Securing the Fog Computing Environment and Enhancing Resource Allocation

P. Harikrishna,R. Kaviarasan
DOI: https://doi.org/10.1007/s11277-024-11308-8
IF: 2.017
2024-06-26
Wireless Personal Communications
Abstract:Ever since the advent of computers, the burden of human beings has reduced drastically. But even computers were resource constraint, so cloud computing was born. Cloud computing made sure that the computing resources are properly utilized or there is no underutilization of resources. To make cloud computing much more efficient as well as to eradicate its disadvantages Fog computing was born. The fog computing suffers in allocating resource to the Virtual Machines and the VMs becomes overloaded on many occasions. The Fog also faces threats with respect to Operating Systems like Denial of Service as different Virtual Machine uses different operating system. Many approaches have concentrated on either allocating the resource or securing the Fog network. This paper proposes a novel approach for allocating resources in the Virtual Machines and also proposes a Game Theoretic Approach to mitigate Distributed Denial of Service attack. Game theory provides numerous advantages, such as the ability to predict attacks, make strategic decisions, allocate resources optimally, develop adaptive defense plans, analyze behavior, assess risks, and engage in collaborative defense. The analysis aids in comprehending the dynamics between attackers and defenders, facilitating enhanced allocation of resources and empowering defenders to proactively predict and address alterations in attacker conduct. Based on the merits of Game theoretic approach the proposed Game theory in Fog Computing based Workflow scheduling Algorithm has been designed which has an improved detection accuracy of 44% when compared with its peer compared methods Fuzzy and Taylor-Elephant Herd Optimization, Privacy Identifier forming-Sequence Integrity Data Algorithm, Defender Attacker Security Game Model, Deep Learning-based Distributed Denial of Service has acquired detection accuracy of 34, 30, 22 and 15% respectively which are considerably lesser than the proposed method.
telecommunications
What problem does this paper attempt to address?