skip to main content
10.1145/3230833.3232819acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Reputation-Based Security System For Edge Computing

Published: 27 August 2018 Publication History

Abstract

Given the centralized architecture of cloud computing, there is a genuine concern about its ability to adequately cope with the demands of connecting devices which are sharply increasing in number and capacity. This has led to the emergence of edge computing technologies, including but not limited to mobile edge-clouds. As a branch of Peer-to-Peer (P2P) networks, mobile edge-clouds inherits disturbing security concerns which have not been adequately addressed in previous methods. P2P security systems have featured many trust-based methods owing to their suitability and cost advantage, but these approaches still lack in a number of ways. They mostly focus on protecting client nodes from malicious service providers, but downplay the security of service provider nodes, thereby creating potential loopholes for bandwidth attack. Similarly, trust bootstrapping is often via default scores, or based on heuristics that does not reflect the identity of a newcomer. This work has patched these inherent loopholes and improved fairness among participating peers. The use cases of mobile edge-clouds have been particularly considered and a scalable reputation based security mechanism was derived to suit them. BitTorrent protocol was modified to form a suitable test bed, using Peersim simulator. The proposed method was compared to some related methods in the literature through detailed simulations. Results show that the new method can foster trust and significantly improve network security, in comparison to previous similar systems.

References

[1]
Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, and Muttukrishnan Rajarajan. 2014. Stealing bandwidth from BitTorrent seeders. Computers & Security 46 (2014), 126--140.
[2]
Yuan Ai, Mugen Peng, and Kecheng Zhang. 2018. Edge cloud computing technologies for internet of things: A primer. Digital Communications and Networks 4, 2 (2018), 77--86.
[3]
Roberto Aringhieri, Ernesto Damiani, Di Vimercati, Sabine De Capitani, Stefano Paraboschi, and Pierangelo Samarati. 2006. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Journal of the Association for Information Science and Technology 57, 4 (2006), 528--537.
[4]
Nikola Bozic, Guy Pujolle, and Stefano Secci. 2016. A tutorial on blockchain and applications to secure network control-planes. In Smart Cloud Networks & Systems (SCNS). IEEE, 1--8.
[5]
Kang Chen, Guoxin Liu, Haiying Shen, and Fang Qi. 2015. Sociallink: utilizing social network and transaction links for effective trust management in P2P file sharing systems. In 2015 IEEE International Conference on Peer-to-Peer Computing (P2P). IEEE, 1--10.
[6]
Ian Clarke, Oskar Sandberg, Matthew Toseland, and Vilhelm Verendel. 2010. Private communication through a network of trusted connections: The dark freenet. Network (2010).
[7]
Prithula Dhungel, Xiaojun Hei, Di Wu, and Keith W Ross. 2011. A measurement study of attacks on bittorrent seeds. In 2011 IEEE International Conference on Communications (ICC). IEEE, 1--5.
[8]
John R Douceur. 2002. The sybil attack. In International workshop on peer-to-peer systems. Springer, 251--260.
[9]
Utsav Drolia, Rolando Martins, Jiaqi Tan, Ankit Chheda, Monil Sanghavi, Rajeev Gandhi, and Priya Narasimhan. 2013. The case for mobile edge-clouds. In Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC). IEEE, 209--215.
[10]
Tuva Selstad Dybedokken. 2017. Trust Management in Fog Computing. Master's thesis. NTNU. http://hdl.handle.net/11250/2454375
[11]
Niroshinie Fernando, Seng W Loke, and Wenny Rahayu. 2013. Mobile cloud computing: A survey. Future generation computer systems 29, 1 (2013), 84--106.
[12]
Fabrizio Frioli and Michele Pedrolli. 2008. A BitTorrent module for Peersim. Technical Report. University of Trento. http://peersim.sourceforge.net/code/bittorrent.tar.gz
[13]
Pedro Garcia Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. ACM SIGCOMM Computer Communication Review 45, 5 (2015), 37--42.
[14]
Dijiang Huang, Xinwen Zhang, Myong Kang, and Jim Luo. 2010. MobiCloud: building secure cloud framework for mobile computing and communication. In Fifth IEEE International Symposium on Service Oriented System Engineering (SOSE). Ieee, 27--34.
[15]
Yaser Jararweh, Ahmad Doulat, Omar AlQudah, Ejaz Ahmed, Mahmoud Al-Ayyoub, and Elhadj Benkhelifa. 2016. The future of mobile cloud computing: integrating cloudlets and mobile edge computing. In 23rd International Conference on Telecommunications (ICT). IEEE, 1--5.
[16]
Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th bled electronic commerce conference, Vol. 5. 2502--2511.
[17]
Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th international conference on World Wide Web. ACM, New York, NY, USA, 640--651.
[18]
Irum Kazmi and Syed Fahim Yousaf Bukhari. 2011. PeerSim: An efficient & scalable testbed for heterogeneous cluster-based P2P network protocols. In Computer Modelling and Simulation (UKSim), 2011 UkSim 13th International Conference on. IEEE, 420--425.
[19]
Spyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, Michael Sweatt, and Lixia Zhang. 2017. nTorrent: BitTorrent in Named Data Networking. Technical Report. University of California, Los Angeles.
[20]
Diogo Mónica, Joao Leitao, Luis Rodrigues, and Carlos Ribeiro. 2009. On the use of radio resource tests in wireless ad hoc networks. Technical Report RT/29/2009. INESC-ID/IST
[21]
Alberto Montresor and Mark Jelasity. 2009. PeerSim: A scalable P2P simulator. In IEEE Ninth International Conference on Peer-to-Peer Computing, P2P'09. IEEE, 99--100.
[22]
Tyler Moore. 2006. A collusion attack on pairwise key pre distribution schemes for distributed sensor networks. In PerCom Workshops 2006. Fourth Annual IEEE International Conference on Pervasive Computing and Communications. IEEE, 5--pp.
[23]
Andy Oram. 2001. Peer-to-Peer: Harnessing the power of disruptive technologies. " O'Reilly Media, Inc.".
[24]
Siani Pearson. 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing. Springer, 3--42.
[25]
Riccardo Pecori. 2016. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Computer Networks 94 (2016), 205--218.
[26]
Paul Resnick et al. 2001. The social cost of cheap pseudonyms. Journal of Economics & Management Strategy 10, 2 (2001), 173--199.
[27]
João Rodrigues, Eduardo RB Marques, Luis Lopes, and Fernando Silva. 2017. Towards a middleware for mobile edge-cloud applications. In Proceedings of the 2nd Workshop on Middleware for Edge Clouds & Cloudlets. ACM, New York, NY, USA, 1.
[28]
Rodrigo Roman, Javier Lopez, and Masahiro Mambo. 2018. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems 78 (2018), 680--698.
[29]
Behrooz Shafiee Sarjaz and Maghsoud Abbaspour. 2013. Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Networking and Applications 6, 1 (March 2013), 86--100.
[30]
Eve M Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, and Moreno Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In Distributed Computing Systems (ICDCS), 2017 IEEE 37th International Conference on. IEEE, 1717--1728.
[31]
Devu Manikantan Shila, Wenlong Shen, Yu Cheng, Xiaohua Tian, and Xuemin Sherman Shen. 2017. AMCloud: Toward a secure autonomic mobile ad hoc cloud computing system. IEEE Wireless Communications 24, 2 (2017), 74--81.
[32]
Joaquim Silva, Daniel Silva, Eduardo RB Marques, Luís Lopes, and Fernando Silva. 2017. P3-Mobile: Parallel Computing for Mobile Edge-Clouds. In Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms. ACM, New York, NY, USA, 5:1--5:7.
[33]
Pedro M Pinto Silva, Joao Rodrigues, Joaquim Silva, Rolando Martins, Luis Lopes, and Fernando Silva. 2017. Using edge-clouds to reduce load on traditional wifi infrastructures and improve quality of experience. In 1st International Conference on Fog and Edge Computing (ICFEC). IEEE, 61--67.
[34]
Aameek Singh and Ling Liu. 2003. TrustMe: anonymous management of trust relationships in decentralized P2P systems. In Proceedings. Third International Conference on Peer-to-Peer Computing (P2P 2003). IEEE, 142--149.
[35]
Florian Skopik, Daniel Schall, and Schahram Dustdar. 2009. Start trusting strangers? bootstrapping and prediction of trust. In International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 275--289.
[36]
Mohit Taneja and Alan Davy. 2017. Resource aware placement of IoT application modules in Fog-Cloud Computing Paradigm. In Integrated Network and Service Management (IM), 2017 IFIP/IEEE Symposium on. IEEE, 1222--1228.
[37]
Mozhgan Tavakolifard and Svein J Knapskog. 2011. Trust evaluation initialization using contextual information. In Proceedings of the International Conference on Management of Emergent Digital EcoSystems. ACM, New York, NY, USA, 1--8.
[38]
Blesson Varghese and Rajkumar Buyya. 2018. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems 79 (2018), 849--861.
[39]
Guojun Wang, Felix Musau, Song Guo, and Muhammad Bashir Abdullahi. 2015. Neighbor similarity trust against sybil attack in P2P e-commerce. IEEE transactions on parallel and distributed systems 26, 3 (2015), 824--833.
[40]
Ronald R Yager. 1993. On ordered weighted averaging aggregation operators in multicriteria decisionmaking. In Readings in Fuzzy Sets for Intelligent Systems. Elsevier, 80--87.
[41]
Shanhe Yi, Cheng Li, and Qun Li. 2015. A survey of fog computing: concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data. ACM, New York, NY, USA, 37--42.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
August 2018
603 pages
ISBN:9781450364485
DOI:10.1145/3230833
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

In-Cooperation

  • Universität Hamburg: Universität Hamburg

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. P2P
  2. Reputation
  3. Trust
  4. mobile edge-clouds

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2018

Acceptance Rates

ARES '18 Paper Acceptance Rate 128 of 260 submissions, 49%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media