Multileveled Central Trust Management Approach using Fog Computing

  • Ayesha Irshad Abbottabad University of Science & Technology, Abbottabad, Pakistan
  • Syed Zohaib Hassan Beijing Institute of Technology, Beijing, China
  • Ayesha Aslam Abbottabad University of Science & Technology, Abbottabad, Pakistan
  • Kalsoom Ayaz Abbottabad University of Science & Technology, Abbottabad, Pakistan
  • Jamaluddin Mir Universiti Tun Hossein Onn Malaysia, Batu Pahat, Malaysia
  • Muhammad Awais Bawazir Bahria University, Islamabad, Pakistan

Abstract

In the IoT environment, one of the biggest issues is the devices' anonymity and mobility, i.e., continuously joining and leaving networks. This research aims to explore certain strategies that will enable users to overcome these issues. Fog computing is reclined of central cloud services on multiple points near edge devices. Fog computing creates a decentralized computing architecture that acts as an intermediary between the cloud and the devices producing the data. This decentralized approach enables the users to locate resources in such locations that are closer to the devices. Cloud services are more effective when they are provided with low latency, storage issues are reduced, bandwidth is saved, and QoS is enhanced. Distributed fog nodes can cope with the mobility of edge nodes. Although both edge and fog computing can bring computing processes to such locations where data is created by eliminating the need for central storage, this approach gives rise to unprecedented issues that do not exist in centralized architecture like cloud computing. Anonymity can be addressed by identifying vulnerable devices and evaluating their trust level. This research work proposes a trust management scheme to develop a reliable IoT infrastructure in terms of trust. In the proposed model, trust is evaluated and managed on multiple levels to at the tain quality of services and give customers the confidence to share their confidential data online. This goal will help the users connect to the internet without losing control of their data integrity and confidentiality

References

Ali, A., Iqbal, M. M., Jamil, H., Akbar, H., Muthanna, A., Ammi, M., & Althobaiti, M. M. (2021). Multilevel central trust management approach for task scheduling on IoT-based mobile cloud computing. Sensors, 22(1), 1-22. https://doi.org/10.3390/s22010108

Ali, M., Raza, S. A., Khamis, B., Puah, C. H., & Amin, H. (2021). How perceived risk, benefit and trust determine user Fintech adoption: A new dimension for Islamic finance. Foresight, 23(4), 403-420. https://doi.org/10.1108/FS-09-2020-0095

Arvind Narayan, S., Rajashekar Reddy, R., & Femilda Josephin, J. S. (2020). Secured congestion control in VANET using greedy perimeter stateless routing (GPSR). In Arti
Published
2021-12-22
How to Cite
Ayesha Irshad, Syed Zohaib Hassan, Ayesha Aslam, Kalsoom Ayaz, Jamaluddin Mir, & Muhammad Awais Bawazir. (2021). Multileveled Central Trust Management Approach using Fog Computing. Journal of Management Practices, Humanities and Social Sciences, 5(6), 69-78. https://doi.org/10.33152/jmphss-5.6.8
Section
Articles