Skip to main content
Log in

A context sensitive security framework for Enterprise multimedia placement in fog computing environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the era of ICT, multimedia files are one of the main sources of information sharing for any enterprise located in one or more geographical locations. Online video watching and editing platforms needs to store the multimedia file close to the end user so that the latency can be minimized which in result enhances the quality of experience. Fog computing is evolved as distributed computing infrastructure located close to end user with minimum latency. As, Fog computing is distributed and can be owned by third party providers, a framework is proposed which selects the appropriate Fog computing environment for placement of multimedia files based on context and security requirements. Deep neural network is used to evaluate context parameters, explicit security requirement, file type classification, and final allocation decision. The proposed framework is tested using Juypter notebook and Python 3.6 framework for one million instances of multimedia files. It has received 84% (average of ten experimental runs) accuracy in selection of appropriate Fog layer to place a multimedia file. The Proposed framework enhances the multimedia file placement on Fog computing environment so that processing of file can be done without worrying about the security of Fog.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Aaber ZS, Wills GB, Crowder RM (2017) Protecting document outside enterprise network: A confirmed framework. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10131 LNCS, pp. 259–275.

  2. Abdur Rahman M, Shamim Hossain M, Hassanain E, Muhammad G (2018) Semantic multimedia fog computing and IoT environment: sustainability perspective. IEEE Commun Mag 56(5):80–87

    Article  Google Scholar 

  3. Aggarwal CC (2018) Neural networks and deep learning - a textbook

  4. Chang V (2017) Towards data analysis for weather cloud computing. Knowledge-Based Syst 127:29–45

    Article  Google Scholar 

  5. Chang V (2018) An overview, examples, and impacts offered by emerging services and analytics in cloud computing virtual reality. Neural Comput & Applic

  6. Chang V, Ramachandran M, Walters RJ, Wills G. Enterprise security: second international workshop, ES 2015, Vancouver. Revised selected papers

  7. Cottrell M, Verleysen M (2006) Advances in self-organizing maps. Neural Netw 19(6–7):721–722

    Article  Google Scholar 

  8. GitHub - RealImpactAnalytics/trumania: Trumania is a scenario-based random dataset generator library in python 3. Available: https://github.com/RealImpactAnalytics/trumania. Accessed: 16 Nov 2019

  9. S. Haykin, Neural networks and learning machines. 2008.

    Google Scholar 

  10. Hsu TH, Wu LY (2019) A cloud-fog scalable video streaming architecture for multimedia internet of things devices. Int J Internet Protoc Technol 12(2):85

    Article  Google Scholar 

  11. Jie Y, Li M, Guo C, Chen L (2019) Game-theoretic online resource allocation scheme on fog computing for mobile multimedia users. China Commun 16(3):22–31

    Google Scholar 

  12. Jupyter Community PJ (2018) Project Jupyter. Project Jupyter

  13. Kharel J, Shin SY (2019) Multimedia service utilizing hierarchical fog computing for vehicular networks. Multimed Tools Appl 78(7):9405–9428

    Article  Google Scholar 

  14. Lee J, Hong B, Jung S, Chang V (2018) Clustering learning model of CCTV image pattern for producing road hazard meteorological information. Futur Gener Comput Syst 86:1338–1350

    Article  Google Scholar 

  15. Li Y, Jeong YS, Shin BS, Park JH (2017) Crowdsensing multimedia data: security and privacy issues. IEEE Multimed 24(4):58–66

    Article  Google Scholar 

  16. Oikonomou A, Meletis B, Smallov L, Amin AS (2002) The Multimedia Approach: An Extra Layer Of Defence In The Enterprise Security. In Proc. of the 2nd Symposium on Research in Computer Science, pp. 12–21.

  17. Patterson J, Gibson A (2008) Deep learning a practitioner’s approach

  18. C. Perera, Y. Qin, J. C. Estrella, S. Reiff-Marganiec, and A. V. Vasilakos, “Fog computing for sustainable smart cities: a survey,” 2017.

    Book  Google Scholar 

  19. Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surv Tutorials 16(1):414–454

    Article  Google Scholar 

  20. Rong W, Nie Y, Ouyang Y, Peng B, Xiong Z (2014) Auto-encoder based bagging architecture for sentiment analysis. J Vis Lang Comput 25(6):840–849

    Article  Google Scholar 

  21. Rosário D et al (2018) Service migration from cloud to multi-tier fog nodes for multimedia dissemination with QoE support. Sensors (Switzerland)

  22. Shafiq SI, Sanin C, Toro C, Szczerbicki E (2015) Virtual engineering object (VEO): toward experience-based design and manufacturing for industry 4.0. Cybern Syst 46:35–50

    Article  Google Scholar 

  23. Shain MM (1994) Security issues with enterprise multimedia. Comput Secur 13(1):15–22

    Article  Google Scholar 

  24. Sohal AS, Sandhu R, Sood SK, Chang V (2017) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur

  25. Sohal AS, Sandhu R, Sood SK, Chang V (2018) A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput Secur 74:340–354

    Article  Google Scholar 

  26. Sun G, Song L, Liao D, Yu H, Chang V (2019) Towards privacy preservation for ‘check-in’ services in location-based social networks. Inf Sci (Ny) 481:616–634

    Article  Google Scholar 

  27. Wang W, Wang Q, Sohraby K (2017) Multimedia sensing as a service (MSaaS): exploring resource saving potentials of at cloud-edge IoT and fogs. IEEE Internet Things J 4(2):487–495

    Google Scholar 

  28. Wen Z, Yang R, Garraghan P, Lin T, Xu J, Rovatsos M (2017) Fog orchestration for internet of things services. IEEE Internet Comput 21(2):16–24

    Article  Google Scholar 

  29. Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf Sci (Ny) 479:567–592

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harsuminder Kaur Gill.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gill, H.K., Sehgal, V.K. & Verma, A.K. A context sensitive security framework for Enterprise multimedia placement in fog computing environment. Multimed Tools Appl 79, 10733–10749 (2020). https://doi.org/10.1007/s11042-020-08649-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08649-4

Keywords

Navigation