Abstract
Blockchain technology ensures the integrity and transparency of data access control by keeping an unchangeable record of all transactions. Fog computing increases efficiency by dispersing cloud computing skills throughout the network’s superiority and reducing latency in data access and authentication processes. The objective of this study is to develop a blockchain and fog computing model that implements secure data access control mechanisms for distributed data storage and authentication using a hybrid encryption algorithm. The model aims to provide secure and reliable data storage by leveraging the decentralized nature of blockchain and the proximity of fog computing to the data source. Additionally, the Hybrid Encryption Algorithm (HEA) enhances data security by combining multiple encryption techniques for robust protection against unauthorized access. This study proposes a novel blockchain and also the Fog Computing Model (FCM) that ensures secure data access control, distributed data storage, and authentication. The model utilizes a HEA and is based on the Deep Adaptive Power Probabilistic Clustering Algorithm for optimal cluster head selection. Probability clustering algorithms are employed to determine the prospect of attracting a cluster head. Elliptic Curve Diffie-Hellman (ECDH) and Secure Hashing Algorithm 512 (SHA-512) are utilized for secure key exchange and hashing, respectively. Additional features include bit addition, long message redemption value, initialization of hash value, and the integration of Ethereum Smart Contracts (SC) for trusted distributed cross-domain operations. The study investigates the performance of the proposal for cloud-fog computing networks via simulation analysis using Matlab software. This model aims to provide a comprehensive and robust framework for secure and efficient data management in distributed environments. In this context, reliability pertains to the level of assurance and trustworthiness of the data access control mechanisms and authentication processes integrated into the model. The proposed method demonstrates a high-reliability score of 95%, indicating its capability to provide secure and dependable data access and authentication procedures. This model offers a safeguarding distributed data storage, controlling access, and ensuring authentication using a combination of blockchain, fog computing, and HEAs respectively.
Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Wu, T.Y., Guo, X., Chen, Y.C., Kumari, S., Chen, C.M.: Sgxap: Sgx-based authentication protocol in iov-enabled fog computing. Symmetry 14(7), 1393 (2022)
Ogundoyin, S.O., Kamil, I.A.: Secure and privacy-preserving D2D communication in fog computing services. Comput. Netw.. Netw. 210, 108942 (2022)
Manzoor, A., Shah, M.A., Khattak, H.A., Din, I.U., Khan, M.K.: Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges. Int. J. Commun. Syst.Commun. Syst. 35(12), e4033 (2022)
Lansky, J., Sadrishojaei, M., Rahmani, A.M., Malik, M.H., Kazemian, F., Hosseinzadeh, M.: Development of a lightweight centralized authentication mechanism for the internet of things driven by fog. Mathematics 10(22), 4166 (2022)
Awan, K.A., Din, I.U., Almogren, A., Kim, B.S.: Fog-computing-based cyber–physical system for secure food traceability through the Twofish algorithm. Electronics 11(2), 283 (2022)
Umoren, O., Singh, R., Pervez, Z., Dahal, K.: Securing fog computing with a decentralised user authentication approach based on blockchain. Sensors 22(10), 3956 (2022)
Singh, S., Chaurasiya, V.K.: Mutual authentication framework using fog computing in healthcare. Multimed. Tools Appl. 81(22), 31977–32003 (2022)
Mohammed, B.A., Al-Shareeda, M.A., Manickam, S., Al-Mekhlafi, Z.G., Alayba, A.M., Sallam, A.A.: ANAA-fog: a novel anonymous authentication scheme for 5G-enabled vehicular fog computing. Mathematics 11(6), 1446 (2023)
Hewa, T., Braeken, A., Liyanage, M., Ylianttila, M.: Fog computing and blockchain-based security service architecture for 5G industrial IoT-enabled cloud manufacturing. IEEE Trans. Industr. Inf.Industr. Inf. 18(10), 7174–7185 (2022)
Sree, T.R., Harish, R. and Veni, T., 2022. An anonymous lightweight mutual authentication scheme for fog computing.
