Home // SECURWARE 2024, The Eighteenth International Conference on Emerging Security Information, Systems and Technologies // View article


Validating Damage Assessment: A Simulation-Based Analysis of Blind Write Lineage in Fog Computing

Authors:
Mariha Siddika Ahmad
Brajendra Panda

Keywords: Fog computing security; blind write; data dependency; damage assessment; malicious transaction.

Abstract:
In order to solve problems like temporal lag, communication overhead, and the requirement for computational and storage resources to be closer to both the ground and end users, the idea of fog computing evolved as an extension of cloud computing. Due to its large number of interconnected nodes, this system is susceptible to cyberattacks. Damage from the attack swiftly spreads to other nodes and their data items when valid transactions cause modifications using the value of a compromised object, thus impairing the system's real-time functions. This research proposes a fast damage assessment approach to provide users access to unaffected nodes while accelerating system recovery. In this paper, we provide various algorithms along with simulated results to efficiently identify and mitigate damage, ensuring the system's resilience and continuity. Our proposed method demonstrates significant improvements in damage assessment speed and efficiency compared to traditional approaches, with simulation results consistently showing substantially fewer data item reads required during the recovery process across various scenarios.

Pages: 28 to 35

Copyright: Copyright (c) IARIA, 2024

Publication date: November 3, 2024

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-68558-206-7

Location: Nice, France

Dates: from November 3, 2024 to November 7, 2024