Skip to main content

Using Artificial Intelligence for Trust Management Systems in Fog Computing: A Comprehensive Study

  • Conference paper
  • First Online:
Progress in Artificial Intelligence (EPIA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14116))

Included in the following conference series:

  • 552 Accesses

Abstract

Fog computing has recently attracted great attention as an emerging computing paradigm, avoiding the latency concerns of the cloud. However, because of the distributed, decentralized nature of the fog, several security and privacy issues arise when fog nodes interact and exchange data in specific tasks. Fog servers must be trustworthy for delegation since they are close to the end user and can obtain sensitive information. Yet, normal cryptographic solutions cannot be used to control internal attacks, i.e., from a rogue node that has been authenticated to join the network, raising the concern of how to establish a trustworthy communication between the fog nodes. Trust Management Systems (TMS) have been developed to calculate the level of assurance between fog nodes based on their communication behavior to detect the rogue nodes in the network. Password-based, Traditional authentication methods, i.e., biometric-based and certificated-based, do not fit the fog because of its uniqueness architecture, consuming substantially additional processing power and provoking latency. Thus, several research issues remain open for TMS in the fog, including creating trusted execution environments, trust and security during fog orchestration, collusion attack and access control. In this paper, we investigate using artificial intelligence techniques to tackle the main challenges of TMS in fog computing. We conducted a comparative study to evaluate the major TMS in literature and identify their advantages and disadvantages. We then highlight 17 primary insights and recommendations to improve TMS using artificial intelligence to have more efficient TMS in fog computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al-Khafajiy, M., et al.: COMITMENT: s fog computing trust management approach. J. Parallel Distrib. Comput. 137, 1–16 (2020)

    Article  Google Scholar 

  2. Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8(1), 16 (2019)

    Article  Google Scholar 

  3. Baker, T., Asim, M., MacDermott, Á., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., Hammoudeh, M.: A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. - Pract. Exp. (2019)

    Google Scholar 

  4. Chiang, M., Zhang, T.: Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016)

    Article  Google Scholar 

  5. Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2017)

    Article  Google Scholar 

  6. Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 685–695. Springer (2015)

    Google Scholar 

  7. Aazam, M., Zeadally, S., Harras, K.A.: Offloading in fog computing for IoT: review, enabling technologies, and research opportunities. Future Gener. Comput. Syst. 87, 278–289 (2018)

    Article  Google Scholar 

  8. Zou, Z., et al.: Edge and fog computing enabled AI for IoT-an overview. In: 2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS). IEEE (2019)

    Google Scholar 

  9. Singh, S., Kandpal, M.: A comprehensive survey on trust management in fog computing. In: ICT Analysis and Applications, pp. 87–97 (2022)

    Google Scholar 

  10. Guo, J., Chen, R.: A classification of trust computation models for service-oriented internet of things systems. In: 2015 IEEE International Conference on Services Computing. IEEE (2015)

    Google Scholar 

  11. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE (1996)

    Google Scholar 

  12. Manvi, S.S., Chandra Gowda, N.: Trust management in fog computing: a survey. In: Applying Integration Techniques and Methods in Distributed Systems and Technologies, pp. 34–48. IGI global (2019)

    Google Scholar 

  13. Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16–27 (2018)

    Article  Google Scholar 

  14. Sadique, K.M., Rahmani, R., Johannesson, P.: Fog computing for trust in the Internet of Things (IoT): a systematic literature review. In: 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). IEEE (2020)

    Google Scholar 

  15. Nikravan, M., Haghi Kashani, M.: A review on trust management in fog/edge computing: techniques, trends, and challenges. J. Netw. Comput. Appl. 103402 (2022)

    Google Scholar 

  16. Patwary, A.A.-N., et al.: Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control. Electronics 10(10), 1171 (2021)

    Google Scholar 

  17. Verma, R., Chandra, S.: A systematic survey on fog steered IoT: architecture, prevalent threats and trust models. Int. J. Wirel. Inf. Netw. 28, 116–133 (2021)

    Article  Google Scholar 

  18. Konsta, A.M., Lluch Lafuente, A., Dragoni, N.: Trust Management for Internet of Things: a systematic literature review. arXiv preprint. arXiv:2211.01712 (2022)

  19. Sharma, A., et al.: Towards trustworthy Internet of Things: a survey on trust management applications and schemes. Comput. Commun. 160, 475–493 (2020)

    Google Scholar 

  20. Shehada, D., et al.: Fog-based distributed trust and reputation management system for internet of things. J. King Saud Univ.-Comput. Inf. Sci. 34(10), 8637–8646 (2022)

    Google Scholar 

  21. Rathee, G., et al.: A trust computed framework for IoT devices and fog computing environment. Wirel. Netw. 26, 2339–2351 (2020)

    Google Scholar 

  22. Wang, T., et al.: A novel trust mechanism based on fog computing in sensor–cloud system. Future Gener. Comput. Syst. 109, 573–582 (2020)

    Google Scholar 

  23. Gao, Z., et al.: A credible and lightweight multidimensional trust evaluation mechanism for service-oriented IoT edge computing environment. In: 2019 IEEE International Congress on Internet of Things (ICIOT). IEEE (2019)

    Google Scholar 

  24. Hamza, M., et al.: A social qualitative trust framework for Fog computing. Comput. Electr. Eng. 102, 108195 (2022)

    Google Scholar 

  25. Ogundoyin, S.O., Adeniyi Kamil, I.: A trust management system for fog computing services. Internet of Things 14, 100382 (2021)

    Google Scholar 

  26. Al Muhtadi, J., et al.: Subjective logic-based trust model for fog computing. Comput. Commun. 178, 221–233 (2021)

    Google Scholar 

  27. Alemneh, E., et al.: A two-way trust management system for fog computing. Future Gener. Comput. Syst. 106, 206–220 (2020)

    Google Scholar 

  28. Rahman, F.H., et al.: Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Future Gener. Comput. Syst. 109, 562–572 (2020)

    Google Scholar 

  29. Junejo, A.K., et al.: Trustee: A trust management system for fog-enabled cyber physical systems. IEEE Trans. Emerg. Topics Comput. 9(4), 2030–2041 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sherin M. Moussa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahman, M.A., Dahroug, A., Moussa, S.M. (2023). Using Artificial Intelligence for Trust Management Systems in Fog Computing: A Comprehensive Study. In: Moniz, N., Vale, Z., Cascalho, J., Silva, C., Sebastião, R. (eds) Progress in Artificial Intelligence. EPIA 2023. Lecture Notes in Computer Science(), vol 14116. Springer, Cham. https://doi.org/10.1007/978-3-031-49011-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49011-8_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49010-1

  • Online ISBN: 978-3-031-49011-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics