Secure MFCC Architecture for health care application

Main Article Content

Ferdaous kamoun-abid
Amel Meddeb-Makhoulf
Faouzi Zarai

Abstract

Introduction: The current field of which our day is cloud computing. It is used in several fields like medical field. Moreover, for several reasons, such as diversity and the rapid increase in the number of connected devices, Cloud Computing is unable to meet certain requirements such as support for mobility, a high level of scalability, low latency and real time. This creates many challenges for the traditional architecture of Cloud Computing. to meet its requirements, several paradigms have appeared in recent years, such as mobile edge computing, mobile cloud computing and fog computing. Based on our research, fog computing is complementary to the cloud and uses network devices to process the latency of data collected using end users. In addition, MCC (Mobile Cloud Computing) devices offer many advantages such as streaming services to Fog Nodes. Due to the open features and high scalability of these networks, security is not guaranteed, where most of the existing research focuses on protecting systems and their platforms against attacks from unauthenticated devices only on a peripheral paradigm. To answer these questions and secure the IT architecture, which combines the advantages of three emerging technologies: Cloud computing, Fog Computing and Mobile Cloud Computing.


Objectives: In this article, we provide a method called MFCC (Mobile Fog Cloud Computing) that is used to distribute and collaborate firewalls to prevent network-based attacks for healthcare application.


Methods: Different levels of collaboration, based on a model for assessing confidence in relation to risk, are introduced. In this article we have based on the access control based on the trust which is a module aims to determine if an event is suspicious. Moreover, the confidence estimation is useful for making decisions to avoid the malicious packet. In addition we have used the level cooperation method.


Results: This evaluation framework used the NeSSi² tool, where the results show that the proposed architecture is better in terms of transmission delay and blocking rate compared to related works. The most important result is that our proposal is able to prevent distributed attacks, such as DDoS.


Conclusions: This work is based on the security of an architecture combining the MCC, and the fog title MFCC dedicated for health applications. It is based on network-level distributed access control based on distributed firewalls/controllers that manage ACLs and blacklists.

Article Details

How to Cite
Ferdaous kamoun-abid, Amel Meddeb-Makhoulf, & Faouzi Zarai. (2024). Secure MFCC Architecture for health care application. Journal for ReAttach Therapy and Developmental Diversities, 7(1), 26–40. https://doi.org/10.53555/jrtdd.v7i1.498
Section
Articles
Author Biographies

Ferdaous kamoun-abid

NTS’COM research unit Sfax, ENET’COM Sfax, Tunisia

Amel Meddeb-Makhoulf

NTS’COM research unit Sfax, ENET’COM Sfax, Tunisia

Faouzi Zarai

NTS’COM research unit Sfax, ENET’COM Sfax, Tunisia

References

C. Luo, L. Yang, P. Li et al “A Holistic Energy Optimization Framework for Cloud-Assisted Mobile Computing” IEEE Wireless Communications, 2015, vol. 22, no. 3, p. 118—23

X.SUN, and N.ANSARI “Green cloudlet network: A distributed green mobile cloud network” IEEE Network, 2017, vol. 31, no 1, p. 64-70.

S.ALONSO-MONSALVE, F.GARCÍA-CARBALLEIRA and A.CALDERÓN “A heterogeneous mobile cloud computing model for hybrid clouds” Future Generation Computer Systems, 2018 vol. 87, p. 651-666.

F.Bonomi, R.Milito, J.Zhu and S.Addepalli “Fog computing and its role in the internet of things” Workshop on Mobile Cloud Computing, 2012, p.13-16

T.H.LUAN, L.GAO, Z.LI et al “Fog computing: Focusing on mobile users at the edge” arXiv preprint arXiv: 1502.01815, 2015.

R .DENG, R.LU, Ch.LAI et al “Optimal workload allocation in fog-cloud computing toward balanced delay and power consumption” IEEE Internet of Things Journal, 2016, vol. 3, no 6, p. 1171-1181.

