• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

A New Cop Called AcOP to Fight Hackers: Coordinating Cloud, Edge, & Fog Computing to Protect Data

By Lori Cameron

By Lori Cameron on
March 5, 2018

Featured ImageFeatured ImageAs we step into a new era with billions of networked devices connected to cyberphysical systems, researchers say we will lose more control of our applications and private data.

That’s why computer scientists from the University of Helsinki and Tampere University of Technology are developing a novel programming model for a secure connectivity framework that protects data transmitted between the remote cloud and the network edge.

The research is centered on what they call the "Action-Oriented Programming" model, which is a trust system that reduces the chance of hacking into cloud, fog, and edge systems.

"The Action-Oriented Programming (AcOP) model and an associated framework can dynamically adapt to the edge and the cloud according to particular environment and connectivity conditions. Further, AcOP is compared to mobile-app-based and cloud-based CPS deployments," write Niko Mäkitalo, Aleksandr Ometov, Joona Kannisto, Sergey Andreev, Yevgeni Koucheryavy, and Tommi Mikkonen, authors of "Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing" in IEEE Software magazine. (Login may be required for full-text.)

How Action-Oriented Programming (AcOP) works

When the Action-Oriented Programming (AcOP) model faces an emergency scenario, the user and device states (yellow and orange, in chart below) are reported to collective executions (light blue).

Actions (red) are coordinating the operation of various devices with capabilities (green). One device at a time acts as the coordinator, but the same software is executed collectively by multiple devices.Action-Oriented Programming (AcOP) model in an emergency scenarioAction-Oriented Programming (AcOP) model in an emergency scenario

Structure of the coalitions operating behind AcOP's collective executions

In the emergency scenario, execution in people’s devices enables them to seamlessly join and leave a coalition without disrupting collective execution.

"The only procedure that requires stable connectivity to the cloud is coalition initialization," the authors say.

"First, the involved mobile devices receive their certificates with the corresponding secret and public keys. These are utilized to establish secure direct connectivity with each relevant device. When a device is willing to create a secure coalition with its 'neighbors,' a request containing the public identifiers of future coalition members is sent to the corresponding server. The coalition secret is then generated and split between the coalition users."

structure of the coalitions operating behind the collective executions of AcOPstructure of the coalitions operating behind the collective executions of AcOP

A grand illustration of cloud, fog, and edge computing for AcOP model

The authors illustrate the considered application scenarios of cloud, fog, and edge computing for the AcOP model at several levels:

  • H2H = human-to-human
  • M2M = machine-to-machine
  • PPDR = public protection and disaster relief
  • QoE = quality of experience
  • V2I = vehicle-to-infrastructure
  • V2V = vehicle-to-vehicle

Considered application scenarios of cloud, fog, and edge computing for the AcOP modelConsidered application scenarios of cloud, fog, and edge computing for the AcOP model

A comprehensive chart analyzing Action-Oriented Programming model (A) for cyber-physical-system (CPS) development

The researchers provided an exhaustive analysis and commentary of how the Action-Oriented Programming model (A) for cyber-physical-system (CPS) development is compared with mobile-app (M) and cloud-service-based (C) approaches.

Comparing mobile-app and cloud-service-based approaches with Action-Oriented Programming modelComparing mobile-app and cloud-service-based approaches with Action-Oriented Programming model

The more we relegate data processing and application functions to edge devices, the more we put our data at risk. The AcOP model intends to alleviate that.

"Edge computing is increasingly demanded due to the CPS requirements for increased scalability and functional safety—if the entities are coordinated by the cloud, the risk remains that without reliable Internet connectivity the functional safety cannot be guaranteed. In cooperation at the network edges, devices need to be able to trust each other, thus calling for dynamic coalitions with secure and trusted topology," say the authors.

Related research on edge computing in the Computer Society Digital Library

Login may be required for full text.

  • Edge Computing
  • The Promise of Edge Computing
  • The Emergence of Edge Computing
  • A Serverless Real-Time Data Analytics Platform for Edge Computing
  • Edge Computing and the Role of Cellular Networks
  • Real-Time Video Analytics: The Killer App for Edge Computing
  • Virtual Edge-Based Smart Community Network Management
  • Extending the Cloud to the Network Edge
  • Edge Analytics in the Internet of Things


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter