INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )

E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 3 2024
DOI: 10.56201/ijcsmt.v10.no3.2024.pg187.201


Secure Data Replication in Edge and Fog Computing Environments

Alalibo, H., Bennett, E.O., Nwiabu, N.D. & Matthias, D. s:


Abstract


This paper presents a comprehensive framework for secure data replication in edge and fog computing environments, addressing the challenges and solutions associated with these environments. The research proposes a multi-layered security model that integrates encryption, access control, and anomaly detection to safeguard replicated data across distributed nodes. The model leverages lightweight cryptographic techniques to ensure data confidentiality without imposing significant computational overhead, making it suitable for resource-constrained edge devices. The paper also explores advanced replication strategies that balance the trade-offs between consistency, availability, and partition tolerance, known as the CAP theorem. The approach adopts adaptive replication protocols to adjust to network conditions and workload variations dynamically, ensuring optimal data availability and fault tolerance. Extensive simulations and real-world experiments validate the efficacy of the proposed framework, showcasing significant improvements in data security and system resilience over traditional methods. The research contributes to the body of knowledge by providing practical insights and technical solutions for secure data replication, paving the way for more secure and reliable edge and fog computing systems.


keywords:

Secure data replication, edge and fog computing environments, role-based access


References:


[1] Al Yami, M., & Schaefer, D. (2019). FC as a complementary approach to cloud computing. In
International Conference on Computer and Information Science (ICCIS), Jouf University, Al Jouf
Region, Kingdom of Saudi Arabia. https://doi.org/10.1109/ICCISci.2019.8716402
[2] Dustdar, S., Avasalcai, C., & Murturi, I. (2019). Edge and FC: vision and research challenges. In 2019
IEEE International Conference on Service-Oriented System Engineering (SOSE). IEEE.
https://doi.org/10.1109/SOSE.2019.00023
[3] Ni, J., Zhang, K., Lin, X., & Shen, X. (2018). Securing fog computing for internet of things
applications: challenges and solutions. IEEE Communications Surveys & Tutorials, 20(1), 601-628.
https://doi.org/10.1109/COMST.2017.2762345
[4] Sookhak, M., Yu, F.R., Khan, .K. & Xiang. (2016). Attribute-Based Data Access Control in Cloud
Computing: Taxonomy and Open Issues. Future Generation Computer Systems. Volume 72, July 2017,
Pages 273-287
[5] Khan .S.,Parkinson .S. and Qin .Y. (2017). Fog computing security: a review of current applications
and security solutions. Journal of Cloud Computing: Advances, Systems and Applications. (2017) 6:19
DOI 10.1186/s13677-017-0090-3
[6] Pfandzelter, T., Japke, N., Schirmer, T., Hasenburg, J., & Bermbach, D. (2023). Managing data
replication and distribution in the fog with FReD. Software: Practice and Experience, 53, 1958 - 1981.
[7] Alshiky .A.M., Buhari .S., and Barnawi A. (2017). Attribute Based Access Control (ABAC) for HER
in Fog Computing Environment. International Journal on Cloud Computing: Services and Architecture
(IJCCSA) Vol. 7, No. 1, February 2017. DOI:10.5121/ijccsa.2017.7102
[8] Noura .H., Salman .O, Chehab .A., Couturier .R. (2019). Preserving data security in distributed fog
computing. Ad Hoc Networks, 2019, 94, pp.101937 (16). ffhal-02366770f.
[9] Ometov, A., Molua, O. L., Komarov, M., & Nurmi, J. (2022). A Survey of Security in Cloud, Edge, and
Fog Computing. Sensors, 22(3), 927. https://doi.org/10.3390/s22030927
[10] Saleem, Ahsan & Khan, Abid & Malik, Saif & Pervaiz, Haris & Malik, Hassan & Alam, Muhammad
& Jindal, Anish. (2019). FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network. IEEE
Internet of Things Journal. PP. 1-1. 10.1109/JIOT.2019.2957314.
[11] Kongara, Ravindranath & Reddy, M.S. & Reddy, M. & Chaitanya, D.. (2019). Secure data storage and
retrieval in the cloud. International Journal of Innovative Technology and Exploring Engineering. 8. 34-38.
12] Zhu, T., Guo, J., Zhou, H., Zhou, X., & Zhou, A.-Y. (2018). Consistency and availability in distributed
database
systems.
Ruan
Jian
Xue
Bao/Journal
of
Software,
29(1),
131-149.
https://doi.org/10.13328/j.cnki.jos.005433
[13] Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, Fog et al.: A survey and
analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.
https://doi.org/10.1016/j.future.2016.11.009


DOWNLOAD PDF

Back