Abstract
This study is aimed to propose a cryptosystem which integrates only two algorithms for secure data transmissions during fog nodes to cloud server communications. It provides a method of authenticated key distribution and authenticated encryption with robust and multiple crypto services. It is optimized for high throughput achievement based on FPGA to improve the efficiency of the existing hybrid cryptosystems and integrated encryption schemes which incorporated many independent algorithms for strong security. The separate keys which are needed for each component algorithm leading to extra key management and key storage requirements and the overall hardware complexity with increased computation cost are some of the limitations of the existing methods. The implementation outcomes show the efficiency, enhanced throughput, and reasonable resource utilization of the proposed method compared to the existing reported outcomes. It can be suitable for securing data exchanges among high performance computing environments including secure communications between fog computing layer and central cloud which require high speed cryptosystems with strong security and lower latency.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Stinson, D.R., Paterson, M.B.: Cryptography Theory and Practice, 4th edn, pp. 1–9. CRC Press, Boca Raton (2019)
McGrew, D., Viega, J.: The Galois/Counter Mode of operation (GCM). Submission to NIST, May 2005
Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Test 34(4), 26–33 (2017)
Pang, L., Kou, M., Wei, M., Li, H.: Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access 6, 78123–78135 (2018). https://doi.org/10.1109/access.2018.2884798
Zia, M., Ali, R.: Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron. Lett. (2019). https://doi.org/10.1049/el.2019.0032
Gutub, A.A, Khan, F.A.: Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: IEEE International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 116–121 (2013)
Alkady, Y., Habib, M.I., Rizk, R.Y.: A new security protocol using hybrid cryptography algorithms. In: IEEE International Computer Engineering Conference (ICENCO), pp. 109–115 (2013)
Abdalla, M., Bellare, M., Rogaway, P.: The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143–158. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_12
Martínez, V.G., Encinas, L.H., Dios, A.Q.: Security and practical considerations when ımplementing the elliptic curve ıntegrated encryption scheme. Cryptologia 39(3), 244–269 (2015). https://doi.org/10.1080/01611194.2014.988363
Martin, et al.: OpenFog security requirements and approaches. In: IEEE Communications Society Invited Paper, November 2017
Rodríguez-Andina, J., Torre-Arnanz, E., Valdés-Peña, M.: FPGAs Fundamentals, Advanced Features, and Applications in Industrial Electronics. CRC Press, Boca Raton (2017)
Wu, H., Preneel, B.: AEGIS: a fast authenticated encryption algorithm. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 185–201. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-43414-7_10
FIPS Publication 197, the Advanced Encryption Standard (AES), U.S. DoC/NIST, November 2001
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-keycryptosystems. Commun. ACM 21, 120–126 (1978)
Tadesse Abebe, A., Negash Shiferaw, Y., Gebeye Abera, W., Kumar, P.G.V.S.: Efficient FPGA ımplementation of an ıntegrated bilateral key confirmation scheme for pair-wise key-establishment and authenticated encryption. In: Zimale, F.A., Enku Nigussie, T., Fanta, S.W. (eds.) ICAST 2018. LNICST, vol. 274, pp. 429–438. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-15357-1_36
Montgomery, P.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)
Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: AES-GCM and AEGIS: efficient and high speed hardware ımplementations. J. Signal Process. Syst. 88(1), 1–12 (2016). https://doi.org/10.1007/s11265-016-1104-y
Katsaiti, M., Sklavos, N.: Implementation Efficiency and Alternations, on CAESAR Finalists: AEGIS Approach, pp. 661–665. https://doi.org/10.1109/dasc/picom/datacom/cyberscitec.2018.00117
Sandoval, M.M., Uribe, C.F.: A hardware architecture for elliptic curve cryptography and lossless data compression. In: IEEE International Conference on Electronics, Communications and Computers, pp. 113–118 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tadesse Abebe, A., Negash Shiferaw, Y., Kumar, P.G.V.S. (2020). Reconfigurable Integrated Cryptosystem for Secure Data Exchanges Between Fog Computing and Cloud Computing Platforms. In: Habtu, N., Ayele, D., Fanta, S., Admasu, B., Bitew, M. (eds) Advances of Science and Technology. ICAST 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 308. Springer, Cham. https://doi.org/10.1007/978-3-030-43690-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-43690-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43689-6
Online ISBN: 978-3-030-43690-2
eBook Packages: Computer ScienceComputer Science (R0)