Abstract
Distributed computing applications provide concurrent processing and services executed from different systems through a common cloud platform. However, without modifications or adaptable security measures, such concurrency presents a great challenge to the proper administration of security. This paper introduces a hybrid secure equivalent computing model to address this security issue. The proposed security model was designed using a genetic algorithm for equivalent measure distribution over the processing systems. Via this model, variations in security management owing to differences in the processing times of various services can be mitigated using the probabilistic annealing method. This method helps to preserve the stability of the security method without decreasing its robustness. For robust processing, the model exploits parallel security as a service feature from the cloud with a non-tokenized key sharing method. The key sharing and revocation processes are determined using the probabilistic outcomes of the annealing method. The genetic process verifies the distribution of security measures in the key sequence of any possible processing combination without compromise. The performance of the proposed model was verified using the metrics of process failure, computational complexity, time delay, false rate, and computing level.
Similar content being viewed by others
Availability of Data
No data, models, or code were generated.
References
Bruschi, R., Davoli, F., Lago, P., & Pajo, J. F. (2019). A multi-clustering approach to scale distributed tenant networks for mobile edge computing. IEEE Journal on Selected Areas in Communications, 37(3), 499–514.
Jia, Y. H., Chen, W. N., Gu, T., Zhang, H., Yuan, H. Q., Kwong, S., et al. (2018). Distributed cooperative co-evolution with adaptive computing resource allocation for large scale optimization. IEEE Transactions on Evolutionary Computation, 23(2), 188–202.
Alarifi, A., & Tolba, A. (2019). Optimizing the network energy of cloud assisted internet of things by using the adaptive neural learning approach in wireless sensor networks. Computers in Industry, 106, 133–141.
Al-Makhadmeh, Z., & Tolba, A. (2020). An intelligence-based recurrent learning scheme for optimal channel allocation and selection in device-to-device communications. Circuits, Systems, and Signal Processing, 39(2), 997–1018.
Gu, F., Niu, J., Jin, X., & Yu, S. (2020). FDFA: A fog computing assisted distributed analytics and detecting system for family activities. Peer-to-Peer Networking and Applications, 13(1), 38–52.
Win, T. Y., Tianfield, H., & Mair, Q. (2017). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data, 4(1), 11–25.
Xiao, Y., Jia, Y., Liu, C., Cheng, X., Yu, J., & Lv, W. (2019). Edge computing security: State of the art and challenges. Proceedings of the IEEE, 107(8), 1608–1631.
Shahid, F., Ashraf, H., Ghani, A., Ghayyur, S. A. K., Shamshirband, S., & Salwana, E. (2020). PSDS—proficient security over distributed storage: A method for data transmission in cloud. IEEE Access, 8, 118285–118298.
Li, Z., Hu, H., Huang, B., Chen, J., Li, C., Hu, H., et al. (2020). Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing. Multimedia Tools and Applications, 79, 10751–10780.
Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C. Z., Li, H., et al. (2019). Secure multi-party computation: Theory, practice and applications. Information Sciences, 476, 357–372.
Wang, J., Zhu, Y., & Maqbool, S. (2020). An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2020.05.001. (in press).
ulHaq, I., Wang, J., Zhu, Y., & Maqbool, S. (2020). A survey of authenticated key agreement protocols for multi-server architecture. Journal of Information Security and Applications, 55, 102639.
Hsu, C. L., Le, T. V., Lu, C. F., Lin, T. W., & Chuang, T. H. (2020). A privacy-preserved E2E authenticated key exchange protocol for multi-server architecture in edge computing networks. IEEE Access, 8, 40791–40808.
Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., & Bentaleb, A. (2019). Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks, 94, 101948.
Zhang, Y., Shen, Y., Wang, H., Zhang, Y., & Jiang, X. (2015). On secure wireless communications for service oriented computing. IEEE Transactions on Services Computing, 11(2), 318–328.
Jiang, Q., Ma, J., & Wei, F. (2016). On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Systems Journal, 12(2), 2039–2042.
Fawcett, L., Scott-Hayward, S., Broadbent, M., Wright, A., & Race, N. (2018). Tennison: a distributed SDN framework for scalable network security. IEEE Journal on Selected Areas in Communications, 36(12), 2805–2818.
Liang, J., Zhang, M., & Leung, V. C. (2020). A reliable trust computing mechanism based on multi-source feedback and fog computing in social sensor cloud. IEEE Internet of Things Journal, 7(6), 5481–5490.
Hasan, M. M., & Mouftah, H. T. (2017). Cloud-centric collaborative security service placement for advanced metering infrastructures. IEEE Transactions on Smart Grid, 10(2), 1339–1348.
Medhane, D. V., Sangaiah, A. K., Hossain, M. S., Muhammad, G., & Wang, J. (2020). Blockchain-enabled distributed security framework for next generation IoT: An edge-cloud and software defined network integrated approach. IEEE Internet of Things Journal, 7(7), 6143–6149.
Pešić, S., Ivanović, M., Radovanović, M., & Bădică, C. (2020). CAAVI-RICS model for observing the security of distributed IoT and edge computing systems. Simulation Modelling Practice and Theory, 105, 102125.
Noura, H., Salman, O., Chehab, A., & Couturier, R. (2019). Preserving data security in distributed fog computing. Ad Hoc Networks, 94, 101937.
Bonnah, E., & Shiguang, J. (2020). DecChain: A decentralized security approach in edge computing based on blockchain. Future Generation Computer Systems, 113, 363–379.
Mohamed, M. I. B., Hassan, M. F., Safdar, S., & Saleem, M. Q. (2019). Adaptive security architectural model for protecting identity federation in service oriented computing. Journal of King Saud University-Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2019.03.004. (in press).
Kayes, A. S. M., Rahayu, W., Watters, P., Alazab, M., Dillon, T., & Chang, E. (2020). Achieving security scalability and flexibility using fog-based context-aware access control. Future Generation Computer Systems, 107, 307–323.
Zhong, H., Sheng, J., Xu, Y., & Cui, J. (2019). SCPLBS: A smart cooperative platform for load balancing and security on SDN distributed controllers. Peer-to-Peer Networking and Applications, 12(2), 440–451.
Yuan, X., Cai, C., Wang, C., & Wang, Q. (2020). A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Transactions on Networking, 3, 97–111.
Ramadan, Q., Strüber, D., Salnitri, M., Jürjens, J., Riediger, V., & Staab, S. (2020). A semi-automated BPMN-based framework for detecting conflicts between security, data-minimization, and fairness requirements. Software and Systems Modeling, 19, 1191–1227.
Chaudhry, S. A., Kim, I. L., Rho, S., Farash, M. S., & Shon, T. (2019). An improved anonymous authentication scheme for distributed mobile cloud computing services. Cluster Computing, 22(1), 1595–1609.
Acknowledgements
The authors would like to extend their gratitude to King Saud University (Riyadh, Saudi Arabia) for funding this research through the Researchers Supporting Project number (RSP-2020/260).
Funding
King Saud University (Riyadh, Saudi Arabia): Researchers Supporting Project number (RSP-2020/260).
Author information
Authors and Affiliations
Contributions
Aldosary Saad- Writing an original paper.
Corresponding author
Ethics declarations
Conflict of interest
None.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors. All medical imaging data used in this work were anonymized before provision.
Informed Consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Saad, A. Hybrid Secure Equivalent Computing Model for Distributed Computing Applications. Wireless Pers Commun 127, 319–339 (2022). https://doi.org/10.1007/s11277-021-08265-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08265-x