Skip to main content

An Identity-Based Encryption Scheme for Data Security in Fog Computing

  • Conference paper
  • First Online:
Proceedings of International Joint Conference on Computational Intelligence

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Fog computing provides better integration facilities between cloud computing and Internet of things with real-time interactions. It delivers faster computing functionalities sitting close to user applications and has local storage options. Despite these potentials in fogging, maintaining secure data communication is still a challenging issue and needs further development. In this paper, we have presented an Identity-Based Encryption (IBE) scheme that ensures secure data transmission to authorized users. To provide data security, we have proposed a four-level Hierarchical Identity-Based Architecture for Fog Computing(HIBAF). In addition, we have evaluated our scheme to analyze the performance in terms of user load, memory utilization, response time, and delay time over different sizes of datasets. Finally, we have compared our results with other cryptography systems to figure out the effectiveness of our scheme and found overall 30% efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aazam M, Huh EN (2014) Fog computing and smart gateway based communication for cloud of things. In: 2014 international conference on future internet of things and cloud (FiCloud). IEEE, pp 464–470

    Google Scholar 

  2. Alrawais A, Alhothaily A, Hu C, Xing X, Cheng X (2017) An attribute-based encryption scheme to secure fog communications. IEEE Access 5:9131–9138

    Article  Google Scholar 

  3. Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on world wide web. ACM, pp 551–560

    Google Scholar 

  4. Blazy O, Kiltz E, Pan J (2014) (hierarchical) identity-based encryption from affine message authentication. In: International cryptology conference. Springer, Berlin, pp 408–425

    Chapter  Google Scholar 

  5. Boneh D, Hamburg M (2008) Generalized identity based and broadcast encryption schemes. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 455–470

    Chapter  Google Scholar 

  6. Bonomi F (2011) Connected vehicles, the internet of things, and fog computing. In: The eighth ACM international workshop on vehicular inter-networking (VANET), Las Vegas, USA. pp 13–15

    Google Scholar 

  7. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing. ACM, pp 13–16

    Google Scholar 

  8. Dong MT, Zhou X (2016) Fog computing: comprehensive approach for security data theft attack using elliptic curve cryptography and decoy technology. Open Access Libr J 3(09):1

    Google Scholar 

  9. Jiang Y, Susilo W, Mu Y, Guo F (2018) Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing. Futur Gener Comput Syst 78:720–729

    Article  Google Scholar 

  10. Kahvazadeh S, Souza VB, Masip-Bruin X, Marn-Tordera E, Garcia J, Diaz R (2017) Securing combined fog-to-cloud system through SDN approach. In: Proceedings of the 4th workshop on crosscloud infrastructures & Platforms. ACM, p 2

    Google Scholar 

  11. Li H, Dai Y, Yang B (2011) Identity-based cryptography for cloud security. IACR Cryptol Eprint Arch 2011:169

    Google Scholar 

  12. Mozumder DP, Mahi, MJN, Whaiduzzaman M Cloud computing security breaches and threats analysis

    Google Scholar 

  13. Rahman MT, Mahi MJN (2014) Proposal for SZRP protocol with the establishment of the salted sha-256 bit hmac pbkdf2 advance security system in a manet. In: 2014 International conference on electrical engineering and information & communication technology (ICEEICT). IEEE. pp 1–5

    Google Scholar 

  14. Roy S, Shovon AR, Whaiduzzaman, M (2017) Combined approach of tokenization and mining to secure and optimize big data in cloud storage. In: Humanitarian technology conference (R10-HTC), 2017 IEEE region 10. IEEE, pp 83–88

    Google Scholar 

  15. Schridde C, Dörnemann T, Juhnke E, Freisleben B, Smith M (2010) An identity-based security infrastructure for cloud environments. In: 2010 IEEE international conference on wireless communications, networking and information security (WCNIS). IEEE, pp 644–649

    Google Scholar 

  16. Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, Berlin, pp 47–53

    Google Scholar 

  17. Song YJ, Kim JM Secure data sharing based on proxy re-encryption in fog computing environment

    Google Scholar 

  18. Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated conference on computer science and information systems (FedCSIS). IEEE, pp. 1–8

    Google Scholar 

  19. Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: Mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW). IEEE, pp 125–128

    Google Scholar 

  20. Vishwanath A, Peruri R, He JS (2016) Security in fog computing through encryption. DigitalCommons@ Kennesaw State University

    Google Scholar 

  21. Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: advances in cryptology-CRYPTO 2009. Springer, Berlin, pp 619–636

    Chapter  Google Scholar 

  22. Whaiduzzaman M, Gani A (2014) Measuring security for cloud service provider: a third party approach. In: 2013 International conference on electrical information and communication technology (EICT). IEEE, pp 1–6

    Google Scholar 

  23. Whaiduzzaman M, Naveed A, Gani A (2016) Mobicore: mobile device based cloudlet resource enhancement for optimal task response. IEEE transactions on services computing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nishat Farjana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Farjana, N., Roy, S., Mahi, M.J.N., Whaiduzzaman, M. (2020). An Identity-Based Encryption Scheme for Data Security in Fog Computing. In: Uddin, M., Bansal, J. (eds) Proceedings of International Joint Conference on Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-13-7564-4_19

Download citation

Publish with us

Policies and ethics