Skip to main content

Data Encryption in Fog Computing Using Hybrid Cryptography with Integrity Check

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Abstract

Over the years, research carried on data encryption in fog computing emphasized confidentiality, authentication, and access control. However, some limitations were encountered and it could not address the issues of inherent cloud computing security challenges such as Man-in-The-Middle and ciphertext attacks. This work incidentally developed an enhanced model that tackled the security challenges found in fog computing using hashing technique by using operational modeling to develop a hybrid cryptography scheme comprising of Advanced Encryption Standard 256 (AES 256), Elliptic Curve Diffie–Helman (ECDH), and Secure Hashing Algorithm 256 (SHA-256). Upon simulation, data obtained was used to analyze the performance and the results gotten showed that the proposed system performed fairly well in terms of execution time and throughput for decryption with a slight compromise in the execution time and throughput for encryption. The essence of this work has proven that it offers a two-way role that guarantees that the data transferred is secured and also validates its integrity. More so, it will provide the basic groundwork for creating a faultless and fitted data encryption mechanism in fog computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms. J Syst Architect 98:289–330

    Article  Google Scholar 

  2. OpenFog Reference Architecture for Fog Computing, https://www.iiconsortium.org/pdf/OpenFog_Reference_Architecture_2_09_17.pdf. Last accessed 10 Dec 2021

  3. What is fog computing? Why fog computing trending now? https://medium.com/yeello-digital-marketing-platform/what-is-fog-computing-why-fog-computing-trending-now-7a6bdfd73ef. Last accessed 12 Mar 2022

  4. Fog computing and the internet of things: Extend the cloud to where the things are. White Paper. 2016. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf. Last accessed 11 Mar 2022

  5. Usman MJ, Ismail AS, Chizari H, Gital AY, Chiroma H, Abdullahi M, Aliyu A (2019) Integrated resource allocation model for cloud and fog computing: toward energy-efficient Infrastructure as a Service (IaaS). In: Advances on computational intelligence in energy. Springer Cham, Switzerland, pp 125–145

    Google Scholar 

  6. Stojmenovic I, Wen S (2014) The fog computing paradigm: Scenarios and security issues. In: 2014 Federated conference on computer science and information systems. IEEE, Poland, pp 1–8

    Google Scholar 

  7. Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Futur Gener Comput Syst 29(5):1278–1299

    Article  Google Scholar 

  8. Akomolafe OP, Abodunrin MO (2017) A hybrid cryptographic model for data storage in mobile cloud computing. Int J Comput Netw Inf Secur 9(6):53–60

    Google Scholar 

  9. Ashi Z, Al-Fawa’reh M, Al-Fayoumi M (2020) Fog computing: security challenges and countermeasures. Int J Comput Appl 175(15):30–36

    Google Scholar 

  10. Ni J, Zhang K, Lin X, Shen X (2017) Securing fog computing for internet of things applications: Challenges and solutions. IEEE Commun Surv Tutor 20(1):601–628

    Article  Google Scholar 

  11. Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304

    Article  Google Scholar 

  12. Alzoubi YI, Osmanaj VH, Jaradat A, Al-Ahmad A (2020) Fog computing security and privacy for the internet of thing applications: State-of-the-art. Secur Privacy 4(2):e145

    Google Scholar 

  13. Vishwanath A, Peruri R, He J (2016) Security in fog computing through encryption. Int J Inf Technol Comput Sci 8(5):28–36

    Google Scholar 

  14. Sowjanya V (2017) Security framework for sharing data in fog computing. Int J Adv Res Comput Commun Eng 6(6):422–427

    Article  Google Scholar 

  15. Saif M, Shafique A, Mahfooz S (2019) Providing a security layer for Man-in-the-Middle attack in fog computing. Int J Comput Sci Inf Secur 17(6):19–25

    Google Scholar 

  16. Johney RK, Shelry E, Babu KR (2019) Enhanced security through cloud-fog integration. In: 2019 international conference on communication and electronics systems (ICCES). IEEE, India, pp 1530–1535

    Google Scholar 

  17. Husein T, Khalique A, Alam MA, Alankar B (2020) A dynamic scalable security model for data at rest in fog computing environment. Int J Innovat Technol Expl Eng 9(11):413–418

    Google Scholar 

  18. Kumar H, Shinde S, Talele P (2017) Secure fog computing system using emoticon technique. Int J Recent Innovat Trends Comput Commun 5(7):808–811

    Google Scholar 

  19. Khashan OA (2020) Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment. IEEE Access 8:66878–66887

    Article  Google Scholar 

  20. Lujala P, Ketil Rod J, Thieme N (2007) Fighting over oil: Introducing a new dataset. Confl Manag Peace Sci 24(3):239–256

    Article  Google Scholar 

  21. Peace Research Institute Oslo (PRIO) Petroleum Dataset, https://www.prio.org/Data/Geographical-and-Resource-Datasets/Petroleum-Dataset/. Last accessed 26 Feb 2022

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samson Ejim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ejim, S., Gital, A.Y., Chiroma, H., Lawal, M.A., Abubakar, M.Y., Kubi, G.M. (2023). Data Encryption in Fog Computing Using Hybrid Cryptography with Integrity Check. In: Thakur, M., Agnihotri, S., Rajpurohit, B.S., Pant, M., Deep, K., Nagar, A.K. (eds) Soft Computing for Problem Solving. Lecture Notes in Networks and Systems, vol 547. Springer, Singapore. https://doi.org/10.1007/978-981-19-6525-8_48

Download citation

Publish with us

Policies and ethics