Skip to main content
Log in

Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Blockchain technology ensures the integrity and transparency of data access control by keeping an unchangeable record of all transactions. Fog computing increases efficiency by dispersing cloud computing skills throughout the network’s superiority and reducing latency in data access and authentication processes. The objective of this study is to develop a blockchain and fog computing model that implements secure data access control mechanisms for distributed data storage and authentication using a hybrid encryption algorithm. The model aims to provide secure and reliable data storage by leveraging the decentralized nature of blockchain and the proximity of fog computing to the data source. Additionally, the Hybrid Encryption Algorithm (HEA) enhances data security by combining multiple encryption techniques for robust protection against unauthorized access. This study proposes a novel blockchain and also the Fog Computing Model (FCM) that ensures secure data access control, distributed data storage, and authentication. The model utilizes a HEA and is based on the Deep Adaptive Power Probabilistic Clustering Algorithm for optimal cluster head selection. Probability clustering algorithms are employed to determine the prospect of attracting a cluster head. Elliptic Curve Diffie-Hellman (ECDH) and Secure Hashing Algorithm 512 (SHA-512) are utilized for secure key exchange and hashing, respectively. Additional features include bit addition, long message redemption value, initialization of hash value, and the integration of Ethereum Smart Contracts (SC) for trusted distributed cross-domain operations. The study investigates the performance of the proposal for cloud-fog computing networks via simulation analysis using Matlab software. This model aims to provide a comprehensive and robust framework for secure and efficient data management in distributed environments. In this context, reliability pertains to the level of assurance and trustworthiness of the data access control mechanisms and authentication processes integrated into the model. The proposed method demonstrates a high-reliability score of 95%, indicating its capability to provide secure and dependable data access and authentication procedures. This model offers a safeguarding distributed data storage, controlling access, and ensuring authentication using a combination of blockchain, fog computing, and HEAs respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Wu, T.Y., Guo, X., Chen, Y.C., Kumari, S., Chen, C.M.: Sgxap: Sgx-based authentication protocol in iov-enabled fog computing. Symmetry 14(7), 1393 (2022)

    Article  Google Scholar 

  2. Ogundoyin, S.O., Kamil, I.A.: Secure and privacy-preserving D2D communication in fog computing services. Comput. Netw.. Netw. 210, 108942 (2022)

    Article  Google Scholar 

  3. Manzoor, A., Shah, M.A., Khattak, H.A., Din, I.U., Khan, M.K.: Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst.Commun. Syst. 35(12), e4033 (2022)

    Article  Google Scholar 

  4. Lansky, J., Sadrishojaei, M., Rahmani, A.M., Malik, M.H., Kazemian, F., Hosseinzadeh, M.: Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics 10(22), 4166 (2022)

    Article  Google Scholar 

  5. Awan, K.A., Din, I.U., Almogren, A., Kim, B.S.: Fog-computing-based cyber–physical system for secure food traceability through the Twofish algorithm. Electronics 11(2), 283 (2022)

    Article  Google Scholar 

  6. Umoren, O., Singh, R., Pervez, Z., Dahal, K.: Securing fog computing with a decentralised user authentication approach based on blockchain. Sensors 22(10), 3956 (2022)

    Article  Google Scholar 

  7. Singh, S., Chaurasiya, V.K.: Mutual authentication framework using fog computing in healthcare. Multimed. Tools Appl. 81(22), 31977–32003 (2022)

    Article  Google Scholar 

  8. Mohammed, B.A., Al-Shareeda, M.A., Manickam, S., Al-Mekhlafi, Z.G., Alayba, A.M., Sallam, A.A.: ANAA-fog: a novel anonymous authentication scheme for 5G-enabled vehicular fog computing. Mathematics 11(6), 1446 (2023)

    Article  Google Scholar 

  9. Hewa, T., Braeken, A., Liyanage, M., Ylianttila, M.: Fog computing and blockchain-based security service architecture for 5G industrial IoT-enabled cloud manufacturing. IEEE Trans. Industr. Inf.Industr. Inf. 18(10), 7174–7185 (2022)

    Article  Google Scholar 

  10. Sree, T.R., Harish, R. and Veni, T., 2022. An anonymous lightweight mutual authentication scheme for fog computing.

  11. Ejim, S., Gital, A.Y.U., Chiroma, H., Lawal, M.A., Abubakar, M.Y., Kubi, G.M.: Data encryption in fog computing using hybrid cryptography with integrity check. In: Soft Computing for Problem Solving: Proceedings of the SocProS 2022, pp. 627–638. Springer Nature Singapore, Singapore (2023)

    Chapter  Google Scholar 

  12. Mani, V., Ghonge, M.M., Chaitanya, N.K., Pal, O., Sharma, M., Mohan, S., Ahmadian, A.: A new blockchain and fog computing model for blood pressure medical sensor data storage. Comput. Electr. Eng.. Electr. Eng. 102, 108202 (2022)

    Article  Google Scholar 

  13. Masud, M., Gaba, G.S., Kumar, P., Gurtov, A.: A user-centric privacy-preserving authentication protocol for IoT-Am I environments. Comput. Commun.. Commun. 196, 45–54 (2022)

