International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-8,Issue-11  ( Nov, 2020 )
Past issues
  1. Volume-8,Issue-10  ( Oct, 2020 )
  2. Volume-8,Issue-9  ( Sep, 2020 )
  3. Volume-8,Issue-8  ( Aug, 2020 )
  4. Volume-8,Issue-7  ( Jul, 2020 )
  5. Volume-8,Issue-6  ( Jun, 2020 )
  6. Volume-8,Issue-5  ( May, 2020 )
  7. Volume-8,Issue-4  ( Apr, 2020 )
  8. Volume-8,Issue-3  ( Mar, 2020 )
  9. Volume-8,Issue-2  ( Feb, 2020 )
  10. Volume-8,Issue-1  ( Jan, 2020 )

Statistics report
Feb. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 94
Paper Published : 1276
No. of Authors : 3207
  Journal Paper

Paper Title
SDN-Based Privacy for Fog-Iot Application

Abstract
With the rapid growth of Internet of Things (IoT) applications, Fog computing has come into play. Fog computing provides IoT data processing locally at fog nodes instead of transferring them to the Cloud. In contrast to the Cloud, Fog provides services with faster response and supports latency-sensitive IoT applications. In addition, to reduce bandwidth consumption in the network and enhance quality of service (QoS) for heterogeneous IoT applications, the integration of Software Defined Network (SDN) with Fog computing is proposed. SDN technology will give the Fog service providers a greater control over the network configuration and it can facilitate the security management in Fog-IoT. In this paper, we exploit the SDN benefits to protect user’s privacy which is one of the significant challenges in Fog-IoT. SDN-Based privacy schema is proposed aiming to protect user’s privacy considering QoS in latency sensitive application. Two mechanisms are proposed to preserve user privacy: the homomorphic encryption and identity hiding. Using these mechanisms, will not only preserve data and location privacy of IoT devices but also, they implicitly could be considered as a usage privacy mechanism. At the end, we finalize this paper by presenting a Child Monitoring System (CMS) as a use case to illustrate the effectiveness of the proposed solution. Keywords - Internet of Things, Fog Computing, Sdn, Preserving Privacy, Homomorphic Encryption, Identity Hiding, Data Privacy, Location Privacy, Usage Privacy.


Author - Aisha Mohmmed Alshiky, Nourah Fahad Janbi, Nadine Akkari

| PDF |
Viewed - 35
| Published on 2020-02-13
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY