Skip to main content

Energy Preserving ABE-Based Data Security Scheme for Fog Computing

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2023)

Abstract

A cutting-edge technology called fog computing makes it possible to offer services and applications for IoT/end devices at the network's edge quickly and effectively. As the fog computing paradigm is driven from the cloud computing paradigm, the security and privacy concerns have been also passed down to fog. But fog and cloud differ in terms of architecture and capabilities, thus the available cloud solutions are irrelevant to the fog. Moreover, fog is resource constrained in nature as well as it has limited energy as it runs over batteries. Therefore there is a need to develop an energy preserving lightweight security scheme to secure the data as well as to provide a fine grained access control mechanism. Thus, in this article we have developed a cryptosystem based on Chosen-Ciphertext Attribute-based encryption (ABE) with dynamic key change in order to secure the data and to prohibit unauthorized access in an energy efficient manner. We have evaluated and analyzed the sturdiness and the security of our proposed cryptosystem considering the energy consumption and mitigating attacks as primary aspects. Additionally, our cryptosystem is effective and energy efficient compared to other techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zuo, C., Shao, J., Wei, G., Xie, M., Ji, M.: CCA-secure ABE with outsourced decryption for fog computing. Futur. Gener. Comput. Syst. 78, 730–738 (2018)

    Article  Google Scholar 

  2. Kumar, N., Misra, S., Rodrigues, J.J., Obaidat, M.S.: Coalition games for spatio-temporal big data in internet of vehicles environment: a comparative analysis. IEEE Internet Things J. 2(4), 310–320 (2015)

    Article  Google Scholar 

  3. Iorga, M., Feldman, L., Barton, R., Martin, M.J., Goren, N. S., Mahmoudi, C.: Fog computing conceptual model (2018)

    Google Scholar 

  4. Chaudhary, R., Kumar, N., Zeadally, S.: Network service chain-ing in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun. Mag. 55(11), 114–122 (2017)

    Article  Google Scholar 

  5. Koo, D., Hur, J.: Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Futur. Gener. Comput. Syst. 78, 739–752 (2018)

    Article  Google Scholar 

  6. Khalid, T., Khan, A.N., Ali, M., Adeel, A., Shuja, J.: A fog-based security framework for intelligent traffic light control sys-tem. Multimedia Tools and Applications 78(17), 24595–24615 (2019)

    Article  Google Scholar 

  7. Muthanna, A., et al.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019)

    Article  Google Scholar 

  8. Abdel-Basset, M., Manogaran, G., Mohamed, M.: A neutro-sophic theory-based security approach for fog and mobile-edge computing. Comput. Netw. 157, 122–132 (2019)

    Article  Google Scholar 

  9. Dan, B., Matthew, F.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  10. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 457–473. Springer, Berlin, Heidelberg (2005, May)

    Google Scholar 

  11. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, pp. 213–229. Springer, Berlin, Heidelberg (2001, August)

    Google Scholar 

  12. Beimel, A.: Secure schemes for secret sharing and key distribution (1996)

    Google Scholar 

  13. Jindal, P., Singh, B.: Optimization of the security-performance tradeoff in RC4 encryption algorithm. Wireless Pers. Commun. 92(3), 1221–1250 (2017)

    Article  Google Scholar 

  14. Deb, P.K., Mukherjee, A., Misra, S.: CEaaS: Constrained Encryption as a Service in Fog-Enabled IoT. IEEE Internet Things J. 9(20), 19803–19810 (2022)

    Article  Google Scholar 

  15. Yuvaraj, N., Raja, R.A., Karthikeyan, T., Praghash, K.: Improved authentication in secured multicast wireless sensor network (MWSN) using opposition frog leaping algorithm to resist man-in-middle attack. Wireless Pers. Commun. 123(2), 1715–1731 (2022)

    Article  Google Scholar 

  16. Verma, R., Dhanda, N., Nagar, V.: Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms. In: Proceedings of Trends in Electronics and Health Informatics: TEHI 2021, pp. 513–522. Springer Nature Singapore, Singapore (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandeep Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, S., Garg, R. (2023). Energy Preserving ABE-Based Data Security Scheme for Fog Computing. In: Singh, M., Tyagi, V., Gupta, P., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2023. Communications in Computer and Information Science, vol 1848. Springer, Cham. https://doi.org/10.1007/978-3-031-37940-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-37940-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37939-0

  • Online ISBN: 978-3-031-37940-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics