Home // SECURWARE 2024, The Eighteenth International Conference on Emerging Security Information, Systems and Technologies // View article
Validating Damage Assessment: A Simulation-Based Analysis of Blind Write Lineage in Fog Computing
Authors:
Mariha Siddika Ahmad
Brajendra Panda
Keywords: Fog computing security; blind write; data dependency; damage assessment; malicious transaction.
Abstract:
In order to solve problems like temporal lag, communication overhead, and the requirement for computational and storage resources to be closer to both the ground and end users, the idea of fog computing evolved as an extension of cloud computing. Due to its large number of interconnected nodes, this system is susceptible to cyberattacks. Damage from the attack swiftly spreads to other nodes and their data items when valid transactions cause modifications using the value of a compromised object, thus impairing the system's real-time functions. This research proposes a fast damage assessment approach to provide users access to unaffected nodes while accelerating system recovery. In this paper, we provide various algorithms along with simulated results to efficiently identify and mitigate damage, ensuring the system's resilience and continuity. Our proposed method demonstrates significant improvements in damage assessment speed and efficiency compared to traditional approaches, with simulation results consistently showing substantially fewer data item reads required during the recovery process across various scenarios.
Pages: 28 to 35
Copyright: Copyright (c) IARIA, 2024
Publication date: November 3, 2024
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-68558-206-7
Location: Nice, France
Dates: from November 3, 2024 to November 7, 2024