DOI QR코드

DOI QR Code

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan (Department of Computer Science and Information Engineering, National Taiwan University) ;
  • Fuh, Chiou-Shann (Department of Computer Science and Information Engineering, National Taiwan University)
  • Received : 2018.05.09
  • Accepted : 2018.08.15
  • Published : 2018.12.31

Abstract

Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

Keywords

References

  1. Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu, "Edge Computing: Vision and Challenges," IEEE INTERNET OF THINGS JOURNAL, vol. 3, no. 5, pp-637-646, Oct. 2016. https://doi.org/10.1109/JIOT.2016.2579198
  2. Stefan Nastic, Hong-Linh Truong, and Schahram Dustdar, "SDG-Pro: a programming framework for software-defined IoT cloud gateways," Journal of Internet Services and Applications, 6:21, Oct. 2015.
  3. Eren Balevi, and Richard D. Gitlin, "Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks," Networking and Internet Architecture, 4 Jan. 2018.
  4. M. WeiBbach, N. Taing, M. Wutzler, T. Springer, A. Schill and S. Clarke, "Decentralized coordination of dynamic software updates in the Internet of Things," in Proc. of 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, pp. 171-176, 2016.
  5. Trusted Computing
  6. E. Choudhari, K. D.Bodhe, S. M. Mundada, "Secure data aggregation in WSN using iterative filtering algorithm," in Proc. of 2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, pp. 1-5, 2017.
  7. G. Hariton, H. Palihapitya, "Should Consumers Trust Trusted Computing?," 2005 Public Interest Advocacy Centre (PIAC).
  8. Goldwasser, S.; Micali, S.; Rackoff, C., "The knowledge complexity of interactive proof systems," (PDF), SIAM Journal on Computing, Philadelphia: Society for Industrial and Applied Mathematics, 18 (1): 186-20, 1989.
  9. Shafi Goldwasser, Silvio Micali, and Charles Rackoff, "The Knowledge Complexity of Interactive Proof-Systems," in Proc. of Proceedings of the seventeenth annual ACM symposium on Theory of computing (STOC 1985), pp. 291-304, 1985.
  10. L. Sweeney. "k-Anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 557-570. Paper: 14, 2002. https://doi.org/10.1142/S0218488502001648
  11. A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity," in Proc. of 22nd International Conference on Data Engineering (ICDE'06), Atlanta, GA, USA, pp. 24-24, 2006.
  12. N. Li, T. Li and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," in Proc. of 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, pp. 106-115, 2007.
  13. Manuel Blum, Paul Feldman, and Silvio Micali, "Non-Interactive Zero-Knowledge and Its Applications," in Proc. of Proceedings of the twentieth annual ACM symposium on Theory of computing (STOC 1988), pp. 103-112, 1988.
  14. Amos Fiat and Adi Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," in Proc. of CRYPTO 1986, pp. 186-194, 1986.
  15. Yehuda Lindell, "An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle," TCC 2015: Theory of Cryptography, pp. 93-109, 2015.
  16. Ciampi M., Persiano G., Siniscalchi L., Visconti I, "A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles," Theory of Cryptography. TCC 2016. Lecture Notes in Computer Science, vol 9563. Springer, Berlin, Heidelberg, 2016.
  17. Hazewinkel, Michiel, ed., "Cyclic group," Encyclopedia of Mathematics, [1994] Springer Science+Business Media B.V. / Kluwer Academic Publishers, ISBN 978-1-55608-010-4, 2001.
  18. C.P. Schnorr, "Efficient identification and signatures for smart cards," in Proc. of G. Brassard, ed. Advances in Cryptology-Crypto '89, 239-252, Springer-Verlag. Lecture Notes in Computer Science, nr 435, 1990.
  19. F. Kahri, H. Mestiri, B. Bouallegue and M. Machhout, "Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256," in Proc. of 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), Mahdia, pp. 1-5, 2015.
  20. Shi Z., Ma C., Cote J., Wang B., "Hardware Implementation of Hash Functions. In: Tehranipoor M., Wang C. (eds) Introduction to Hardware Security and Trust," Springer, New York, NY, 2012.
  21. Latif K., Tariq M., Aziz A., Mahboob A. (2012) Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein. In: Sambath S., Zhu E. (eds) Frontiers in Computer Education. Advances in Intelligent and Soft Computing, vol 133. Springer, Berlin, Heidelberg, 2012.