) BWCCA 2021. LNNS, vol. 346, pp. 67–77. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-90072-4_7
Nakamura, S., Enokido, T., Takizawa, M.: Capability token selection algorithms to implement lightweight protocols. Internet of Things 19, 100542 (2022)
Nakamura, S., Enokido, T., Takizawa, M.: Energy consumption model of a device supporting information flow control in the IOT. In: Barolli, L., Kulla, E., Ikeda, M. (eds.) Advances in Internet, Data & Web Technologies. EIDWT 2022. Lecture Notes on Data Engineering and Communications Technologies, vol. 118, pp. 142–152. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-95903-6_16
Nakamura, S., Enokido, T., Takizawa, M.: Energy consumption of the information flow control in the IoT: simulation evaluation. In: Barolli, L., Hussain, F., Enokido, T. (eds.) AINA 2022. LNNS, vol. 449, pp. 285–296. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-99584-3_25
Nakamura, S., Enokido, T., Takizawa, M.: Evaluation of the information flow control in the fog computing model. In: Barolli, L. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2022. Lecture Notes in Networks and Systems, vol. 570, pp. 78–90. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-20029-8_8
Nakamura, S., Enokido, T., Takizawa, M.: Load balancing algorithm for information flow control in fog computing model. In: Barolli, L. (eds.) Advances in Internet, Data & Web Technologies. EIDWT 2023. Lecture Notes on Data Engineering and Communications Technologies, vol. 161. Springer, Cham. (2023). https://doi.org/10.1007/978-3-031-26281-4_28
Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IOT). Internet Things 1–2, 14–26 (2018)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
Shelby, Z., Hartke, K., Bormann, C.: Constrained application protocol (CoAP). IFTF Internet-draft (2013). http://tools.ietf.org/html/draft-ietf-core-coap-18
Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IOT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015)
Willebeek-LeMair, M.H., Reeves, A.P.: Strategies for dynamic load balancing on highly parallel computers. IEEE Trans. Parallel Distrib. Syst. 4(9), 979–993 (1993)
Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005)
Acknowledgements
This work was supported by Japan Society for the Promotion of Science (JSPS) KAKENHI Grant Number JP22K12018.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nakamura, S., Enokido, T., Takizawa, M. (2023). Object Placement Algorithm with Information Flow Control in Fog Computing Model. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-28451-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-28451-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28450-2
Online ISBN: 978-3-031-28451-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)