Ejim, S., Gital, A.Y.U., Chiroma, H., Lawal, M.A., Abubakar, M.Y., Kubi, G.M.: Data encryption in fog computing using hybrid cryptography with integrity check. In: Soft Computing for Problem Solving: Proceedings of the SocProS 2022, pp. 627–638. Springer Nature Singapore, Singapore (2023)
Mani, V., Ghonge, M.M., Chaitanya, N.K., Pal, O., Sharma, M., Mohan, S., Ahmadian, A.: A new blockchain and fog computing model for blood pressure medical sensor data storage. Comput. Electr. Eng.. Electr. Eng. 102, 108202 (2022)
Masud, M., Gaba, G.S., Kumar, P., Gurtov, A.: A user-centric privacy-preserving authentication protocol for IoT-Am I environments. Comput. Commun.. Commun. 196, 45–54 (2022)
Xie, Q., Han, J., Ding, Z.: Provable secure authentication protocol in fog-enabled smart home environment. Sustainability 14(21), 14367 (2022)
Namane, S., Ahmim, M., Kondoro, A., Dhaou, I.B.: Blockchain-based authentication scheme for collaborative traffic light systems using fog computing. Electronics 12(2), 431 (2023)
Alam, S., Shuaib, M., Ahmad, S., Jayakody, D.N.K., Muthanna, A., Bharany, S., Elgendy, I.A.: Blockchain-based solutions supporting reliable healthcare for fog computing and internet of medical things (IoMT) integration. Sustainability 14(22), 15312 (2022)
Alzoubi, Y.I., Gill, A., Mishra, A.: A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues. J. Cloud Comput. 11(1), 1–36 (2022)
Gowda, N.C., Manvi, S.S., Malakreddy, B., Lorenz, P.: BSKM-FC: Blockchain-based secured key management in a fog computing environment. Future Gener. Comput. Syst. (2023). https://doi.org/10.1016/j.future.2022.12.042
Pardeshi, M.S., Sheu, R.K., Yuan, S.M.: Hash-chain fog/edge: a mode-based hash-chain for secured mutual authentication protocol using zero-knowledge proofs in fog/edge. Sensors 22(2), 607 (2022)
Li, H., Shen, T., Bai, F., Gong, B.: Blockchain-assisted distributed fog computing control flow attestation. Secu. Commun. Netw. (2022). https://doi.org/10.1155/2022/6128155
Khezr, S., Yassine, A., Benlamri, R.: Towards a secure and dependable IoT data monetization using blockchain and fog computing. Clust. Comput.. Comput. (2022). https://doi.org/10.1007/s10586-022-03669-1
Alsaeed, N. and Nadeem, F., 2022, January. A Framework for Blockchain and Fogging-based Efficient Authentication in Internet of Things. In 2022 2nd International Conference on Computing and Information Technology (ICCIT) (pp. 409–417). IEEE.
Srininvas, L.V., Raminaidu, C., Ravibabu, D., Reddy, S.S.: A framework to recognize the sign language system for deaf and dumb using mining techniques. Indonesian J. Electr. Eng. Comput. Sci. 29(2), 1006–1016 (2023). https://doi.org/10.11591/ijeecs.v29.i2.pp1006-1016
Shiva Shankar, R., Raminaidu, C.H., Ravibabu, D., Gupta, V.M.N.: A survey to raise the awareness of road accidents due to notwearing helmet. Int. J. Ind. Eng. Prod. Res. 31(3), 367–377 (2020). https://doi.org/10.22068/ijiepr.31.3.367
R. Shiva Shankar1 , N.Deshai2 , K.V.S.S Murthy3 , VMNSSVKR Gupta, The Source of Growing Knowledge by Cognitive Artificial Intelligence, 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), DOI: https://doi.org/10.1109/ICSCAN.2019.8878732
N.Deshai1 , R. Shiva Shankar2 , K. Sravani3 , D. Ravibabu4, A Developed Task Allotments Policy for Apache Hadoop Executing in the Public Clouds, 2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), DOI: https://doi.org/10.1109/ICSCAN.2019.8878857
Ravi Babu Devareddi;R. Shiva Shankar;K. VSSR Murthy;Ch. Raminaidu, Image segmentation based on scanned document and hand script counterfeit detection using neural network , 3rd International Conference on Innovations in Communication Computing and Sciences: ICCS-2021 AIP Conf. Proc. 2576, 050001–1–050001–11; https://doi.org/10.1063/5.0105808 Published by AIP Publishing. 978–0–7354–4253–5/$30.00
Kumar, R., et al.: Blockchain-based authentication and explainable ai for securing consumer iot applications. IEEE Trans. Consumer Electron. (2023). https://doi.org/10.1109/TNSE.2022.3191601
Kumar, P., et al.: Blockchain and deep learning for secure communication in digital twin empowered industrial IoT network. IEEE Trans. Netw. Sci. Eng. (2022). https://doi.org/10.1109/TNSE.2022.3191601
Aljuhani, A., et al.: Fog intelligence for secure smart villages: Architecture, and future challenges. IEEE Consumer Electron. Mag. (2022). https://doi.org/10.1109/MCE.2022.3193268
Gupta, R., et al.: Quantum machine learning driven malicious user prediction for cloud network communications. IEEE Netw. Lett. 4(4), 174–178 (2022)
Patwary, Abdullah Al-Noman, et al. "Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review." arXiv preprint arXiv:2003.00395 (2020).
Liu, Y., Zhang, J., Zhan, J.: Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput.. Comput. 24, 1331–1345 (2021)
Ngabo, D., et al.: Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10.17, 2110 (2021)
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
All authors contributed to the design and implementation of the research, to the analysis of the results and to the writing of the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Agrawal, R., Singhal, S. & Sharma, A. Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04411-9
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10586-024-04411-9