DOI QR코드

DOI QR Code

클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing

  • Shin, Minjeong (Dept. of Information & Communication Eng., Graduate School, Pukyong National University) ;
  • Kim, Sungun (Dept. of Information & Communication Eng., Pukyong National University)
  • 투고 : 2017.09.06
  • 심사 : 2017.11.09
  • 발행 : 2017.12.31

초록

Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

키워드

참고문헌

  1. S. Chae, Y. Yang, and T. Han, "The Fourth Industrial Revolution and Multimedia Converging Technology: Pervasive AR Platform Construction Using a Mobile Robot based Projection Technology," Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 298-312, 2017. https://doi.org/10.9717/kmms.2017.20.2.298
  2. M. Diaz, C. Martin, and B. Rubio, "State-of-the-art, Challenges, and Open Issues in the Integration of Internet of Things and Cloud Computting," Journal of Network and Computer Applications, Vol. 67, pp. 99-117, 2016. https://doi.org/10.1016/j.jnca.2016.01.010
  3. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud Computing: State-of-the-art and Research Challenges,” Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7-18, 2010. https://doi.org/10.1007/s13174-010-0007-6
  4. F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog Computing and Its Role in the Internet of Things," Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computting, pp. 13-16, 2012.
  5. A.V. Dastjerdi and R. Buyya, "Fog Computing: Helping the Internet of Things Realize Its Potential," Computer, Vol. 49, Issue 8, pp. 112-116, 2016. https://doi.org/10.1109/MC.2016.245
  6. D. Dujovne, T. Watteyne, X. Vilajosana, and P. Thubert, “6TiSCH: Deterministic IP-enabled Industrial Internet(of Things),” IEEE Communications Magazine, Vol. 52, No. 12, pp. 36-41, 2014. https://doi.org/10.1109/MCOM.2014.6979984
  7. E. Borgia, "The Internet of Things Vision: Key Features, Applications and Open Issues," Computer Communications, Vol. 54, pp. 1-31, 2014. https://doi.org/10.1016/j.comcom.2014.09.008
  8. J.S. Zielinsku, “Internet of Everything (IoE) in Smart Grid,” Przeglad Elektrotechniczny, Vol. 91, No. 3, pp. 157-159, 2015.
  9. P.A.F. Vitti, D.R. dos Santos, C.B. Westphall, C.M. Westphall, and K.M.M. Vieir, "Current Issues in Cloud Computing Security and Management," Secuware 2014, pp. 36-42, 2014.
  10. S. Sarkar, V.K. Bharadwaj, and G. Priya, “Security Issues and Challenges in Cloud Computing,” International Research Journal of Engineering and Technology, Vol. 3, No. 10, pp. 1143-1146, 2016.
  11. R. Arora and A. Parashar, "Secure User Data in Cloud Computing Using Encryption Algorithms," International Journal of Engineering Research and Applications, Vol. 3, No. 4, pp. 1922-1926, 2013.
  12. NIST, Advanced Encryption Standard(AES), Federal Information Processing Standards Publication 197(FIPS-197), 2001.
  13. IEEE, PART 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11i, 2004.
  14. IETF, Hypertext Transfer Protocol (HTTP/1.1): Authentication, RFC 7235, 2014.
  15. IETF, Remote Authentication Dial-In User Service (RADIUS) Protocol Extensions, RFC 6929, 2013.
  16. IEEE, IEEE Standard for Ethernet, IEEE Std 802.3, 2012.
  17. D. Hong, J.K. Lee, D.C. Kim, D. Kwon, K.H. Ryu, and D.G. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Proceeding of International Workshop on Information Security Applications, pp. 3-27, 2013.
  18. IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
  19. J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.