The International Arab Journal of Information Technology (IAJIT)


A Fog Computing-based Framework for Privacy Preserving IoT Environments

Privacy is becoming an indispensable component in the emerging Internet of Things (IoT) context. However, the IoT based devices and tools are exposed to several security and privacy threats, especially that these devices are mainly used to gather data about users’ habits, vital signs, surround environment, etc., which makes them a lucrative target to intruders. Up to date, conventional security and privacy mechanisms are not well optimized for IoT devices due to their limited energy, storage capacity, communication functionality and computing power, which influenced researchers to propose new solutions and algorithms to handle these limitations. Fog and cloud computing have been recently integrated in IoT environment to solve their resources’ limitations, thus facilitating new life scenarios-oriented applications. In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users’ data and protecting their privacy. The framework has been implemented and tested using available technologies. Furthermore, a security analysis has been verified by simulating several hypothetical attack scenarios, which showed the effectiveness of the proposed framework and its capability of protecting the users’ information.

[1] Abou-Tair D., Büchsenstein S., and Khalifeh A., “A Privacy Preserving Framework for the Internet of Things,” in Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Busan, pp. 27-31, 2018.

[2] Abou-Tair D., Alouneh S., Khalifeh A., and Obermaisser R., “A Security Framework for Systems-of-Systems,” in Proceedings of the International Conference on Ubiquitous Information Technologies and Applications International Conference on Computer Science and its Applications, Taichung, pp. 427-432, 2017.

[3] Alrawais A., Alhothaily A., Hu C., and Cheng X., “Fog Computing for the Internet of Things: Security and Privacy Issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34-42, 2017.

[4] Anonym, “IoT Security: Protecting the Networked Society,” Ericsson White Paper, 2017.

[5] Chow R., “The Last Mile for IoTPrivacy,” IEEE Security and Privacy, vol. 15, no. 6, pp. 73-76, 2017.

[6] Dang T. and Hoang D., “A Data Protection Model for Fog Computing,” in Proceedings of the 2nd International Conference on Fog and Mobile Edge Computing, Valencia, pp. 32-38, 2017.

[7] Hiari O., Abou-Tair D., and Abushaikha I., “An IoT-Based Virtual Addressing Framework for Intelligent Delivery Logistics,” in Proceedings of the International Conference on Information Science and Applications, Macau, pp. 698-705, 2017.

[8] Khalifeh A., Saleh A., AL-Nuimat M., and Tair D., “An Open Source Cloud Based Platform for Elderly Health Monitoring and Fall Detection,” in Proceedings of the 4th Workshop on ICTs for Improving Patients Rehabilitation Research Techniques, Lisbon, pp. 97-100, 2016.

[9] Kiblawi T. and Khalifeh A., “Disruptive A Fog Computing-based Framework for Privacy Preserving IoT Environments 315 Innovations in Cloud Computing and Their Impact on Business and Technology,” in Proceedings of the 4th the International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, pp. 1-4, 2015.

[10] Krejčí R., Hujňák O., and Švepeš M., “Security Survey Of The Iot Wireless Protocols,” in Proceedings of the 25th Telecommunication Forum (TELFOR), Belgrade, pp. 1-4, 2017.

[11] Lee K., Kim D., Ha D., Rajput U., and Oh H., “On Security and Privacy Issues of Fog Computing Supported Internet of Things Environment,” in Proceedings of the 6th International Conference on the Network of the Future, Montreal, pp. 1-3, 2015.

[12] Makkes M., Uta A., Das R., Bozdog V., “P^2- SWAN: Real-Time Privacy Preserving Computation for IoT Ecosystems,” in Proceedings of the IEEE 1st International Conference on Fog and Edge Computing, Madrid, pp. 1-10, 2017.

[13] Mukherjee B., Neupane R., and Calyam P., “End-to-End IoT Security Middleware for Cloud-Fog Communication,” in Proceedings of the IEEE 4th International Conference on Cyber Security and Cloud Computing, New York, pp. 151-156, 2017.

[14] Ni J., Zhang K., Lin X., and Shen X., “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions,” IEEE Communications Surveys and Tutorials, vol. 20, no. 1, pp. 601-628, 2018.

[15] Obermaisser R., Abuteir M., Khalifeh A., Abou- Tair D., “Systems-of-Systems Framework for Providing Real-Time Patient Monitoring and Care: Challenges and Solutions,” in Proceedings of ICTs for Improving Patients Rehabilitation Research Techniques. Communications in Computer and Information Science, Oldenburg, pp. 129-142, 2015.

[16] Sha K., Errabelly R., Wei W., Yang T., Wang Z., “EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security,” in Proceedings IEEE 1st International Conference on Fog and Edge Computing, Madrid, pp. 81-88, 2017.

[17] Shaout A. and Crispin B., “Using the MQTT Protocol in Real Time for Synchronizing IoT Device State,” The International Arab Journal of Information Technology, vol. 15, no. 3A, pp. 515-521, 2018.

[18] Vallati C., Virdis A., Mingozzi E., and Stea G., “Exploiting LTE D2D Communications in M2M Fog Platforms: Deployment and Practical Issues,” in Proceedings of the IEEE 2nd World Forum on Internet of Things, Milan, pp. 585-590, 2015.

[19] Wang T., Zhou J., Chen X., and Wang G., “A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 2, no. 1, pp. 3-12, 2018.

[20] Wang Q., Chen D., Zhang N., Ding Z., Qin Z., “PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme with Differential Privacy in Fog Computing,” IEEE Access, vol. 5, pp. 17962-17974, 2017.

[21] Weber R., “Internet of Things: Privacy Issues Revisited,” Computer Law and Security Review, vol. 31, no. 5, pp.618-627, 2015.

[22] Zhou W., Jia Y., Peng A., Zhang Y., and Liu P., “The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1606-1616, 2019. Dhiah el Diehn Abou-Tair, associate professor at the German- Jordanian University (GJU), received his PhD from the University of Siegen, Germany. During his PhD, Dr. Abou-Tair conducted research about the adoption of privacy laws and regulations in information systems through an ontology-based approach. His current research interests are in the areas of privacy-enhancing technologies, security and IoT. Dr. Abou-Tair has been involved in several EU and German-funded research and capacity building projects. Simon Büchsenstein received his B.Sc. degree in electrical engineeringfromFurtwangenUniversi ty, Germany.Currently he is doing his M.Sc. in embedded systems engineering at theUniversity of Freiburg.His research interests include cryptography and embedded security. Ala’ Khalifeh received the PhD degree in Electrical and Computer Engineering from the University of California, Irvine -USA in 2010. He is currently an Associate Professor in the Communication Engineering department at the German Jordanian University and the department chair. His research is in communications technology, and networking with particular emphasis on optimal resource allocations for multimedia transmission over wired and wireless networks, Quality of Service, Internet of Things and Wireless Sensor Networks.