Studying and Detecting of Security Attacks on Fog Computing Systems using Blockchain
Abstract
Fog computing extends cloud computing capabilities to the edge of the network, bringing computing and storage closer to users and devices as this distributed architecture improves the efficiency of data processing and analysis while reducing latency.
In the context of security, fog computing faces many challenges such as securing communication between distributed devices, ensuring data integrity, and protecting against malicious attacks. It has been shown that traditional security measures may not be sufficient to address these challenges due to the dynamic and decentralized nature of fog computing systems. Hence the use of block chain technology in fog computing, where a secure and tamper-resistant distributed ledger (Distributed Ledger Technology (DLT)) can be used to verify the integrity of data and transactions. Blockchain's decentralized consensus mechanism enhances the reliability and resilience of fog computing networks, making them more robust against security attacks. In this research, we studied and evaluated security attacks on fog computing networks and studied the impact of integrating block chains to enhance security measures in fog computing systems through the use of smart contracts. We used IfogSim to simulate fog computing, and the LOIC TOOLS tool to implement security attacks. The results showed the benefit of the block chain. This reduces the effectiveness of attacks by improving performance and network utilization by 68.17% and reducing delay by 68.26% in the presence of a DDOS attack
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 https://creativecommons.org/licenses/by-nc-sa/4.0/

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The authors retain the copyright and grant the right to publish in the magazine for the first time with the transfer of the commercial right to Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series
Under a CC BY- NC-SA 04 license that allows others to share the work with of the work's authorship and initial publication in this journal. Authors can use a copy of their articles in their scientific activity, and on their scientific websites, provided that the place of publication is indicted in Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series . The Readers have the right to send, print and subscribe to the initial version of the article, and the title of Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series Publisher
journal uses a CC BY-NC-SA license which mean
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.