A Hash-Based Naming Strategy for the Fog-to-Cloud Computing Paradigm

被引:1
|
作者
Gomez-Cardenas, Alejandro [1 ]
Masip-Bruin, Xavi [1 ]
Marin-Tordera, Eva [1 ]
Kahvazadeh, Sarang [1 ]
Garcia, Jordi [1 ]
机构
[1] Univ Politecn Catalunya UPC, Adv Network Architectures Lab CRAAX, Barcelona, Spain
基金
欧盟地平线“2020”;
关键词
Naming; Identification; Fog-to-Cloud; Internet of Things; MANAGEMENT;
D O I
10.1007/978-3-319-75178-8_26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growth of the Internet connected devices population has fuelled the emergence of new distributed computer paradigms; one of these paradigms is the so-called Fog-to-Cloud (F2C) computing, where resources (compute, storage, data) are distributed in a hierarchical fashion between the edge and the core of the network. This new paradigm has brought new research challenges, such as the need for a novel framework intended to controlling and, more in general, facilitating the interaction among the heterogeneous devices conforming the environment at the edge of the network and the available resources at cloud. A key feature that this framework should meet is the capability of uniquely and unequivocally identify the connected devices. In this paper a hash-based naming strategy suitable to be used in the F2C environment is presented. The proposed naming method is based on three main components: certification, hashing and identification. This research is an ongoing work, thus, the steps to follow since a device connects to the F2C network until it receives a name are described and the major challenges that must be solved are analyzed.
引用
收藏
页码:316 / 324
页数:9
相关论文
共 50 条
  • [1] Essentiality of managing the resource information in the coordinated fog-to-cloud paradigm
    Sengupta, Souvik
    Garcia, Jordi
    Masip-Bruin, Xavi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (10)
  • [2] Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
    Doaa Mohamed
    Osama Ismael
    Journal of Cloud Computing, 12
  • [3] Enhancement of an IoT hybrid intrusion detection system based on fog-to-cloud computing
    Mohamed, Doaa
    Ismael, Osama
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [4] Multi Factor Two-way Hash-Based Authentication in Cloud Computing
    DeviPriya, K.
    Lingamgunta, Sumalatha
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2020, 10 (02) : 56 - 76
  • [5] Distributed Fog-to-Cloud computing system: A minority game approach
    AbdElhalim, Eman
    Obayya, Marwa
    Kishk, Sherif
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (15):
  • [6] A novel chaotic hash-based attribute-based encryption and decryption on cloud computing
    Tamma, Lakshmi Naga Divya
    Ahamad, Shaik Shakeel
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 1 - 19
  • [7] A Resource Identity Management Strategy for Combined Fog-to-Cloud Systems
    Gomez-Cardenas, Alejandro
    Masip-Bruin, Xavi
    Marin-Tordera, Eva
    Kahvazadeh, Sarang
    Garcia, Jordi
    2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2018,
  • [8] Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios
    Asensio, A.
    Masip-Bruin, X.
    Duran, R. J.
    de Miguel, I
    Ren, G.
    Daijavad, S.
    Jukan, A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 392 - 406
  • [9] Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
    Zhang, Xingjun
    Si, Wei
    IEEE ACCESS, 2021, 9 : 37951 - 37960
  • [10] Essentiality of Resource and Service-Task Characterization in the Coordinated Fog-to-Cloud Paradigm
    Sengupta, Souvik
    Garcia, Jordi
    Masip-Bruin, Xavi
    2018 INTERNATIONAL CONFERENCE ON SMART COMMUNICATIONS IN NETWORK TECHNOLOGIES (SACONET), 2018, : 249 - 254