An Attribute-Based Encryption Scheme To Secure Fog Communication

Authors(2) :-B .Mogileeswaraiah, S.A. Md. Noorulla Baig

Fog Computing is considered as a profoundly virtualized worldview that can empower processing at the Internet of Things gadgets, living in the edge of the system, to deliver administrations and applications all the more proficiently and viably. Since Fog processing begins from and is a non-minor expansion of distributed computing, it acquires numerous security and protection difficulties of distributed computing, causing the broad worries in the examination group. To empower true and condential interchanges among a gathering of mist hubs, in this paper, we propose a proficient key trade convention in view of cipher text policy attribute-based encryption (CP-ABE) to build up secure correspondences among the members. To accomplish condentiality, validation, inconstancy, and access control, we join CP-ABE and computerized signature procedures. We investigate the productivity of our convention as far as security and execution. We additionally actualize our convention and contrast it and the testament based plan to outline its possibility.

Authors and Affiliations

B .Mogileeswaraiah
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
S.A. Md. Noorulla Baig
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Fog computing, security, ciphertext-policy attribute based encryption (CP-ABE), cloud

  1. J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute based encryption,in Proc. IEEE Symp. Secur. Privacy (SP), May 2007, pp. 321_334.
  2. R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 195_203.Z. Wan, J. Liu, and R. H. Deng, HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743_754, Apr. 2012.
  3. D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, Secure data processing framework for mobile cloud computing, in Proc. IEEE Conf. Comput.Commun. Workshops (INFOCOM WKSHPS), Apr. 2011, pp. 614_618.
  4. J.-M. Do, Y.-J. Song, and N. Park, Attribute based proxy re-encryption for data confidentiality in cloud computing environments, in Proc. 1st ACIS/JNU Int. Conf. Comput., Netw., Syst. Ind. Eng. (CNSI), 2011,pp. 248_251.
  5. L. Xu, X. Wu, and X. Zhang, Cl-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud, in Proc. 7th ACM Symp. Inf., Comput. Commun. Secur., 2012, pp. 87_88.
  6. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute based encryption, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1,pp. 131_143, Jan. 2013.
  7. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and grained data access control in cloud computing, in Proc. IEEE INFOCOM, Mar. 2010, pp. 1_9.
  8. J. Hur, Improving security and efficiency in attribute-based data sharing, IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271_2282, Oct. 2013.
  9. A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Comput.,vol. 21, no. 2, pp. 34_42, Mar. 2017.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 130-134
Manuscript Number : CSEIT184102
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

B .Mogileeswaraiah, S.A. Md. Noorulla Baig, "An Attribute-Based Encryption Scheme To Secure Fog Communication ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.130-134, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT184102

Article Preview

Follow Us

Contact Us