A New Cop Called AcOP to Fight Hackers: Coordinating Cloud, Edge, & Fog Computing to Protect Data

By Lori Cameron
Published 03/05/2018
Share this on:

As we step into a new era with billions of networked devices connected to cyberphysical systems, researchers say we will lose more control of our applications and private data.

That’s why computer scientists from the University of Helsinki and Tampere University of Technology are developing a novel programming model for a secure connectivity framework that protects data transmitted between the remote cloud and the network edge.

The research is centered on what they call the “Action-Oriented Programming” model, which is a trust system that reduces the chance of hacking into cloud, fog, and edge systems.

“The Action-Oriented Programming (AcOP) model and an associated framework can dynamically adapt to the edge and the cloud according to particular environment and connectivity conditions. Further, AcOP is compared to mobile-app-based and cloud-based CPS deployments,” write Niko Mäkitalo, Aleksandr Ometov, Joona Kannisto, Sergey Andreev, Yevgeni Koucheryavy, and Tommi Mikkonen, authors of “Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing” in IEEE Software magazine(Login may be required for full-text.)

How Action-Oriented Programming (AcOP) works

When the Action-Oriented Programming (AcOP) model faces an emergency scenario, the user and device states (yellow and orange, in chart below) are reported to collective executions (light blue).

Actions (red) are coordinating the operation of various devices with capabilities (green). One device at a time acts as the coordinator, but the same software is executed collectively by multiple devices.Action-Oriented Programming (AcOP) model in an emergency scenario

Structure of the coalitions operating behind AcOP’s collective executions

In the emergency scenario, execution in people’s devices enables them to seamlessly join and leave a coalition without disrupting collective execution.

“The only procedure that requires stable connectivity to the cloud is coalition initialization,” the authors say.

“First, the involved mobile devices receive their certificates with the corresponding secret and public keys. These are utilized to establish secure direct connectivity with each relevant device. When a device is willing to create a secure coalition with its ‘neighbors,’ a request containing the public identifiers of future coalition members is sent to the corresponding server. The coalition secret is then generated and split between the coalition users.”

structure of the coalitions operating behind the collective executions of AcOP

A grand illustration of cloud, fog, and edge computing for AcOP model

The authors illustrate the considered application scenarios of cloud, fog, and edge computing for the AcOP model at several levels:

  • H2H = human-to-human
  • M2M = machine-to-machine
  • PPDR = public protection and disaster relief
  • QoE = quality of experience
  • V2I = vehicle-to-infrastructure
  • V2V = vehicle-to-vehicle

Considered application scenarios of cloud, fog, and edge computing for the AcOP model

A comprehensive chart analyzing Action-Oriented Programming model (A) for cyber-physical-system (CPS) development

The researchers provided an exhaustive analysis and commentary of how the Action-Oriented Programming model (A) for cyber-physical-system (CPS) development is compared with mobile-app (M) and cloud-service-based (C) approaches.

Comparing mobile-app and cloud-service-based approaches with Action-Oriented Programming model

The more we relegate data processing and application functions to edge devices, the more we put our data at risk. The AcOP model intends to alleviate that.

“Edge computing is increasingly demanded due to the CPS requirements for increased scalability and functional safety—if the entities are coordinated by the cloud, the risk remains that without reliable Internet connectivity the functional safety cannot be guaranteed. In cooperation at the network edges, devices need to be able to trust each other, thus calling for dynamic coalitions with secure and trusted topology,” say the authors.

 

Related research on edge computing in the Computer Society Digital Library

Login may be required for full text.

 


 

About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.