Deploying fog-to-cloud towards a security architecture for critical infrastructure scenarios

View/Open
Cita com:
hdl:2117/331951
Document typeConference report
Defense date2019
PublisherSpringer
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
ProjectmF2C - Towards an Open, Secure, Decentralized and Coordinated Fog-to-Cloud Management Ecosystem (EC-H2020-730929)
GESTION DE UNA ARQUITECTURA JERARQUICA FOG-TO-CLOUD PARA ESCENARIOS IOT: COMPARTICION DE RECURSOS (AEI-RTI2018-094532-B-I00)
GESTION DE UNA ARQUITECTURA JERARQUICA FOG-TO-CLOUD PARA ESCENARIOS IOT: COMPARTICION DE RECURSOS (AEI-RTI2018-094532-B-I00)
Abstract
Critical infrastructures are bringing security, and safety for people in terms of healthcare, water, electricity, industry, transportation, etc. The huge amount of data produced by CIs need to be aggregated, filtered, and stored. Cloud computing was merged into the CIs for utilizing cloud data centers as a pay-as-you-go online computing system for outsourcing services for data storage, filtering and aggregating. On the other hand, CIs need real-time processing for providing sophisticated services to people. Consequently, fog computing is merged into CIs aimed at providing services closer to the users, turning into a smooth real-time decision making and processing. When considering both, that is fog and cloud (for example, deploying the recently coined hierarchical fog-to-cloud F2C concept), new enriched features may be applied to the CIs. Security in CIs is one of the most essential challenges since any failure or attack can turn into a national wise disaster. Moreover, CIs also need to support quality of service (QoS) guarantees for users. Thus, bringing balanced QoS vs security is one of the main challenges for any CI infrastructure. In this paper, we illustrate the benefits of deploying an F2C system in CIs, particularly identifying specific F2C security requirements to be applied to CIs. Finally, we also introduce a decoupled security architecture specifically tailored to CIs that can bring security with reasonable QoS in terms of authentication and key distribution time delay.
CitationKahvazadeh, S. [et al.]. Deploying fog-to-cloud towards a security architecture for critical infrastructure scenarios. A: International Workshop on Information and Operational Technology Security Systems. "Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26–27, 2019, Revised Selected Papers". Berlín: Springer, 2019, p. 35-48. ISBN 978-3-030-42051-2. DOI 10.1007/978-3-030-42051-2_3.
ISBN978-3-030-42051-2
Publisher versionhttps://link.springer.com/chapter/10.1007/978-3-030-42051-2_3
Files | Description | Size | Format | View |
---|---|---|---|---|
IoSec 2019 fin-x.pdf | Author's final draft | 1012,Kb | View/Open |