Abstract
A cutting-edge technology called fog computing makes it possible to offer services and applications for IoT/end devices at the network's edge quickly and effectively. As the fog computing paradigm is driven from the cloud computing paradigm, the security and privacy concerns have been also passed down to fog. But fog and cloud differ in terms of architecture and capabilities, thus the available cloud solutions are irrelevant to the fog. Moreover, fog is resource constrained in nature as well as it has limited energy as it runs over batteries. Therefore there is a need to develop an energy preserving lightweight security scheme to secure the data as well as to provide a fine grained access control mechanism. Thus, in this article we have developed a cryptosystem based on Chosen-Ciphertext Attribute-based encryption (ABE) with dynamic key change in order to secure the data and to prohibit unauthorized access in an energy efficient manner. We have evaluated and analyzed the sturdiness and the security of our proposed cryptosystem considering the energy consumption and mitigating attacks as primary aspects. Additionally, our cryptosystem is effective and energy efficient compared to other techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: CCA-secure ABE with outsourced decryption for fog computing. Futur. Gener. Comput. Syst. 78, 730–738 (2018)
Kumar, N., Misra, S., Rodrigues, J.J., Obaidat, M.S.: Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet Things J. 2(4), 310–320 (2015)
Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N. S., Mahmoudi, C.: Fog computing conceptual model (2018)
Chaudhary, R., Kumar, N., Zeadally, S.: Network service chain-ing in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun. Mag. 55(11), 114–122 (2017)
Koo, D., Hur, J.: Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Futur. Gener. Comput. Syst. 78, 739–752 (2018)
Khalid, T., Khan, A.N., Ali, M., Adeel, A., Shuja, J.: A fog-based security framework for intelligent traffic light control sys-tem. Multimedia Tools and Applications 78(17), 24595–24615 (2019)
Muthanna, A., et al.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019)
Abdel-Basset, M., Manogaran, G., Mohamed, M.: A neutro-sophic theory-based security approach for fog and mobile-edge computing. Comput. Netw. 157, 122–132 (2019)
Dan, B., Matthew, F.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457–473. Springer, Berlin, Heidelberg (2005, May)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, pp. 213–229. Springer, Berlin, Heidelberg (2001, August)
Beimel, A.: Secure schemes for secret sharing and key distribution (1996)
Jindal, P., Singh, B.: Optimization of the security-performance tradeoff in RC4 encryption algorithm. Wireless Pers. Commun. 92(3), 1221–1250 (2017)
Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: Constrained Encryption as a Service in Fog-Enabled IoT. IEEE Internet Things J. 9(20), 19803–19810 (2022)
Yuvaraj, N., Raja, R.A., Karthikeyan, T., Praghash, K.: Improved authentication in secured multicast wireless sensor network (MWSN) using opposition frog leaping algorithm to resist man-in-middle attack. Wireless Pers. Commun. 123(2), 1715–1731 (2022)
Verma, R., Dhanda, N., Nagar, V.: Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms. In: Proceedings of Trends in Electronics and Health Informatics: TEHI 2021, pp. 513–522. Springer Nature Singapore, Singapore (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kumar, S., Garg, R. (2023). Energy Preserving ABE-Based Data Security Scheme for Fog Computing. In: Singh, M., Tyagi, V., Gupta, P., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2023. Communications in Computer and Information Science, vol 1848. Springer, Cham. https://doi.org/10.1007/978-3-031-37940-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-37940-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-37939-0
Online ISBN: 978-3-031-37940-6
eBook Packages: Computer ScienceComputer Science (R0)