{"title":"物联网设备雾计算网络中的安全跟踪方法","authors":"A. Alamer, Sultan Basudan, P. Hung","doi":"10.1145/3415958.3433074","DOIUrl":null,"url":null,"abstract":"This paper proposes a Secure and Privacy-preserving Tracing (SPT) mechanism in the Fog Computing (FC) network. The proposed SPT mechanism employs a Counting Bloom Filter (CBF) method as a tree framework (CBF-tree) to model a secure tracing system in the FC network. With the proposed SPT mechanism, the fog node can trace a particular Internet of Things (IoT) device in a secure manner, which means that the fog node can trace IoT devices in order to provide them with their requested services without revealing their private data such as the device's identities or locations. Analysis shows that the SPT mechanism is both efficient and resilient against tracing attacks. Simulation results are provided to show that the proposed mechanism is beneficial to the FC network.","PeriodicalId":198419,"journal":{"name":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A Secure Tracing Method in Fog Computing Network for the IoT Devices\",\"authors\":\"A. Alamer, Sultan Basudan, P. Hung\",\"doi\":\"10.1145/3415958.3433074\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a Secure and Privacy-preserving Tracing (SPT) mechanism in the Fog Computing (FC) network. The proposed SPT mechanism employs a Counting Bloom Filter (CBF) method as a tree framework (CBF-tree) to model a secure tracing system in the FC network. With the proposed SPT mechanism, the fog node can trace a particular Internet of Things (IoT) device in a secure manner, which means that the fog node can trace IoT devices in order to provide them with their requested services without revealing their private data such as the device's identities or locations. Analysis shows that the SPT mechanism is both efficient and resilient against tracing attacks. Simulation results are provided to show that the proposed mechanism is beneficial to the FC network.\",\"PeriodicalId\":198419,\"journal\":{\"name\":\"Proceedings of the 12th International Conference on Management of Digital EcoSystems\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 12th International Conference on Management of Digital EcoSystems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3415958.3433074\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th International Conference on Management of Digital EcoSystems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3415958.3433074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Tracing Method in Fog Computing Network for the IoT Devices
This paper proposes a Secure and Privacy-preserving Tracing (SPT) mechanism in the Fog Computing (FC) network. The proposed SPT mechanism employs a Counting Bloom Filter (CBF) method as a tree framework (CBF-tree) to model a secure tracing system in the FC network. With the proposed SPT mechanism, the fog node can trace a particular Internet of Things (IoT) device in a secure manner, which means that the fog node can trace IoT devices in order to provide them with their requested services without revealing their private data such as the device's identities or locations. Analysis shows that the SPT mechanism is both efficient and resilient against tracing attacks. Simulation results are provided to show that the proposed mechanism is beneficial to the FC network.