An Attribute-Based Encryption Scheme To Secure Fog Communication

Authors

  • B .Mogileeswaraiah  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
  • S.A. Md. Noorulla Baig  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Keywords:

Fog computing, security, ciphertext-policy attribute based encryption (CP-ABE), cloud

Abstract

Fog Computing is considered as a profoundly virtualized worldview that can empower processing at the Internet of Things gadgets, living in the edge of the system, to deliver administrations and applications all the more proficiently and viably. Since Fog processing begins from and is a non-minor expansion of distributed computing, it acquires numerous security and protection difficulties of distributed computing, causing the broad worries in the examination group. To empower true and condential interchanges among a gathering of mist hubs, in this paper, we propose a proficient key trade convention in view of cipher text policy attribute-based encryption (CP-ABE) to build up secure correspondences among the members. To accomplish condentiality, validation, inconstancy, and access control, we join CP-ABE and computerized signature procedures. We investigate the productivity of our convention as far as security and execution. We additionally actualize our convention and contrast it and the testament based plan to outline its possibility.

References

  1. J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute based encryption,in Proc. IEEE Symp. Secur. Privacy (SP), May 2007, pp. 321_334.
  2. R. Ostrovsky, A. Sahai, and B. Waters, Attribute-based encryption with non-monotonic access structures, in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 195_203.Z. Wan, J. Liu, and R. H. Deng, HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing, IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743_754, Apr. 2012.
  3. D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, Secure data processing framework for mobile cloud computing, in Proc. IEEE Conf. Comput.Commun. Workshops (INFOCOM WKSHPS), Apr. 2011, pp. 614_618.
  4. J.-M. Do, Y.-J. Song, and N. Park, Attribute based proxy re-encryption for data confidentiality in cloud computing environments, in Proc. 1st ACIS/JNU Int. Conf. Comput., Netw., Syst. Ind. Eng. (CNSI), 2011,pp. 248_251.
  5. L. Xu, X. Wu, and X. Zhang, Cl-PRE: A certificateless proxy reencryption scheme for secure data sharing with public cloud, in Proc. 7th ACM Symp. Inf., Comput. Commun. Secur., 2012, pp. 87_88.
  6. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, Scalable and secure sharing of personal health records in cloud computing using attribute based encryption, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 1,pp. 131_143, Jan. 2013.
  7. S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable, and grained data access control in cloud computing, in Proc. IEEE INFOCOM, Mar. 2010, pp. 1_9.
  8. J. Hur, Improving security and efficiency in attribute-based data sharing, IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271_2282, Oct. 2013.
  9. A. Alrawais, A. Alhothaily, C. Hu, and X. Cheng, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Comput.,vol. 21, no. 2, pp. 34_42, Mar. 2017.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
B .Mogileeswaraiah, S.A. Md. Noorulla Baig, " An Attribute-Based Encryption Scheme To Secure Fog Communication , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.130-134, March-April-2018.