Design of a New Secured Hierarchical Peer-to-Peer Fog Architecture Based on Linear Diophantine Equation

Document Type

Conference Proceeding

Publication Date

1-1-2023

School

Computing Sciences and Computer Engineering

Abstract

In recent years, there has been massive growth in the usage of IoT devices. Cloud computing architecture is unable to meet the requirements of bandwidth, real-time response, and latency. To overcome these limitations, fog computing architecture is introduced, which responds to requests from IoT devices and only, if necessary, forwards requests to the cloud. Nonetheless, there are still some requests that need to go to the cloud and get affected by the shortcomings of the cloud. In this work, we propose to add a peer-to-peer (P2P) structure to the fog layer. We have considered our recently reported 2-layer non-DHT-based architecture for P2P networks in which at each level of the hierarchy existing networks are all structured and each such network has a diameter of 1 overlay hop. Such low diameters have huge significance in our proposed P2P fog model and improve fog computing by presenting very efficient data lookup algorithms. In this model, fog nodes can work together to complete the client requests. Consequently, fog nodes are able to fulfill the client requests in the fog layer, which ultimately decreased overheads on the cloud. Additionally, to improve the security in communication in the architecture, we have utilized ciphertext policy attribute-based encryption (CP- ABE) and presented a new secure algorithm.

Publication Title

EPiC Series In Computing

Volume

91

First Page

86

Last Page

97

Find in your library

Share

COinS