Y.JIANG, Z.HUANG, and D.TSANG “Challenges and solutions in fog computing orchestration” IEEE Network, 2018, vol. 32, no 3, p. 122-129.

Sh.XU, J.NING, LI.Yingjiu et al “Match in my way: Fine-grained bilateral access control for secure cloud-fog computing” IEEE Transactions on Dependable and Secure Computing, 2020, p. 1-13.

R.AMIN, S.KUNAL, A.SAHA et al “CFSec: Password based secure communication protocol in cloud-fog environment” Journal of Parallel and Distributed Computing, 2020, vol. 140, p. 52-62.

F. Kamoun-Abid, A. Meddeb-Makhlouf and F.Zarai “Distributed firewall and controller for Mobile Cloud Computing” 15th ACS/IEEE International Conference on Computer Systems and Applications, 2018, Aqaba, Jordan.

F. Kamoun-Abid, A. Meddeb-Makhlouf, F.Zarai and M. Guizani “Distributed and Cooperative firewall/controller in cloud environments” 13th International Conference on Availability, Reliability and Security, 2018, Germany.

A.SOHAL, R.SANDHU, S.K.SOOD et al “A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments” Computers & Security, 2018, vol. 74, p. 340-354.

R.ROMAN, J.LOPEZ and M.MAMBO “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges” Future Generation Computer Systems, 2018, vol. 78, p. 680-698.

R.ZAGROUBA and R.ALHAJRI “Machine Learning based Attacks Detection and Countermeasures in IoT” International Journal of Communication Networks and Information Security, 2021, vol. 13, no 2, p. 158-167.

A.D.TUDOSI, D.G.BALAN and A.D.POTORAC “Secure network architecture based on distributed firewalls” International Conference on Development and Application Systems, 2022. p. 85-90.

K.HONG, D.LILLETHUN, U.RAMACHANDRAN et al “Mobile fog: A programming model for large-scale applications on the internet of things” Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013. p. 15-20.

C.Puliafito, E.Mingozzi, C.Vallati, F.Longo and G.Merlino “Companion Fog Computing: Supporting Things Mobility Through Container Migration at the Edge” IEEE International Conference on Smart Computing, 2018, p. 97-105.

K.J.MODI and N.KAPADIA “Securing Healthcare Information over Cloud Using Hybrid Approach” Progress in Advanced Computing and Intelligent Engineering, 2019, Singapore, p. 63-74.

A.LAKHAN, Q.Ul.MASTOI, M.ELHOSENY et al “Deep neural network-based application partitioning and scheduling for hospitals and medical enterprises using IoT assisted mobile fog cloud” Enterprise Information Systems, 2021, p. 1-23.

M. Abomhara, H.K. Yang and M. Geir “Access control model for cooperative healthcare environments: Modeling and verification” International Conference on Healthcare Informatics, 2016, p. 46-54.

N. Kahani, K. Elgazzar and J R.Cordy “Authentication and Access Control in e-Health Systems in the Cloud” IEEE 2nd International Conference Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing and IEEE International Conference on Intelligent Data and Security, 2016, p. 13-23.

Z.QIN, J.SUN, D.CHEN et al “ Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things” Mobile Information Systems, 2017, vol. 2017.

B.W.DAOUD, A.MEDDEB-MAKHLOUF and F.ZARAI “A Trust-based Access Control Scheme for e-Health Cloud” IEEE/ACS 15th International Conference on Computer Systems and Applications, 2018, p. 1-7.

eXtensible Access Control Markup Language (XACML) Version 3.0. 22 January 2022. OASIS Standard http://docs.oasis- open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html

N. Gautam “Analysis of Queues: Methods and Applications” Boca Raton, FL, USA: CRC Press, 2012.

3GPP TS 23.203 V15.4.0 (2018-09) 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Policy and charging control architecture (Release 15).