    Article  Google Scholar 

  14. Xie, Q., Han, J., Ding, Z.: Provable secure authentication protocol in fog-enabled smart home environment. Sustainability 14(21), 14367 (2022)

    Article  Google Scholar 

  15. Namane, S., Ahmim, M., Kondoro, A., Dhaou, I.B.: Blockchain-based authentication scheme for collaborative traffic light systems using fog computing. Electronics 12(2), 431 (2023)

    Article  Google Scholar 

  16. Alam, S., Shuaib, M., Ahmad, S., Jayakody, D.N.K., Muthanna, A., Bharany, S., Elgendy, I.A.: Blockchain-based solutions supporting reliable healthcare for fog computing and internet of medical things (IoMT) integration. Sustainability 14(22), 15312 (2022)

    Article  Google Scholar 

  17. Alzoubi, Y.I., Gill, A., Mishra, A.: A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues. J. Cloud Comput. 11(1), 1–36 (2022)

    Article  Google Scholar 

  18. Gowda, N.C., Manvi, S.S., Malakreddy, B., Lorenz, P.: BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future Gener. Comput. Syst. (2023). https://doi.org/10.1016/j.future.2022.12.042

    Article  Google Scholar 

  19. Pardeshi, M.S., Sheu, R.K., Yuan, S.M.: Hash-chain fog/edge: a mode-based hash-chain for secured mutual authentication protocol using zero-knowledge proofs in fog/edge. Sensors 22(2), 607 (2022)

    Article  Google Scholar 

  20. Li, H., Shen, T., Bai, F., Gong, B.: Blockchain-assisted distributed fog computing control flow attestation. Secu. Commun. Netw. (2022). https://doi.org/10.1155/2022/6128155

    Article  Google Scholar 

  21. Khezr, S., Yassine, A., Benlamri, R.: Towards a secure and dependable IoT data monetization using blockchain and fog computing. Clust. Comput.. Comput. (2022). https://doi.org/10.1007/s10586-022-03669-1

    Article  Google Scholar 

  22. Alsaeed, N. and Nadeem, F., 2022, January. A Framework for Blockchain and Fogging-based Efficient Authentication in Internet of Things. In 2022 2nd International Conference on Computing and Information Technology (ICCIT) (pp. 409–417). IEEE.

  23. Srininvas, L.V., Raminaidu, C., Ravibabu, D., Reddy, S.S.: A framework to recognize the sign language system for deaf and dumb using mining techniques. Indonesian J. Electr. Eng. Comput. Sci. 29(2), 1006–1016 (2023). https://doi.org/10.11591/ijeecs.v29.i2.pp1006-1016

    Article  Google Scholar 

  24. Shiva Shankar, R., Raminaidu, C.H., Ravibabu, D., Gupta, V.M.N.: A survey to raise the awareness of road accidents due to notwearing helmet. Int. J. Ind. Eng. Prod. Res. 31(3), 367–377 (2020). https://doi.org/10.22068/ijiepr.31.3.367

    Article  Google Scholar 

  25. R. Shiva Shankar1 , N.Deshai2 , K.V.S.S Murthy3 , VMNSSVKR Gupta, The Source of Growing Knowledge by Cognitive Artificial Intelligence, 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), DOI: https://doi.org/10.1109/ICSCAN.2019.8878732

  26. N.Deshai1 , R. Shiva Shankar2 , K. Sravani3 , D. Ravibabu4, A Developed Task Allotments Policy for Apache Hadoop Executing in the Public Clouds, 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), DOI: https://doi.org/10.1109/ICSCAN.2019.8878857

  27. Ravi Babu Devareddi;R. Shiva Shankar;K. VSSR Murthy;Ch. Raminaidu, Image segmentation based on scanned document and hand script counterfeit detection using neural network , 3rd International Conference on Innovations in Communication Computing and Sciences: ICCS-2021 AIP Conf. Proc. 2576, 050001–1–050001–11; https://doi.org/10.1063/5.0105808 Published by AIP Publishing. 978–0–7354–4253–5/$30.00

  28. Kumar, R., et al.: Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans. Consumer Electron. (2023). https://doi.org/10.1109/TNSE.2022.3191601

    Article  Google Scholar 

  29. Kumar, P., et al.: Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network. IEEE Trans. Netw. Sci. Eng. (2022). https://doi.org/10.1109/TNSE.2022.3191601

    Article  Google Scholar 

  30. Aljuhani, A., et al.: Fog intelligence for secure smart villages: Architecture, and future challenges. IEEE Consumer Electron. Mag. (2022). https://doi.org/10.1109/MCE.2022.3193268

    Article  Google Scholar 

  31. Gupta, R., et al.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw. Lett. 4(4), 174–178 (2022)

    Article  Google Scholar 

  32. Patwary, Abdullah Al-Noman, et al. "Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review." arXiv preprint arXiv:2003.00395 (2020).

  33. Liu, Y., Zhang, J., Zhan, J.: Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput.. Comput. 24, 1331–1345 (2021)

    Article  Google Scholar 

  34. Ngabo, D., et al.: Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10.17, 2110 (2021)

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.

Corresponding author

Correspondence to Ruchi Agrawal.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Agrawal, R., Singhal, S. & Sharma, A. Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04411-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04411-9

Keywords

Navigation